From patchwork Tue Aug 1 02:02:05 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: zhaotianrui X-Patchwork-Id: 128955 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:918b:0:b0:3e4:2afc:c1 with SMTP id s11csp2390881vqg; Mon, 31 Jul 2023 19:21:39 -0700 (PDT) X-Google-Smtp-Source: APBJJlGfN4KIM2P36iwJ3rHL5S55zjhes51iqVaIHSTXm4ymItY6OyFx+E8IdjqsMo4yS3YTVsPR X-Received: by 2002:a05:6830:1e47:b0:6b9:3cf0:14e1 with SMTP id e7-20020a0568301e4700b006b93cf014e1mr12193849otj.16.1690856499265; Mon, 31 Jul 2023 19:21:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690856499; cv=none; d=google.com; s=arc-20160816; b=yjok2HjMUt9OoYZ5aEhcyiRSOWwW/COzVEhrcC/zUgMA5kCnEvbZk5JMgmT5cwhScU 6tnZtGSU8NUBCi5s04BFmuhUpOoruNDUfcWqf6T1pm0vEpIOxFu0VPwChqKiDygfHQum HPhyyaDC9Uilg2/530YWMfiIO3R7kX4mF/DGblcRUukBWMdmntqIRwmA8hMyzINBRQ4I i2VBtxy/rGNwFIuCPoGXuuz3PBfN0/2UOItvRI9n5Hyz9R3kg3dKTT6yUrx6Ih60LwZe Td+EZcyASRGVnxvZ+y4TZ774LWvB6r31foztQ0D4vMCsH8UEMHbfndWbWCBmLAsKTmK/ Rozg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=rWk88dvtW/rlAUWZYD6Y4dzCl0AF/8vNXzCDSiZqgfE=; fh=78XkdsmXgGpMLEUd4018w1oFMTvg8nay2829+Tm9pTc=; b=FvFnDA2Nbvcy0PrvPxhtYABilqhQDVypLJT92FC1jEeEdGpsGNomPk3GNTA1PEPoWA Arz9HoL9a49DOkaSUjv/PP0OA/Q3DFbG+x/iDr9LYwJQwY609W/uPaNdldpTe4CUwIqD OvFtWqSRjQM+cD6QSEC0FzM2KLnXRekgCEukEsTWmrUNFeRXOadH4cIK1UbaFN1Ne6Ib L8VLu5Eu7HXgcnXV76FkTDy+aPxW0y+ZZzFg9Q+EV79O1YA2MGf0ZTC4KMEQVPq39xoy Gx0Q3uMmJj4dUCfyt+sjcfVjLYmy6ShnsTVFdi5tpzIc6IbDXeAUJ4hZllDUdV6+5CBj Jwuw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h10-20020a63384a000000b0053fe93b2d33si2499069pgn.201.2023.07.31.19.21.26; Mon, 31 Jul 2023 19:21:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231981AbjHACCZ (ORCPT + 99 others); Mon, 31 Jul 2023 22:02:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47920 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230307AbjHACCO (ORCPT ); Mon, 31 Jul 2023 22:02:14 -0400 Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D92501BC8; Mon, 31 Jul 2023 19:02:12 -0700 (PDT) Received: from loongson.cn (unknown [10.2.5.185]) by gateway (Coremail) with SMTP id _____8AxTeujZ8hkL8gNAA--.27265S3; Tue, 01 Aug 2023 10:02:11 +0800 (CST) Received: from localhost.localdomain (unknown [10.2.5.185]) by localhost.localdomain (Coremail) with SMTP id AQAAf8BxHCOeZ8hkPHJDAA--.25753S5; Tue, 01 Aug 2023 10:02:10 +0800 (CST) From: Tianrui Zhao To: Shuah Khan , Paolo Bonzini , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Vishal Annapurve , Huacai Chen , WANG Xuerui , loongarch@lists.linux.dev, Peter Xu , Vipin Sharma , maobibo@loongson.cn, zhaotianrui@loongson.cn Subject: [PATCH v1 3/4] selftests: kvm: Add ucall tests for LoongArch KVM Date: Tue, 1 Aug 2023 10:02:05 +0800 Message-Id: <20230801020206.1957986-4-zhaotianrui@loongson.cn> X-Mailer: git-send-email 2.39.1 In-Reply-To: <20230801020206.1957986-1-zhaotianrui@loongson.cn> References: <20230801020206.1957986-1-zhaotianrui@loongson.cn> MIME-Version: 1.0 X-CM-TRANSID: AQAAf8BxHCOeZ8hkPHJDAA--.25753S5 X-CM-SenderInfo: p2kd03xldq233l6o00pqjv00gofq/ X-Coremail-Antispam: 1Uk129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7KY7 ZEXasCq-sGcSsGvfJ3UbIjqfuFe4nvWSU5nxnvy29KBjDU0xBIdaVrnUUvcSsGvfC2Kfnx nUUI43ZEXa7xR_UUUUUUUUU== X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1772991544800790500 X-GMAIL-MSGID: 1772991544800790500 Add ucall tests for LoongArch KVM, it means that VM use hypercall to return to userspace and handle the mmio exception. Based-on: <20230720062813.4126751-1-zhaotianrui@loongson.cn> Signed-off-by: Tianrui Zhao --- .../selftests/kvm/lib/loongarch/ucall.c | 44 +++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 tools/testing/selftests/kvm/lib/loongarch/ucall.c diff --git a/tools/testing/selftests/kvm/lib/loongarch/ucall.c b/tools/testing/selftests/kvm/lib/loongarch/ucall.c new file mode 100644 index 000000000000..b32f7c7f6548 --- /dev/null +++ b/tools/testing/selftests/kvm/lib/loongarch/ucall.c @@ -0,0 +1,44 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * ucall support. A ucall is a "hypercall to userspace". + * + */ +#include "kvm_util.h" + +/* + * ucall_exit_mmio_addr holds per-VM values (global data is duplicated by each + * VM), it must not be accessed from host code. + */ +static vm_vaddr_t *ucall_exit_mmio_addr; + +void ucall_arch_init(struct kvm_vm *vm, vm_paddr_t mmio_gpa) +{ + vm_vaddr_t mmio_gva = vm_vaddr_unused_gap(vm, vm->page_size, KVM_UTIL_MIN_VADDR); + + virt_map(vm, mmio_gva, mmio_gpa, 1); + + vm->ucall_mmio_addr = mmio_gpa; + + write_guest_global(vm, ucall_exit_mmio_addr, (vm_vaddr_t *)mmio_gva); +} + +void ucall_arch_do_ucall(vm_vaddr_t uc) +{ + + WRITE_ONCE(*ucall_exit_mmio_addr, uc); +} + +void *ucall_arch_get_ucall(struct kvm_vcpu *vcpu) +{ + struct kvm_run *run = vcpu->run; + + if (run->exit_reason == KVM_EXIT_MMIO && + run->mmio.phys_addr == vcpu->vm->ucall_mmio_addr) { + TEST_ASSERT(run->mmio.is_write && run->mmio.len == sizeof(uint64_t), + "Unexpected ucall exit mmio address access"); + + return (void *)(*((uint64_t *)run->mmio.data)); + } + + return NULL; +}