[PATCH 15/59] KVM: arm64: nv: Refactor vcpu_{read,write}_sys_reg

2019-06-21 Thread Marc Zyngier
Extract the direct HW accessors for later reuse.

Signed-off-by: Marc Zyngier 
---
 arch/arm64/kvm/sys_regs.c | 247 +-
 1 file changed, 139 insertions(+), 108 deletions(-)

diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
index 2b8734f75a09..e181359adadf 100644
--- a/arch/arm64/kvm/sys_regs.c
+++ b/arch/arm64/kvm/sys_regs.c
@@ -182,99 +182,161 @@ const struct el2_sysreg_map *find_el2_sysreg(const 
struct el2_sysreg_map *map,
return entry;
 }
 
+static bool __vcpu_read_sys_reg_from_cpu(int reg, u64 *val)
+{
+   /*
+* System registers listed in the switch are not saved on every
+* exit from the guest but are only saved on vcpu_put.
+*
+* Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
+* should never be listed below, because the guest cannot modify its
+* own MPIDR_EL1 and MPIDR_EL1 is accessed for VCPU A from VCPU B's
+* thread when emulating cross-VCPU communication.
+*/
+   switch (reg) {
+   case CSSELR_EL1:*val = read_sysreg_s(SYS_CSSELR_EL1);   break;
+   case SCTLR_EL1: *val = read_sysreg_s(SYS_SCTLR_EL12);   break;
+   case ACTLR_EL1: *val = read_sysreg_s(SYS_ACTLR_EL1);break;
+   case CPACR_EL1: *val = read_sysreg_s(SYS_CPACR_EL12);   break;
+   case TTBR0_EL1: *val = read_sysreg_s(SYS_TTBR0_EL12);   break;
+   case TTBR1_EL1: *val = read_sysreg_s(SYS_TTBR1_EL12);   break;
+   case TCR_EL1:   *val = read_sysreg_s(SYS_TCR_EL12); break;
+   case ESR_EL1:   *val = read_sysreg_s(SYS_ESR_EL12); break;
+   case AFSR0_EL1: *val = read_sysreg_s(SYS_AFSR0_EL12);   break;
+   case AFSR1_EL1: *val = read_sysreg_s(SYS_AFSR1_EL12);   break;
+   case FAR_EL1:   *val = read_sysreg_s(SYS_FAR_EL12); break;
+   case MAIR_EL1:  *val = read_sysreg_s(SYS_MAIR_EL12);break;
+   case VBAR_EL1:  *val = read_sysreg_s(SYS_VBAR_EL12);break;
+   case CONTEXTIDR_EL1:*val = read_sysreg_s(SYS_CONTEXTIDR_EL12);break;
+   case TPIDR_EL0: *val = read_sysreg_s(SYS_TPIDR_EL0);break;
+   case TPIDRRO_EL0:   *val = read_sysreg_s(SYS_TPIDRRO_EL0);  break;
+   case TPIDR_EL1: *val = read_sysreg_s(SYS_TPIDR_EL1);break;
+   case AMAIR_EL1: *val = read_sysreg_s(SYS_AMAIR_EL12);   break;
+   case CNTKCTL_EL1:   *val = read_sysreg_s(SYS_CNTKCTL_EL12); break;
+   case PAR_EL1:   *val = read_sysreg_s(SYS_PAR_EL1);  break;
+   case DACR32_EL2:*val = read_sysreg_s(SYS_DACR32_EL2);   break;
+   case IFSR32_EL2:*val = read_sysreg_s(SYS_IFSR32_EL2);   break;
+   case DBGVCR32_EL2:  *val = read_sysreg_s(SYS_DBGVCR32_EL2); break;
+   default:return false;
+   }
+
+   return true;
+}
+
+static bool __vcpu_write_sys_reg_to_cpu(u64 val, int reg)
+{
+   /*
+* System registers listed in the switch are not restored on every
+* entry to the guest but are only restored on vcpu_load.
+*
+* Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
+* should never be listed below, because the the MPIDR should only be
+* set once, before running the VCPU, and never changed later.
+*/
+   switch (reg) {
+   case CSSELR_EL1:write_sysreg_s(val, SYS_CSSELR_EL1);break;
+   case SCTLR_EL1: write_sysreg_s(val, SYS_SCTLR_EL12);break;
+   case ACTLR_EL1: write_sysreg_s(val, SYS_ACTLR_EL1); break;
+   case CPACR_EL1: write_sysreg_s(val, SYS_CPACR_EL12);break;
+   case TTBR0_EL1: write_sysreg_s(val, SYS_TTBR0_EL12);break;
+   case TTBR1_EL1: write_sysreg_s(val, SYS_TTBR1_EL12);break;
+   case TCR_EL1:   write_sysreg_s(val, SYS_TCR_EL12);  break;
+   case ESR_EL1:   write_sysreg_s(val, SYS_ESR_EL12);  break;
+   case AFSR0_EL1: write_sysreg_s(val, SYS_AFSR0_EL12);break;
+   case AFSR1_EL1: write_sysreg_s(val, SYS_AFSR1_EL12);break;
+   case FAR_EL1:   write_sysreg_s(val, SYS_FAR_EL12);  break;
+   case MAIR_EL1:  write_sysreg_s(val, SYS_MAIR_EL12); break;
+   case VBAR_EL1:  write_sysreg_s(val, SYS_VBAR_EL12); break;
+   case CONTEXTIDR_EL1:write_sysreg_s(val, SYS_CONTEXTIDR_EL12);break;
+   case TPIDR_EL0: write_sysreg_s(val, SYS_TPIDR_EL0); break;
+   case TPIDRRO_EL0:   write_sysreg_s(val, SYS_TPIDRRO_EL0);   break;
+   case TPIDR_EL1: write_sysreg_s(val, SYS_TPIDR_EL1); break;
+   case AMAIR_EL1: write_sysreg_s(val, SYS_AMAIR_EL12);break;
+   case CNTKCTL_EL1:   write_sysreg_s(val, SYS_CNTKCTL_EL12);  break;
+   case PAR_EL1:   write_sysreg_s(val,

Re: [PATCH 15/59] KVM: arm64: nv: Refactor vcpu_{read,write}_sys_reg

2019-06-24 Thread Julien Thierry



On 06/21/2019 10:37 AM, Marc Zyngier wrote:
> Extract the direct HW accessors for later reuse.
> 
> Signed-off-by: Marc Zyngier 
> ---
>  arch/arm64/kvm/sys_regs.c | 247 +-
>  1 file changed, 139 insertions(+), 108 deletions(-)
> 
> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> index 2b8734f75a09..e181359adadf 100644
> --- a/arch/arm64/kvm/sys_regs.c
> +++ b/arch/arm64/kvm/sys_regs.c
> @@ -182,99 +182,161 @@ const struct el2_sysreg_map *find_el2_sysreg(const 
> struct el2_sysreg_map *map,
>   return entry;
>  }
>  
> +static bool __vcpu_read_sys_reg_from_cpu(int reg, u64 *val)
> +{
> + /*
> +  * System registers listed in the switch are not saved on every
> +  * exit from the guest but are only saved on vcpu_put.
> +  *
> +  * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
> +  * should never be listed below, because the guest cannot modify its
> +  * own MPIDR_EL1 and MPIDR_EL1 is accessed for VCPU A from VCPU B's
> +  * thread when emulating cross-VCPU communication.
> +  */
> + switch (reg) {
> + case CSSELR_EL1:*val = read_sysreg_s(SYS_CSSELR_EL1);   break;
> + case SCTLR_EL1: *val = read_sysreg_s(SYS_SCTLR_EL12);   break;
> + case ACTLR_EL1: *val = read_sysreg_s(SYS_ACTLR_EL1);break;
> + case CPACR_EL1: *val = read_sysreg_s(SYS_CPACR_EL12);   break;
> + case TTBR0_EL1: *val = read_sysreg_s(SYS_TTBR0_EL12);   break;
> + case TTBR1_EL1: *val = read_sysreg_s(SYS_TTBR1_EL12);   break;
> + case TCR_EL1:   *val = read_sysreg_s(SYS_TCR_EL12); break;
> + case ESR_EL1:   *val = read_sysreg_s(SYS_ESR_EL12); break;
> + case AFSR0_EL1: *val = read_sysreg_s(SYS_AFSR0_EL12);   break;
> + case AFSR1_EL1: *val = read_sysreg_s(SYS_AFSR1_EL12);   break;
> + case FAR_EL1:   *val = read_sysreg_s(SYS_FAR_EL12); break;
> + case MAIR_EL1:  *val = read_sysreg_s(SYS_MAIR_EL12);break;
> + case VBAR_EL1:  *val = read_sysreg_s(SYS_VBAR_EL12);break;
> + case CONTEXTIDR_EL1:*val = read_sysreg_s(SYS_CONTEXTIDR_EL12);break;
> + case TPIDR_EL0: *val = read_sysreg_s(SYS_TPIDR_EL0);break;
> + case TPIDRRO_EL0:   *val = read_sysreg_s(SYS_TPIDRRO_EL0);  break;
> + case TPIDR_EL1: *val = read_sysreg_s(SYS_TPIDR_EL1);break;
> + case AMAIR_EL1: *val = read_sysreg_s(SYS_AMAIR_EL12);   break;
> + case CNTKCTL_EL1:   *val = read_sysreg_s(SYS_CNTKCTL_EL12); break;
> + case PAR_EL1:   *val = read_sysreg_s(SYS_PAR_EL1);  break;
> + case DACR32_EL2:*val = read_sysreg_s(SYS_DACR32_EL2);   break;
> + case IFSR32_EL2:*val = read_sysreg_s(SYS_IFSR32_EL2);   break;
> + case DBGVCR32_EL2:  *val = read_sysreg_s(SYS_DBGVCR32_EL2); break;
> + default:return false;
> + }
> +
> + return true;
> +}
> +
> +static bool __vcpu_write_sys_reg_to_cpu(u64 val, int reg)
> +{
> + /*
> +  * System registers listed in the switch are not restored on every
> +  * entry to the guest but are only restored on vcpu_load.
> +  *
> +  * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
> +  * should never be listed below, because the the MPIDR should only be
> +  * set once, before running the VCPU, and never changed later.
> +  */
> + switch (reg) {
> + case CSSELR_EL1:write_sysreg_s(val, SYS_CSSELR_EL1);break;
> + case SCTLR_EL1: write_sysreg_s(val, SYS_SCTLR_EL12);break;
> + case ACTLR_EL1: write_sysreg_s(val, SYS_ACTLR_EL1); break;
> + case CPACR_EL1: write_sysreg_s(val, SYS_CPACR_EL12);break;
> + case TTBR0_EL1: write_sysreg_s(val, SYS_TTBR0_EL12);break;
> + case TTBR1_EL1: write_sysreg_s(val, SYS_TTBR1_EL12);break;
> + case TCR_EL1:   write_sysreg_s(val, SYS_TCR_EL12);  break;
> + case ESR_EL1:   write_sysreg_s(val, SYS_ESR_EL12);  break;
> + case AFSR0_EL1: write_sysreg_s(val, SYS_AFSR0_EL12);break;
> + case AFSR1_EL1: write_sysreg_s(val, SYS_AFSR1_EL12);break;
> + case FAR_EL1:   write_sysreg_s(val, SYS_FAR_EL12);  break;
> + case MAIR_EL1:  write_sysreg_s(val, SYS_MAIR_EL12); break;
> + case VBAR_EL1:  write_sysreg_s(val, SYS_VBAR_EL12); break;
> + case CONTEXTIDR_EL1:write_sysreg_s(val, SYS_CONTEXTIDR_EL12);break;
> + case TPIDR_EL0: write_sysreg_s(val, SYS_TPIDR_EL0); break;
> + case TPIDRRO_EL0:   write_sysreg_s(val, SYS_TPIDRRO_EL0);   break;
> + case TPIDR_EL1: write_sysreg_s(val, SYS_TPIDR_EL1); break;
> + case AMAIR_EL1: write_sysreg_s(val, SYS_AMAIR_EL12);break;
> + case CNTKCTL_EL1:   write_s

Re: [PATCH 15/59] KVM: arm64: nv: Refactor vcpu_{read,write}_sys_reg

2019-06-27 Thread Alexandru Elisei
On 6/21/19 10:37 AM, Marc Zyngier wrote:
> Extract the direct HW accessors for later reuse.
>
> Signed-off-by: Marc Zyngier 
> ---
>  arch/arm64/kvm/sys_regs.c | 247 +-
>  1 file changed, 139 insertions(+), 108 deletions(-)
>
> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> index 2b8734f75a09..e181359adadf 100644
> --- a/arch/arm64/kvm/sys_regs.c
> +++ b/arch/arm64/kvm/sys_regs.c
> @@ -182,99 +182,161 @@ const struct el2_sysreg_map *find_el2_sysreg(const 
> struct el2_sysreg_map *map,
>   return entry;
>  }
>  
> +static bool __vcpu_read_sys_reg_from_cpu(int reg, u64 *val)
> +{
> + /*
> +  * System registers listed in the switch are not saved on every
> +  * exit from the guest but are only saved on vcpu_put.
> +  *
> +  * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
> +  * should never be listed below, because the guest cannot modify its
> +  * own MPIDR_EL1 and MPIDR_EL1 is accessed for VCPU A from VCPU B's
> +  * thread when emulating cross-VCPU communication.
> +  */
> + switch (reg) {
> + case CSSELR_EL1:*val = read_sysreg_s(SYS_CSSELR_EL1);   break;
> + case SCTLR_EL1: *val = read_sysreg_s(SYS_SCTLR_EL12);   break;
> + case ACTLR_EL1: *val = read_sysreg_s(SYS_ACTLR_EL1);break;
> + case CPACR_EL1: *val = read_sysreg_s(SYS_CPACR_EL12);   break;
> + case TTBR0_EL1: *val = read_sysreg_s(SYS_TTBR0_EL12);   break;
> + case TTBR1_EL1: *val = read_sysreg_s(SYS_TTBR1_EL12);   break;
> + case TCR_EL1:   *val = read_sysreg_s(SYS_TCR_EL12); break;
> + case ESR_EL1:   *val = read_sysreg_s(SYS_ESR_EL12); break;
> + case AFSR0_EL1: *val = read_sysreg_s(SYS_AFSR0_EL12);   break;
> + case AFSR1_EL1: *val = read_sysreg_s(SYS_AFSR1_EL12);   break;
> + case FAR_EL1:   *val = read_sysreg_s(SYS_FAR_EL12); break;
> + case MAIR_EL1:  *val = read_sysreg_s(SYS_MAIR_EL12);break;
> + case VBAR_EL1:  *val = read_sysreg_s(SYS_VBAR_EL12);break;
> + case CONTEXTIDR_EL1:*val = read_sysreg_s(SYS_CONTEXTIDR_EL12);break;
> + case TPIDR_EL0: *val = read_sysreg_s(SYS_TPIDR_EL0);break;
> + case TPIDRRO_EL0:   *val = read_sysreg_s(SYS_TPIDRRO_EL0);  break;
> + case TPIDR_EL1: *val = read_sysreg_s(SYS_TPIDR_EL1);break;
> + case AMAIR_EL1: *val = read_sysreg_s(SYS_AMAIR_EL12);   break;
> + case CNTKCTL_EL1:   *val = read_sysreg_s(SYS_CNTKCTL_EL12); break;
> + case PAR_EL1:   *val = read_sysreg_s(SYS_PAR_EL1);  break;
> + case DACR32_EL2:*val = read_sysreg_s(SYS_DACR32_EL2);   break;
> + case IFSR32_EL2:*val = read_sysreg_s(SYS_IFSR32_EL2);   break;
> + case DBGVCR32_EL2:  *val = read_sysreg_s(SYS_DBGVCR32_EL2); break;
> + default:return false;
> + }
> +
> + return true;
> +}
> +
> +static bool __vcpu_write_sys_reg_to_cpu(u64 val, int reg)
> +{
> + /*
> +  * System registers listed in the switch are not restored on every
> +  * entry to the guest but are only restored on vcpu_load.
> +  *
> +  * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
> +  * should never be listed below, because the the MPIDR should only be
> +  * set once, before running the VCPU, and never changed later.
> +  */
> + switch (reg) {
> + case CSSELR_EL1:write_sysreg_s(val, SYS_CSSELR_EL1);break;
> + case SCTLR_EL1: write_sysreg_s(val, SYS_SCTLR_EL12);break;
> + case ACTLR_EL1: write_sysreg_s(val, SYS_ACTLR_EL1); break;
> + case CPACR_EL1: write_sysreg_s(val, SYS_CPACR_EL12);break;
> + case TTBR0_EL1: write_sysreg_s(val, SYS_TTBR0_EL12);break;
> + case TTBR1_EL1: write_sysreg_s(val, SYS_TTBR1_EL12);break;
> + case TCR_EL1:   write_sysreg_s(val, SYS_TCR_EL12);  break;
> + case ESR_EL1:   write_sysreg_s(val, SYS_ESR_EL12);  break;
> + case AFSR0_EL1: write_sysreg_s(val, SYS_AFSR0_EL12);break;
> + case AFSR1_EL1: write_sysreg_s(val, SYS_AFSR1_EL12);break;
> + case FAR_EL1:   write_sysreg_s(val, SYS_FAR_EL12);  break;
> + case MAIR_EL1:  write_sysreg_s(val, SYS_MAIR_EL12); break;
> + case VBAR_EL1:  write_sysreg_s(val, SYS_VBAR_EL12); break;
> + case CONTEXTIDR_EL1:write_sysreg_s(val, SYS_CONTEXTIDR_EL12);break;
> + case TPIDR_EL0: write_sysreg_s(val, SYS_TPIDR_EL0); break;
> + case TPIDRRO_EL0:   write_sysreg_s(val, SYS_TPIDRRO_EL0);   break;
> + case TPIDR_EL1: write_sysreg_s(val, SYS_TPIDR_EL1); break;
> + case AMAIR_EL1: write_sysreg_s(val, SYS_AMAIR_EL12);break;
> + case CNTKCTL_EL1:   write_sysreg_s(

Re: [PATCH 15/59] KVM: arm64: nv: Refactor vcpu_{read,write}_sys_reg

2019-07-03 Thread Marc Zyngier
On 24/06/2019 16:07, Julien Thierry wrote:
> 
> 
> On 06/21/2019 10:37 AM, Marc Zyngier wrote:
>> Extract the direct HW accessors for later reuse.
>>
>> Signed-off-by: Marc Zyngier 
>> ---
>>  arch/arm64/kvm/sys_regs.c | 247 +-
>>  1 file changed, 139 insertions(+), 108 deletions(-)
>>
>> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
>> index 2b8734f75a09..e181359adadf 100644
>> --- a/arch/arm64/kvm/sys_regs.c
>> +++ b/arch/arm64/kvm/sys_regs.c
>> @@ -182,99 +182,161 @@ const struct el2_sysreg_map *find_el2_sysreg(const 
>> struct el2_sysreg_map *map,
>>  return entry;
>>  }
>>  
>> +static bool __vcpu_read_sys_reg_from_cpu(int reg, u64 *val)
>> +{
>> +/*
>> + * System registers listed in the switch are not saved on every
>> + * exit from the guest but are only saved on vcpu_put.
>> + *
>> + * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
>> + * should never be listed below, because the guest cannot modify its
>> + * own MPIDR_EL1 and MPIDR_EL1 is accessed for VCPU A from VCPU B's
>> + * thread when emulating cross-VCPU communication.
>> + */
>> +switch (reg) {
>> +case CSSELR_EL1:*val = read_sysreg_s(SYS_CSSELR_EL1);   break;
>> +case SCTLR_EL1: *val = read_sysreg_s(SYS_SCTLR_EL12);   break;
>> +case ACTLR_EL1: *val = read_sysreg_s(SYS_ACTLR_EL1);break;
>> +case CPACR_EL1: *val = read_sysreg_s(SYS_CPACR_EL12);   break;
>> +case TTBR0_EL1: *val = read_sysreg_s(SYS_TTBR0_EL12);   break;
>> +case TTBR1_EL1: *val = read_sysreg_s(SYS_TTBR1_EL12);   break;
>> +case TCR_EL1:   *val = read_sysreg_s(SYS_TCR_EL12); break;
>> +case ESR_EL1:   *val = read_sysreg_s(SYS_ESR_EL12); break;
>> +case AFSR0_EL1: *val = read_sysreg_s(SYS_AFSR0_EL12);   break;
>> +case AFSR1_EL1: *val = read_sysreg_s(SYS_AFSR1_EL12);   break;
>> +case FAR_EL1:   *val = read_sysreg_s(SYS_FAR_EL12); break;
>> +case MAIR_EL1:  *val = read_sysreg_s(SYS_MAIR_EL12);break;
>> +case VBAR_EL1:  *val = read_sysreg_s(SYS_VBAR_EL12);break;
>> +case CONTEXTIDR_EL1:*val = read_sysreg_s(SYS_CONTEXTIDR_EL12);break;
>> +case TPIDR_EL0: *val = read_sysreg_s(SYS_TPIDR_EL0);break;
>> +case TPIDRRO_EL0:   *val = read_sysreg_s(SYS_TPIDRRO_EL0);  break;
>> +case TPIDR_EL1: *val = read_sysreg_s(SYS_TPIDR_EL1);break;
>> +case AMAIR_EL1: *val = read_sysreg_s(SYS_AMAIR_EL12);   break;
>> +case CNTKCTL_EL1:   *val = read_sysreg_s(SYS_CNTKCTL_EL12); break;
>> +case PAR_EL1:   *val = read_sysreg_s(SYS_PAR_EL1);  break;
>> +case DACR32_EL2:*val = read_sysreg_s(SYS_DACR32_EL2);   break;
>> +case IFSR32_EL2:*val = read_sysreg_s(SYS_IFSR32_EL2);   break;
>> +case DBGVCR32_EL2:  *val = read_sysreg_s(SYS_DBGVCR32_EL2); break;
>> +default:return false;
>> +}
>> +
>> +return true;
>> +}
>> +
>> +static bool __vcpu_write_sys_reg_to_cpu(u64 val, int reg)
>> +{
>> +/*
>> + * System registers listed in the switch are not restored on every
>> + * entry to the guest but are only restored on vcpu_load.
>> + *
>> + * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
>> + * should never be listed below, because the the MPIDR should only be
>> + * set once, before running the VCPU, and never changed later.
>> + */
>> +switch (reg) {
>> +case CSSELR_EL1:write_sysreg_s(val, SYS_CSSELR_EL1);break;
>> +case SCTLR_EL1: write_sysreg_s(val, SYS_SCTLR_EL12);break;
>> +case ACTLR_EL1: write_sysreg_s(val, SYS_ACTLR_EL1); break;
>> +case CPACR_EL1: write_sysreg_s(val, SYS_CPACR_EL12);break;
>> +case TTBR0_EL1: write_sysreg_s(val, SYS_TTBR0_EL12);break;
>> +case TTBR1_EL1: write_sysreg_s(val, SYS_TTBR1_EL12);break;
>> +case TCR_EL1:   write_sysreg_s(val, SYS_TCR_EL12);  break;
>> +case ESR_EL1:   write_sysreg_s(val, SYS_ESR_EL12);  break;
>> +case AFSR0_EL1: write_sysreg_s(val, SYS_AFSR0_EL12);break;
>> +case AFSR1_EL1: write_sysreg_s(val, SYS_AFSR1_EL12);break;
>> +case FAR_EL1:   write_sysreg_s(val, SYS_FAR_EL12);  break;
>> +case MAIR_EL1:  write_sysreg_s(val, SYS_MAIR_EL12); break;
>> +case VBAR_EL1:  write_sysreg_s(val, SYS_VBAR_EL12); break;
>> +case CONTEXTIDR_EL1:write_sysreg_s(val, SYS_CONTEXTIDR_EL12);break;
>> +case TPIDR_EL0: write_sysreg_s(val, SYS_TPIDR_EL0); break;
>> +case TPIDRRO_EL0:   write_sysreg_s(val, SYS_TPIDRRO_EL0);   break;
>> +case TPIDR_EL1: write_sysreg_s(val, SYS_TPIDR_EL1); break;
>> +case AMAIR_EL1: write_sysreg_s(val

Re: [PATCH 15/59] KVM: arm64: nv: Refactor vcpu_{read,write}_sys_reg

2019-07-04 Thread Marc Zyngier
On 27/06/2019 10:21, Alexandru Elisei wrote:
> On 6/21/19 10:37 AM, Marc Zyngier wrote:
>> Extract the direct HW accessors for later reuse.
>>
>> Signed-off-by: Marc Zyngier 
>> ---
>>  arch/arm64/kvm/sys_regs.c | 247 +-
>>  1 file changed, 139 insertions(+), 108 deletions(-)
>>
>> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
>> index 2b8734f75a09..e181359adadf 100644
>> --- a/arch/arm64/kvm/sys_regs.c
>> +++ b/arch/arm64/kvm/sys_regs.c
>> @@ -182,99 +182,161 @@ const struct el2_sysreg_map *find_el2_sysreg(const 
>> struct el2_sysreg_map *map,
>>  return entry;
>>  }
>>  
>> +static bool __vcpu_read_sys_reg_from_cpu(int reg, u64 *val)
>> +{
>> +/*
>> + * System registers listed in the switch are not saved on every
>> + * exit from the guest but are only saved on vcpu_put.
>> + *
>> + * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
>> + * should never be listed below, because the guest cannot modify its
>> + * own MPIDR_EL1 and MPIDR_EL1 is accessed for VCPU A from VCPU B's
>> + * thread when emulating cross-VCPU communication.
>> + */
>> +switch (reg) {
>> +case CSSELR_EL1:*val = read_sysreg_s(SYS_CSSELR_EL1);   break;
>> +case SCTLR_EL1: *val = read_sysreg_s(SYS_SCTLR_EL12);   break;
>> +case ACTLR_EL1: *val = read_sysreg_s(SYS_ACTLR_EL1);break;
>> +case CPACR_EL1: *val = read_sysreg_s(SYS_CPACR_EL12);   break;
>> +case TTBR0_EL1: *val = read_sysreg_s(SYS_TTBR0_EL12);   break;
>> +case TTBR1_EL1: *val = read_sysreg_s(SYS_TTBR1_EL12);   break;
>> +case TCR_EL1:   *val = read_sysreg_s(SYS_TCR_EL12); break;
>> +case ESR_EL1:   *val = read_sysreg_s(SYS_ESR_EL12); break;
>> +case AFSR0_EL1: *val = read_sysreg_s(SYS_AFSR0_EL12);   break;
>> +case AFSR1_EL1: *val = read_sysreg_s(SYS_AFSR1_EL12);   break;
>> +case FAR_EL1:   *val = read_sysreg_s(SYS_FAR_EL12); break;
>> +case MAIR_EL1:  *val = read_sysreg_s(SYS_MAIR_EL12);break;
>> +case VBAR_EL1:  *val = read_sysreg_s(SYS_VBAR_EL12);break;
>> +case CONTEXTIDR_EL1:*val = read_sysreg_s(SYS_CONTEXTIDR_EL12);break;
>> +case TPIDR_EL0: *val = read_sysreg_s(SYS_TPIDR_EL0);break;
>> +case TPIDRRO_EL0:   *val = read_sysreg_s(SYS_TPIDRRO_EL0);  break;
>> +case TPIDR_EL1: *val = read_sysreg_s(SYS_TPIDR_EL1);break;
>> +case AMAIR_EL1: *val = read_sysreg_s(SYS_AMAIR_EL12);   break;
>> +case CNTKCTL_EL1:   *val = read_sysreg_s(SYS_CNTKCTL_EL12); break;
>> +case PAR_EL1:   *val = read_sysreg_s(SYS_PAR_EL1);  break;
>> +case DACR32_EL2:*val = read_sysreg_s(SYS_DACR32_EL2);   break;
>> +case IFSR32_EL2:*val = read_sysreg_s(SYS_IFSR32_EL2);   break;
>> +case DBGVCR32_EL2:  *val = read_sysreg_s(SYS_DBGVCR32_EL2); break;
>> +default:return false;
>> +}
>> +
>> +return true;
>> +}
>> +
>> +static bool __vcpu_write_sys_reg_to_cpu(u64 val, int reg)
>> +{
>> +/*
>> + * System registers listed in the switch are not restored on every
>> + * entry to the guest but are only restored on vcpu_load.
>> + *
>> + * Note that MPIDR_EL1 for the guest is set by KVM via VMPIDR_EL2 but
>> + * should never be listed below, because the the MPIDR should only be
>> + * set once, before running the VCPU, and never changed later.
>> + */
>> +switch (reg) {
>> +case CSSELR_EL1:write_sysreg_s(val, SYS_CSSELR_EL1);break;
>> +case SCTLR_EL1: write_sysreg_s(val, SYS_SCTLR_EL12);break;
>> +case ACTLR_EL1: write_sysreg_s(val, SYS_ACTLR_EL1); break;
>> +case CPACR_EL1: write_sysreg_s(val, SYS_CPACR_EL12);break;
>> +case TTBR0_EL1: write_sysreg_s(val, SYS_TTBR0_EL12);break;
>> +case TTBR1_EL1: write_sysreg_s(val, SYS_TTBR1_EL12);break;
>> +case TCR_EL1:   write_sysreg_s(val, SYS_TCR_EL12);  break;
>> +case ESR_EL1:   write_sysreg_s(val, SYS_ESR_EL12);  break;
>> +case AFSR0_EL1: write_sysreg_s(val, SYS_AFSR0_EL12);break;
>> +case AFSR1_EL1: write_sysreg_s(val, SYS_AFSR1_EL12);break;
>> +case FAR_EL1:   write_sysreg_s(val, SYS_FAR_EL12);  break;
>> +case MAIR_EL1:  write_sysreg_s(val, SYS_MAIR_EL12); break;
>> +case VBAR_EL1:  write_sysreg_s(val, SYS_VBAR_EL12); break;
>> +case CONTEXTIDR_EL1:write_sysreg_s(val, SYS_CONTEXTIDR_EL12);break;
>> +case TPIDR_EL0: write_sysreg_s(val, SYS_TPIDR_EL0); break;
>> +case TPIDRRO_EL0:   write_sysreg_s(val, SYS_TPIDRRO_EL0);   break;
>> +case TPIDR_EL1: write_sysreg_s(val, SYS_TPIDR_EL1); break;
>> +case AMAIR_EL1: write_sysreg_s(val, SYS_A