Currently, the SBI extension handle is expected to return Linux error code. The top SBI layer converts the Linux error code to SBI specific error code that can be returned to guest invoking the SBI calls. This model works as long as SBI error codes have 1-to-1 mappings between them. However, that may not be true always. This patch attempts to disassociate both these error codes by allowing the SBI extension implementation to return SBI specific error codes as well. The extension will continue to return the Linux error specific code which will indicate any problem *with* the extension emulation while the SBI specific error will indicate the problem *of* the emulation. Reviewed-by: Anup Patel <anup@brainfault.org> Reviewed-by: Andrew Jones <ajones@ventanamicro.com> Suggested-by: Andrew Jones <ajones@ventanamicro.com> Signed-off-by: Atish Patra <atishp@rivosinc.com> Signed-off-by: Anup Patel <anup@brainfault.org>
171 lines
4.2 KiB
C
171 lines
4.2 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Copyright (c) 2021 Western Digital Corporation or its affiliates.
|
|
*
|
|
* Authors:
|
|
* Atish Patra <atish.patra@wdc.com>
|
|
*/
|
|
|
|
#include <linux/errno.h>
|
|
#include <linux/err.h>
|
|
#include <linux/kvm_host.h>
|
|
#include <asm/sbi.h>
|
|
#include <asm/kvm_vcpu_timer.h>
|
|
#include <asm/kvm_vcpu_sbi.h>
|
|
|
|
static int kvm_sbi_ext_time_handler(struct kvm_vcpu *vcpu, struct kvm_run *run,
|
|
struct kvm_vcpu_sbi_return *retdata)
|
|
{
|
|
struct kvm_cpu_context *cp = &vcpu->arch.guest_context;
|
|
u64 next_cycle;
|
|
|
|
if (cp->a6 != SBI_EXT_TIME_SET_TIMER) {
|
|
retdata->err_val = SBI_ERR_INVALID_PARAM;
|
|
return 0;
|
|
}
|
|
|
|
#if __riscv_xlen == 32
|
|
next_cycle = ((u64)cp->a1 << 32) | (u64)cp->a0;
|
|
#else
|
|
next_cycle = (u64)cp->a0;
|
|
#endif
|
|
kvm_riscv_vcpu_timer_next_event(vcpu, next_cycle);
|
|
|
|
return 0;
|
|
}
|
|
|
|
const struct kvm_vcpu_sbi_extension vcpu_sbi_ext_time = {
|
|
.extid_start = SBI_EXT_TIME,
|
|
.extid_end = SBI_EXT_TIME,
|
|
.handler = kvm_sbi_ext_time_handler,
|
|
};
|
|
|
|
static int kvm_sbi_ext_ipi_handler(struct kvm_vcpu *vcpu, struct kvm_run *run,
|
|
struct kvm_vcpu_sbi_return *retdata)
|
|
{
|
|
int ret = 0;
|
|
unsigned long i;
|
|
struct kvm_vcpu *tmp;
|
|
struct kvm_cpu_context *cp = &vcpu->arch.guest_context;
|
|
unsigned long hmask = cp->a0;
|
|
unsigned long hbase = cp->a1;
|
|
|
|
if (cp->a6 != SBI_EXT_IPI_SEND_IPI) {
|
|
retdata->err_val = SBI_ERR_INVALID_PARAM;
|
|
return 0;
|
|
}
|
|
|
|
kvm_for_each_vcpu(i, tmp, vcpu->kvm) {
|
|
if (hbase != -1UL) {
|
|
if (tmp->vcpu_id < hbase)
|
|
continue;
|
|
if (!(hmask & (1UL << (tmp->vcpu_id - hbase))))
|
|
continue;
|
|
}
|
|
ret = kvm_riscv_vcpu_set_interrupt(tmp, IRQ_VS_SOFT);
|
|
if (ret < 0)
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
const struct kvm_vcpu_sbi_extension vcpu_sbi_ext_ipi = {
|
|
.extid_start = SBI_EXT_IPI,
|
|
.extid_end = SBI_EXT_IPI,
|
|
.handler = kvm_sbi_ext_ipi_handler,
|
|
};
|
|
|
|
static int kvm_sbi_ext_rfence_handler(struct kvm_vcpu *vcpu, struct kvm_run *run,
|
|
struct kvm_vcpu_sbi_return *retdata)
|
|
{
|
|
struct kvm_cpu_context *cp = &vcpu->arch.guest_context;
|
|
unsigned long hmask = cp->a0;
|
|
unsigned long hbase = cp->a1;
|
|
unsigned long funcid = cp->a6;
|
|
|
|
switch (funcid) {
|
|
case SBI_EXT_RFENCE_REMOTE_FENCE_I:
|
|
kvm_riscv_fence_i(vcpu->kvm, hbase, hmask);
|
|
break;
|
|
case SBI_EXT_RFENCE_REMOTE_SFENCE_VMA:
|
|
if (cp->a2 == 0 && cp->a3 == 0)
|
|
kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase, hmask);
|
|
else
|
|
kvm_riscv_hfence_vvma_gva(vcpu->kvm, hbase, hmask,
|
|
cp->a2, cp->a3, PAGE_SHIFT);
|
|
break;
|
|
case SBI_EXT_RFENCE_REMOTE_SFENCE_VMA_ASID:
|
|
if (cp->a2 == 0 && cp->a3 == 0)
|
|
kvm_riscv_hfence_vvma_asid_all(vcpu->kvm,
|
|
hbase, hmask, cp->a4);
|
|
else
|
|
kvm_riscv_hfence_vvma_asid_gva(vcpu->kvm,
|
|
hbase, hmask,
|
|
cp->a2, cp->a3,
|
|
PAGE_SHIFT, cp->a4);
|
|
break;
|
|
case SBI_EXT_RFENCE_REMOTE_HFENCE_GVMA:
|
|
case SBI_EXT_RFENCE_REMOTE_HFENCE_GVMA_VMID:
|
|
case SBI_EXT_RFENCE_REMOTE_HFENCE_VVMA:
|
|
case SBI_EXT_RFENCE_REMOTE_HFENCE_VVMA_ASID:
|
|
/*
|
|
* Until nested virtualization is implemented, the
|
|
* SBI HFENCE calls should be treated as NOPs
|
|
*/
|
|
break;
|
|
default:
|
|
retdata->err_val = SBI_ERR_NOT_SUPPORTED;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const struct kvm_vcpu_sbi_extension vcpu_sbi_ext_rfence = {
|
|
.extid_start = SBI_EXT_RFENCE,
|
|
.extid_end = SBI_EXT_RFENCE,
|
|
.handler = kvm_sbi_ext_rfence_handler,
|
|
};
|
|
|
|
static int kvm_sbi_ext_srst_handler(struct kvm_vcpu *vcpu,
|
|
struct kvm_run *run,
|
|
struct kvm_vcpu_sbi_return *retdata)
|
|
{
|
|
struct kvm_cpu_context *cp = &vcpu->arch.guest_context;
|
|
unsigned long funcid = cp->a6;
|
|
u32 reason = cp->a1;
|
|
u32 type = cp->a0;
|
|
|
|
switch (funcid) {
|
|
case SBI_EXT_SRST_RESET:
|
|
switch (type) {
|
|
case SBI_SRST_RESET_TYPE_SHUTDOWN:
|
|
kvm_riscv_vcpu_sbi_system_reset(vcpu, run,
|
|
KVM_SYSTEM_EVENT_SHUTDOWN,
|
|
reason);
|
|
retdata->uexit = true;
|
|
break;
|
|
case SBI_SRST_RESET_TYPE_COLD_REBOOT:
|
|
case SBI_SRST_RESET_TYPE_WARM_REBOOT:
|
|
kvm_riscv_vcpu_sbi_system_reset(vcpu, run,
|
|
KVM_SYSTEM_EVENT_RESET,
|
|
reason);
|
|
retdata->uexit = true;
|
|
break;
|
|
default:
|
|
retdata->err_val = SBI_ERR_NOT_SUPPORTED;
|
|
}
|
|
break;
|
|
default:
|
|
retdata->err_val = SBI_ERR_NOT_SUPPORTED;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const struct kvm_vcpu_sbi_extension vcpu_sbi_ext_srst = {
|
|
.extid_start = SBI_EXT_SRST,
|
|
.extid_end = SBI_EXT_SRST,
|
|
.handler = kvm_sbi_ext_srst_handler,
|
|
};
|