Path: blob/master/tools/testing/selftests/kvm/lib/s390/processor.c
49944 views
// SPDX-License-Identifier: GPL-2.0-only1/*2* KVM selftest s390x library code - CPU-related functions (page tables...)3*4* Copyright (C) 2019, Red Hat, Inc.5*/67#include "processor.h"8#include "kvm_util.h"910#define PAGES_PER_REGION 41112void virt_arch_pgd_alloc(struct kvm_vm *vm)13{14vm_paddr_t paddr;1516TEST_ASSERT(vm->page_size == PAGE_SIZE, "Unsupported page size: 0x%x",17vm->page_size);1819if (vm->pgd_created)20return;2122paddr = vm_phy_pages_alloc(vm, PAGES_PER_REGION,23KVM_GUEST_PAGE_TABLE_MIN_PADDR,24vm->memslots[MEM_REGION_PT]);25memset(addr_gpa2hva(vm, paddr), 0xff, PAGES_PER_REGION * vm->page_size);2627vm->pgd = paddr;28vm->pgd_created = true;29}3031/*32* Allocate 4 pages for a region/segment table (ri < 4), or one page for33* a page table (ri == 4). Returns a suitable region/segment table entry34* which points to the freshly allocated pages.35*/36static uint64_t virt_alloc_region(struct kvm_vm *vm, int ri)37{38uint64_t taddr;3940taddr = vm_phy_pages_alloc(vm, ri < 4 ? PAGES_PER_REGION : 1,41KVM_GUEST_PAGE_TABLE_MIN_PADDR, 0);42memset(addr_gpa2hva(vm, taddr), 0xff, PAGES_PER_REGION * vm->page_size);4344return (taddr & REGION_ENTRY_ORIGIN)45| (((4 - ri) << 2) & REGION_ENTRY_TYPE)46| ((ri < 4 ? (PAGES_PER_REGION - 1) : 0) & REGION_ENTRY_LENGTH);47}4849void virt_arch_pg_map(struct kvm_vm *vm, uint64_t gva, uint64_t gpa)50{51int ri, idx;52uint64_t *entry;5354TEST_ASSERT((gva % vm->page_size) == 0,55"Virtual address not on page boundary,\n"56" vaddr: 0x%lx vm->page_size: 0x%x",57gva, vm->page_size);58TEST_ASSERT(sparsebit_is_set(vm->vpages_valid,59(gva >> vm->page_shift)),60"Invalid virtual address, vaddr: 0x%lx",61gva);62TEST_ASSERT((gpa % vm->page_size) == 0,63"Physical address not on page boundary,\n"64" paddr: 0x%lx vm->page_size: 0x%x",65gva, vm->page_size);66TEST_ASSERT((gpa >> vm->page_shift) <= vm->max_gfn,67"Physical address beyond beyond maximum supported,\n"68" paddr: 0x%lx vm->max_gfn: 0x%lx vm->page_size: 0x%x",69gva, vm->max_gfn, vm->page_size);7071/* Walk through region and segment tables */72entry = addr_gpa2hva(vm, vm->pgd);73for (ri = 1; ri <= 4; ri++) {74idx = (gva >> (64 - 11 * ri)) & 0x7ffu;75if (entry[idx] & REGION_ENTRY_INVALID)76entry[idx] = virt_alloc_region(vm, ri);77entry = addr_gpa2hva(vm, entry[idx] & REGION_ENTRY_ORIGIN);78}7980/* Fill in page table entry */81idx = (gva >> PAGE_SHIFT) & 0x0ffu; /* page index */82if (!(entry[idx] & PAGE_INVALID))83fprintf(stderr,84"WARNING: PTE for gpa=0x%"PRIx64" already set!\n", gpa);85entry[idx] = gpa;86}8788vm_paddr_t addr_arch_gva2gpa(struct kvm_vm *vm, vm_vaddr_t gva)89{90int ri, idx;91uint64_t *entry;9293TEST_ASSERT(vm->page_size == PAGE_SIZE, "Unsupported page size: 0x%x",94vm->page_size);9596entry = addr_gpa2hva(vm, vm->pgd);97for (ri = 1; ri <= 4; ri++) {98idx = (gva >> (64 - 11 * ri)) & 0x7ffu;99TEST_ASSERT(!(entry[idx] & REGION_ENTRY_INVALID),100"No region mapping for vm virtual address 0x%lx",101gva);102entry = addr_gpa2hva(vm, entry[idx] & REGION_ENTRY_ORIGIN);103}104105idx = (gva >> PAGE_SHIFT) & 0x0ffu; /* page index */106107TEST_ASSERT(!(entry[idx] & PAGE_INVALID),108"No page mapping for vm virtual address 0x%lx", gva);109110return (entry[idx] & ~0xffful) + (gva & 0xffful);111}112113static void virt_dump_ptes(FILE *stream, struct kvm_vm *vm, uint8_t indent,114uint64_t ptea_start)115{116uint64_t *pte, ptea;117118for (ptea = ptea_start; ptea < ptea_start + 0x100 * 8; ptea += 8) {119pte = addr_gpa2hva(vm, ptea);120if (*pte & PAGE_INVALID)121continue;122fprintf(stream, "%*spte @ 0x%lx: 0x%016lx\n",123indent, "", ptea, *pte);124}125}126127static void virt_dump_region(FILE *stream, struct kvm_vm *vm, uint8_t indent,128uint64_t reg_tab_addr)129{130uint64_t addr, *entry;131132for (addr = reg_tab_addr; addr < reg_tab_addr + 0x400 * 8; addr += 8) {133entry = addr_gpa2hva(vm, addr);134if (*entry & REGION_ENTRY_INVALID)135continue;136fprintf(stream, "%*srt%lde @ 0x%lx: 0x%016lx\n",137indent, "", 4 - ((*entry & REGION_ENTRY_TYPE) >> 2),138addr, *entry);139if (*entry & REGION_ENTRY_TYPE) {140virt_dump_region(stream, vm, indent + 2,141*entry & REGION_ENTRY_ORIGIN);142} else {143virt_dump_ptes(stream, vm, indent + 2,144*entry & REGION_ENTRY_ORIGIN);145}146}147}148149void virt_arch_dump(FILE *stream, struct kvm_vm *vm, uint8_t indent)150{151if (!vm->pgd_created)152return;153154virt_dump_region(stream, vm, indent, vm->pgd);155}156157void vcpu_arch_set_entry_point(struct kvm_vcpu *vcpu, void *guest_code)158{159vcpu->run->psw_addr = (uintptr_t)guest_code;160}161162struct kvm_vcpu *vm_arch_vcpu_add(struct kvm_vm *vm, uint32_t vcpu_id)163{164size_t stack_size = DEFAULT_STACK_PGS * getpagesize();165uint64_t stack_vaddr;166struct kvm_regs regs;167struct kvm_sregs sregs;168struct kvm_vcpu *vcpu;169170TEST_ASSERT(vm->page_size == PAGE_SIZE, "Unsupported page size: 0x%x",171vm->page_size);172173stack_vaddr = __vm_vaddr_alloc(vm, stack_size,174DEFAULT_GUEST_STACK_VADDR_MIN,175MEM_REGION_DATA);176177vcpu = __vm_vcpu_add(vm, vcpu_id);178179/* Setup guest registers */180vcpu_regs_get(vcpu, ®s);181regs.gprs[15] = stack_vaddr + (DEFAULT_STACK_PGS * getpagesize()) - 160;182vcpu_regs_set(vcpu, ®s);183184vcpu_sregs_get(vcpu, &sregs);185sregs.crs[0] |= 0x00040000; /* Enable floating point regs */186sregs.crs[1] = vm->pgd | 0xf; /* Primary region table */187vcpu_sregs_set(vcpu, &sregs);188189vcpu->run->psw_mask = 0x0400000180000000ULL; /* DAT enabled + 64 bit mode */190191return vcpu;192}193194void vcpu_args_set(struct kvm_vcpu *vcpu, unsigned int num, ...)195{196va_list ap;197struct kvm_regs regs;198int i;199200TEST_ASSERT(num >= 1 && num <= 5, "Unsupported number of args,\n"201" num: %u",202num);203204va_start(ap, num);205vcpu_regs_get(vcpu, ®s);206207for (i = 0; i < num; i++)208regs.gprs[i + 2] = va_arg(ap, uint64_t);209210vcpu_regs_set(vcpu, ®s);211va_end(ap);212}213214void vcpu_arch_dump(FILE *stream, struct kvm_vcpu *vcpu, uint8_t indent)215{216fprintf(stream, "%*spstate: psw: 0x%.16llx:0x%.16llx\n",217indent, "", vcpu->run->psw_mask, vcpu->run->psw_addr);218}219220void assert_on_unhandled_exception(struct kvm_vcpu *vcpu)221{222}223224bool kvm_arch_has_default_irqchip(void)225{226return true;227}228229230