From patchwork Tue May 30 19:46:23 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Henrique Barboza X-Patchwork-Id: 1787947 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=ventanamicro.com header.i=@ventanamicro.com header.a=rsa-sha256 header.s=google header.b=UJsF939T; dkim-atps=neutral Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4QW2z15byGz20Q4 for ; Wed, 31 May 2023 05:49:17 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1q45JY-0006ri-5Y; Tue, 30 May 2023 15:47:28 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1q45JV-0006qW-EY for qemu-devel@nongnu.org; Tue, 30 May 2023 15:47:25 -0400 Received: from mail-oa1-x30.google.com ([2001:4860:4864:20::30]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1q45JT-0004N4-I6 for qemu-devel@nongnu.org; Tue, 30 May 2023 15:47:25 -0400 Received: by mail-oa1-x30.google.com with SMTP id 586e51a60fabf-19edebe85adso4360481fac.2 for ; Tue, 30 May 2023 12:47:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ventanamicro.com; s=google; t=1685476042; x=1688068042; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=CrhzqizdTgnzqcguCNLILoS86odAFap96xtuLIlGjBs=; b=UJsF939TQoL/2clPmqmFLo8VziDSc1NGQD+siLVsM82DEI/4bd20XNn+vABDO9lKWw /VxYaisBeckJS4RcxmYIJJc9XHMWQtZGIagYJOPWIIDtfwnqDzaareM19yNwPzdrEUOW F5NfLqkI3M3ank8Ky/177ZP96vxiiYNLgp5yVbKk2IJ54VNfxYXWNGjFaK12OLAReDE2 CObKHT/LrTZKpkbBOwuqwpSQt3s1vJxAmQf6DyvuiixHC9RHLiNKdDfU2LWHXTitYBFZ 1eWXCyQujImW9KWi1WqPQx2P3TwoHjKkmVqAPMGXghTQJI4/bYfHEKTrtINLwq16YieM L0WA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685476042; x=1688068042; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=CrhzqizdTgnzqcguCNLILoS86odAFap96xtuLIlGjBs=; b=kTqPzu78APwEHbeHV7Yz4i9JLT1fWGo2bQmEDf9CU5V2Uy1o4lI2L+zpDZ2j5R12ZX TsR77PSrNiWUtE5pBwy1ZB1STmV50l/jwjVDQs2detnYOA+a5Z6gYxeJklfZPnc4TViA sVPCk7wqEahvD/X5IFVhLDoAPJA1z7rf6lEvA+b2ur4ByI6XwxIwnIHdjyLmlz5HvLPy dICSq0hyeZetLxekN1Xid/4MjgeWrbFfaxLaJ8OO7PCwCC8XO58N3fFn4kdk+uSHTc4b 3mm7mIaZ0U6FyUNt79a7z3r9k7lSv6oYAZnqckPDjWSW/5/LXE4QkBs5nEeQfGFg0ixd KPmg== X-Gm-Message-State: AC+VfDyqeBbfwp/sN+wtAm2qWE0PIhlg2n6xHBbJZqWuAWqM6zVEsHsq DBaBJKLTcWVcZHr4UlBhZOEqeczO4PfvON2g8MA= X-Google-Smtp-Source: ACHHUZ5ONwqJ+gVY3AxB551xaCjyVjsFHr5BE8pmRrcI60ZEW1z0XwQdMWDXDNSqBEmJUuNHybFtUQ== X-Received: by 2002:a05:6871:4044:b0:172:2d00:99f7 with SMTP id ky4-20020a056871404400b001722d0099f7mr2093104oab.20.1685476042287; Tue, 30 May 2023 12:47:22 -0700 (PDT) Received: from grind.dc1.ventanamicro.com (200-162-225-121.static-corp.ajato.com.br. [200.162.225.121]) by smtp.gmail.com with ESMTPSA id j3-20020a056870a48300b0019fa8728b05sm342214oal.39.2023.05.30.12.47.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 May 2023 12:47:21 -0700 (PDT) From: Daniel Henrique Barboza To: qemu-devel@nongnu.org Cc: qemu-riscv@nongnu.org, alistair.francis@wdc.com, bmeng@tinylab.org, liweiwei@iscas.ac.cn, zhiwei_liu@linux.alibaba.com, palmer@rivosinc.com, Daniel Henrique Barboza Subject: [PATCH 16/16] target/riscv/kvm.c: read/write (cbom|cboz)_blocksize in KVM Date: Tue, 30 May 2023 16:46:23 -0300 Message-Id: <20230530194623.272652-17-dbarboza@ventanamicro.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: <20230530194623.272652-1-dbarboza@ventanamicro.com> References: <20230530194623.272652-1-dbarboza@ventanamicro.com> MIME-Version: 1.0 Received-SPF: pass client-ip=2001:4860:4864:20::30; envelope-from=dbarboza@ventanamicro.com; helo=mail-oa1-x30.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org If we don't set a proper cbom_blocksize|cboz_blocksize in the FDT the Linux Kernel will fail to detect the availability of the CBOM/CBOZ extensions, regardless of the contents of the 'riscv,isa' DT prop. The FDT is being written using the cpu->cfg.cbom|z_blocksize attributes, so let's use them. We'll also expose them as user flags like it is already done with TCG. However, in contrast with what happens with TCG, the user is not able to set any value that is different from the 'host' value. And KVM can be harsh dealing with it: a ENOTSUPP can be thrown for the mere attempt of executing kvm_set_one_reg() for these 2 regs. We'll read the 'host' value and use it to set these values, regardless of user choice. If the user happened to chose a different value, error out. We'll also error out if we failed to read the block sizes. Signed-off-by: Daniel Henrique Barboza --- target/riscv/kvm.c | 94 +++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 92 insertions(+), 2 deletions(-) diff --git a/target/riscv/kvm.c b/target/riscv/kvm.c index 92b99fe261..7789d835e5 100644 --- a/target/riscv/kvm.c +++ b/target/riscv/kvm.c @@ -241,8 +241,16 @@ static void kvm_cpu_cfg_set(RISCVCPU *cpu, RISCVCPUMultiExtConfig *multi_ext, uint32_t val) { int cpu_cfg_offset = multi_ext->cpu_cfg_offset; - bool *ext_enabled = (void *)&cpu->cfg + cpu_cfg_offset; + uint16_t *blocksize; + bool *ext_enabled; + if (strstr(multi_ext->name, "blocksize")) { + blocksize = (void *)&cpu->cfg + cpu_cfg_offset; + *blocksize = val; + return; + } + + ext_enabled = (void *)&cpu->cfg + cpu_cfg_offset; *ext_enabled = val; } @@ -250,8 +258,15 @@ static uint32_t kvm_cpu_cfg_get(RISCVCPU *cpu, RISCVCPUMultiExtConfig *multi_ext) { int cpu_cfg_offset = multi_ext->cpu_cfg_offset; - bool *ext_enabled = (void *)&cpu->cfg + cpu_cfg_offset; + uint16_t *blocksize; + bool *ext_enabled; + if (strstr(multi_ext->name, "blocksize")) { + blocksize = (void *)&cpu->cfg + cpu_cfg_offset; + return *blocksize; + } + + ext_enabled = (void *)&cpu->cfg + cpu_cfg_offset; return *ext_enabled; } @@ -295,6 +310,33 @@ static void kvm_cpu_set_multi_ext_cfg(Object *obj, Visitor *v, kvm_cpu_cfg_set(cpu, multi_ext_cfg, value); } +/* + * We'll avoid extra complexity by always assuming this + * array order with cbom first. + */ +static RISCVCPUMultiExtConfig kvm_cbomz_blksize_cfgs[] = { + {.name = "cbom_blocksize", .cpu_cfg_offset = CPUCFG(cbom_blocksize), + .kvm_reg_id = KVM_REG_RISCV_CONFIG_REG(zicbom_block_size)}, + {.name = "cboz_blocksize", .cpu_cfg_offset = CPUCFG(cboz_blocksize), + .kvm_reg_id = KVM_REG_RISCV_CONFIG_REG(zicboz_block_size)}, +}; + +static void kvm_cpu_set_cbomz_blksize(Object *obj, Visitor *v, + const char *name, + void *opaque, Error **errp) +{ + RISCVCPUMultiExtConfig *cbomz_size_cfg = opaque; + RISCVCPU *cpu = RISCV_CPU(obj); + uint16_t value; + + if (!visit_type_uint16(v, name, &value, errp)) { + return; + } + + cbomz_size_cfg->user_set = true; + kvm_cpu_cfg_set(cpu, cbomz_size_cfg, value); +} + static void kvm_riscv_update_cpu_cfg_isa_ext(RISCVCPU *cpu, CPUState *cs) { CPURISCVState *env = &cpu->env; @@ -321,6 +363,45 @@ static void kvm_riscv_update_cpu_cfg_isa_ext(RISCVCPU *cpu, CPUState *cs) } } +static void kvm_riscv_finalize_features(RISCVCPU *cpu, CPUState *cs) +{ + CPURISCVState *env = &cpu->env; + uint64_t id, reg; + int i, ret; + + for (i = 0; i < ARRAY_SIZE(kvm_cbomz_blksize_cfgs); i++) { + RISCVCPUMultiExtConfig *cbomz_cfg = &kvm_cbomz_blksize_cfgs[i]; + uint64_t host_val; + + if ((i == 0 && !cpu->cfg.ext_icbom) || + (i == 1 && !cpu->cfg.ext_icboz)) { + continue; + } + + id = kvm_riscv_reg_id(env, KVM_REG_RISCV_CONFIG, + cbomz_cfg->kvm_reg_id); + + ret = kvm_get_one_reg(cs, id, &host_val); + if (ret != 0) { + error_report("Unable to read KVM reg val %s, error %d", + cbomz_cfg->name, ret); + exit(EXIT_FAILURE); + } + + if (cbomz_cfg->user_set) { + reg = kvm_cpu_cfg_get(cpu, cbomz_cfg); + if (reg != host_val) { + error_report("Unable to set %s to a different value than " + "the host (%lu)", + cbomz_cfg->name, host_val); + exit(EXIT_FAILURE); + } + } + + kvm_cpu_cfg_set(cpu, cbomz_cfg, host_val); + } +} + static void kvm_riscv_add_cpu_user_properties(Object *cpu_obj) { int i; @@ -344,6 +425,14 @@ static void kvm_riscv_add_cpu_user_properties(Object *cpu_obj) kvm_cpu_set_multi_ext_cfg, NULL, multi_cfg); } + + for (i = 0; i < ARRAY_SIZE(kvm_cbomz_blksize_cfgs); i++) { + RISCVCPUMultiExtConfig *cbomz_size_cfg = &kvm_cbomz_blksize_cfgs[i]; + + object_property_add(cpu_obj, cbomz_size_cfg->name, "uint16", + NULL, kvm_cpu_set_cbomz_blksize, + NULL, cbomz_size_cfg); + } } void kvm_riscv_isa_string_ext(RISCVCPU *cpu, char **isa_str, @@ -856,6 +945,7 @@ int kvm_arch_init_vcpu(CPUState *cs) kvm_riscv_update_cpu_misa_ext(cpu, cs); kvm_riscv_update_cpu_cfg_isa_ext(cpu, cs); + kvm_riscv_finalize_features(cpu, cs); return ret; }