Unverified Commit eef4bcd9 authored by openeuler-ci-bot's avatar openeuler-ci-bot Committed by Gitee
Browse files

!5769 Revert "KVM: arm64: Disable MPAM visibility by default, and handle traps"

parents 50ddb5ec 6de6ddf6
Loading
Loading
Loading
Loading
+14 −60
Original line number Diff line number Diff line
@@ -411,29 +411,21 @@ static bool trap_oslar_el1(struct kvm_vcpu *vcpu,
	return true;
}

static bool trap_mpam(struct kvm_vcpu *vcpu,
static bool workaround_bad_mpam_abi(struct kvm_vcpu *vcpu,
				    struct sys_reg_params *p,
				    const struct sys_reg_desc *r)
{
	u64 aa64pfr0_el1 = IDREG(vcpu->kvm, SYS_ID_AA64PFR0_EL1);

	/*
	 * What did we expose to the guest?
	 * Earlier guests may have seen the ID bits, which can't be removed
	 * without breaking migration, but MPAMIDR_EL1 can advertise all-zeroes,
	 * indicating there are zero PARTID/PMG supported by the CPU, allowing
	 * the other two trapped registers (MPAM1_EL1 and MPAM0_EL1) to be
	 * treated as RAZ/WI.
	 * The ID register can't be removed without breaking migration,
	 * but MPAMIDR_EL1 can advertise all-zeroes, indicating there are zero
	 * PARTID/PMG supported by the CPU, allowing the other two trapped
	 * registers (MPAM1_EL1 and MPAM0_EL1) to be treated as RAZ/WI.
	 * Emulating MPAM1_EL1 as RAZ/WI means the guest sees the MPAMEN bit
	 * as clear, and realises MPAM isn't usable on this CPU.
	 */
	if (FIELD_GET(ID_AA64PFR0_EL1_MPAM_MASK, aa64pfr0_el1)) {
	p->regval = 0;
		return true;
	}

	kvm_inject_undefined(vcpu);
	return false;
	return true;
}

static bool trap_oslsr_el1(struct kvm_vcpu *vcpu,
@@ -1253,36 +1245,6 @@ static s64 kvm_arm64_ftr_safe_value(u32 id, const struct arm64_ftr_bits *ftrp,
	return arm64_ftr_safe_value(&kvm_ftr, new, cur);
}

static u64 kvm_arm64_ftr_max(struct kvm_vcpu *vcpu,
			     const struct sys_reg_desc *rd)
{
	u64 pfr0, val = rd->reset(vcpu, rd);
	u32 field, id = reg_to_encoding(rd);

	/*
	 * Some values may reset to a lower value than can be supported,
	 * get the maximum feature value.
	 */
	switch (id) {
	case SYS_ID_AA64PFR0_EL1:
		pfr0 = read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1);

		/*
		 * MPAM resets to 0, but migration of MPAM=1 guests is needed.
		 * See trap_mpam() for more.
		 */
		field = cpuid_feature_extract_unsigned_field(pfr0, ID_AA64PFR0_EL1_MPAM_SHIFT);
		if (field == ID_AA64PFR0_EL1_MPAM_1) {
			val &= ~ID_AA64PFR0_EL1_MPAM_MASK;
			val |= FIELD_PREP(ID_AA64PFR0_EL1_MPAM_MASK, ID_AA64PFR0_EL1_MPAM_1);
		}

		break;
	}

	return val;
}

/**
 * arm64_check_features() - Check if a feature register value constitutes
 * a subset of features indicated by the idreg's KVM sanitised limit.
@@ -1303,7 +1265,8 @@ static int arm64_check_features(struct kvm_vcpu *vcpu,
	const struct arm64_ftr_bits *ftrp = NULL;
	u32 id = reg_to_encoding(rd);
	u64 writable_mask = rd->val;
	u64 limit, mask = 0;
	u64 limit = rd->reset(vcpu, rd);
	u64 mask = 0;

	/*
	 * Hidden and unallocated ID registers may not have a corresponding
@@ -1317,7 +1280,6 @@ static int arm64_check_features(struct kvm_vcpu *vcpu,
	if (!ftr_reg)
		return -EINVAL;

	limit = kvm_arm64_ftr_max(vcpu, rd);
	ftrp = ftr_reg->ftr_bits;

	for (; ftrp && ftrp->width; ftrp++) {
@@ -1522,14 +1484,6 @@ static u64 read_sanitised_id_aa64pfr0_el1(struct kvm_vcpu *vcpu,

	val &= ~ID_AA64PFR0_EL1_AMU_MASK;

	/*
	 * MPAM is disabled by default as KVM also needs a set of PARTID to
	 * program the MPAMVPMx_EL2 PARTID remapping registers with. But some
	 * older kernels let the guest see the ID bit. Turning it on causes
	 * the registers to be emulated as RAZ/WI. See trap_mpam() for more.
	 */
	val &= ~ID_AA64PFR0_EL1_MPAM_MASK;

	return val;
}

@@ -2194,11 +2148,11 @@ static const struct sys_reg_desc sys_reg_descs[] = {
	{ SYS_DESC(SYS_LOREA_EL1), trap_loregion },
	{ SYS_DESC(SYS_LORN_EL1), trap_loregion },
	{ SYS_DESC(SYS_LORC_EL1), trap_loregion },
	{ SYS_DESC(SYS_MPAMIDR_EL1), trap_mpam },
	{ SYS_DESC(SYS_MPAMIDR_EL1), workaround_bad_mpam_abi },
	{ SYS_DESC(SYS_LORID_EL1), trap_loregion },

	{ SYS_DESC(SYS_MPAM1_EL1), trap_mpam },
	{ SYS_DESC(SYS_MPAM0_EL1), trap_mpam },
	{ SYS_DESC(SYS_MPAM1_EL1), workaround_bad_mpam_abi },
	{ SYS_DESC(SYS_MPAM0_EL1), workaround_bad_mpam_abi },
	{ SYS_DESC(SYS_VBAR_EL1), access_rw, reset_val, VBAR_EL1, 0 },
	{ SYS_DESC(SYS_DISR_EL1), NULL, reset_val, DISR_EL1, 0 },