Hi Zengruan, Given Marc and Will's thread[1] about a possible alternative way of handling this I won't do a thorough review as this might not be the best way of handling the underlying problem, but there's some comments below for you to consider. [1] http://lkml.kernel.org/r/b1d23a82d6a7caa79a99597fb83472be%40kernel.org On 16/01/2020 12:46, Zengruan Ye wrote: > Introduce a paravirtualization interface for KVM/arm64 to obtain the vCPU > that is currently running or not. > > The PV lock structure of the guest is allocated by user space. > > A hypercall interface is provided for the guest to interrogate the > hypervisor's support for this interface and the location of the shared > memory structures. > > Signed-off-by: Zengruan Ye <yezengruan@xxxxxxxxxx> > --- > Documentation/virt/kvm/arm/pvlock.rst | 68 +++++++++++++++++++++++++ > Documentation/virt/kvm/devices/vcpu.txt | 14 +++++ > 2 files changed, 82 insertions(+) > create mode 100644 Documentation/virt/kvm/arm/pvlock.rst > > diff --git a/Documentation/virt/kvm/arm/pvlock.rst b/Documentation/virt/kvm/arm/pvlock.rst > new file mode 100644 > index 000000000000..11776273c0a4 > --- /dev/null > +++ b/Documentation/virt/kvm/arm/pvlock.rst > @@ -0,0 +1,68 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +Paravirtualized lock support for arm64 > +====================================== > + > +KVM/arm64 provides some hypervisor service calls to support a paravirtualized > +guest obtaining whether the vCPU is currently running or not. > + > +Two new SMCCC compatible hypercalls are defined: NIT: As defined this is now only a single (multiplexed) hypercall. > +* ARM_SMCCC_VENDOR_HYP_KVM_PV_LOCK_FUNC_ID: 0x86000001 You appear to have changed the SMC32/SMC64 bit on the ID, so this is now a 32-bit SMC, but the calling convention below (returning an int64) seems to rely on the guest being 64-bit. Any reason for this change? Given the implementation doesn't accept 32-bit clients and the calling convention requires returning a 64-bit value for 64-bit guests this seems wrong to me. > + - KVM_PV_LOCK_FEATURES 0 > + - KVM_PV_LOCK_PREEMPTED 1 > + > +The existence of the PV_LOCK hypercall should be probed using the SMCCC 1.1 > +ARCH_FEATURES mechanism and the hypervisor should be KVM before calling it. > + > +KVM_PV_LOCK_FEATURES > + ============= ======== ========== > + Function ID: (uint32) 0x86000001 > + PV_call_id: (uint32) 0 > + Return value: (int64) NOT_SUPPORTED (-1) or SUCCESS (0) if the relevant > + PV-lock feature is supported by the hypervisor. > + ============= ======== ========== Because you are now multiplexing the two functions you've lost the parameter which previously was for "The function to query for support". Which makes this _FEATURES operation fairly pointless (you might as well just call KVM_PV_LOCK_PREEMPTED and handle the NOT_SUPPORTED error return). Steve > + > +KVM_PV_LOCK_PREEMPTED > + ============= ======== ========== > + Function ID: (uint32) 0x86000001 > + PV_call_id: (uint32) 1 > + Return value: (int64) IPA of the PV-lock data structure for this vCPU. > + On failure: > + NOT_SUPPORTED (-1) > + ============= ======== ========== > + > +The IPA returned by KVM_PV_LOCK_PREEMPTED should be mapped by the guest as > +normal memory with inner and outer write back caching attributes, in the inner > +shareable domain. > + > +KVM_PV_LOCK_PREEMPTED returns the structure for the calling vCPU. > + > +PV lock state > +------------- > + > +The structure pointed to by the KVM_PV_LOCK_PREEMPTED hypercall is as follows: > + > ++-----------+-------------+-------------+-----------------------------------+ > +| Field | Byte Length | Byte Offset | Description | > ++===========+=============+=============+===================================+ > +| preempted | 8 | 0 | Indicates that the vCPU that owns | > +| | | | this struct is running or not. | > +| | | | Non-zero values mean the vCPU has | > +| | | | been preempted. Zero means the | > +| | | | vCPU is not preempted. | > ++-----------+-------------+-------------+-----------------------------------+ > + > +The preempted field will be updated to 1 by the hypervisor prior to scheduling > +a vCPU. When the vCPU is scheduled out, the preempted field will be updated > +to 0 by the hypervisor. > + > +The structure will be present within a reserved region of the normal memory > +given to the guest. The guest should not attempt to write into this memory. > +There is a structure per vCPU of the guest. > + > +It is advisable that one or more 64k pages are set aside for the purpose of > +these structures and not used for other purposes, this enables the guest to map > +the region using 64k pages and avoids conflicting attributes with other memory. > + > +For the user space interface see Documentation/virt/kvm/devices/vcpu.txt > +section "4. GROUP: KVM_ARM_VCPU_PVLOCK_CTRL". > diff --git a/Documentation/virt/kvm/devices/vcpu.txt b/Documentation/virt/kvm/devices/vcpu.txt > index 6f3bd64a05b0..2c68d9a0f644 100644 > --- a/Documentation/virt/kvm/devices/vcpu.txt > +++ b/Documentation/virt/kvm/devices/vcpu.txt > @@ -74,3 +74,17 @@ Specifies the base address of the stolen time structure for this VCPU. The > base address must be 64 byte aligned and exist within a valid guest memory > region. See Documentation/virt/kvm/arm/pvtime.txt for more information > including the layout of the stolen time structure. > + > +4. GROUP: KVM_ARM_VCPU_PVLOCK_CTRL > +Architectures: ARM64 > + > +4.1 ATTRIBUTE: KVM_ARM_VCPU_PVLOCK_IPA > +Parameters: 64-bit base address > +Returns: -ENXIO: PV lock not implemented > + -EEXIST: Base address already set for this vCPU > + -EINVAL: Base address not 64 byte aligned > + > +Specifies the base address of the PV lock structure for this vCPU. The > +base address must be 64 byte aligned and exist within a valid guest memory > +region. See Documentation/virt/kvm/arm/pvlock.rst for more information > +including the layout of the pv lock structure. > _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm