Re: [RFC PATCH] KVM: arm/arm64: rework kvm_handle_mmio_return

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

On 08/04/16 12:05, Christoffer Dall wrote:
> On Fri, Apr 08, 2016 at 11:43:50AM +0100, Andre Przywara wrote:
>> Currently we call kvm_handle_mmio_return when we need to sync back
>> register content into the guest after a trap.
>> This function expects its arguments packaged into struct kvm_run,
>> which we only naturally use when we emulate in userspace. With
>> in-kernel emulation we have to copy the data into that strcut.
> 
> s/strcut/struct/
> 
>> This patch fixes this by explicitly passing the required variables,
>> so we save the copying in two cases.
> 
> this patch fixes what?

The strcut ;-)

It fixes the unnecessary copying. Indeed worded badly.

>> Also since this function is actually a NOP for an MMIO write, we
>> rename it to kvm_writeback_mmio_data and move the !is_write check to
>> the callers.
>> This fixes a bug where we were missing a writeback for one in-kernel
>> emulation case.
>>
>> Signed-off-by: Andre Przywara <andre.przywara@xxxxxxx>
>> ---
>> Hi Christoffer,
>>
>> this is my take on fixing the missing MMIO writeback call.
>> This rework kind of hides the actual bug-fix, that's why I dumped
>> it in favour of the one-liner in my series.
>>
> 
> Hmmm, I thought I also sent a patch for this (off list), and I'm not
> sure why your approach is better, but ok, I guess I can review your
> patch...

My approach is not better, just different. I just wanted some opinions
because I wasn't satisfied either.
This run-> wrapping did annoy me already some months ago, so I just took
the opportunity to kill it.

>>
>>  arch/arm/include/asm/kvm_mmio.h   |  3 ++-
>>  arch/arm/kvm/arm.c                | 10 +++++---
>>  arch/arm/kvm/mmio.c               | 54 ++++++++++++++++++---------------------
>>  arch/arm64/include/asm/kvm_mmio.h |  3 ++-
>>  virt/kvm/arm/vgic.c               |  8 ++----
>>  5 files changed, 38 insertions(+), 40 deletions(-)
>>
>> diff --git a/arch/arm/include/asm/kvm_mmio.h b/arch/arm/include/asm/kvm_mmio.h
>> index d8e90c8..21f97ac 100644
>> --- a/arch/arm/include/asm/kvm_mmio.h
>> +++ b/arch/arm/include/asm/kvm_mmio.h
>> @@ -28,7 +28,8 @@ struct kvm_decode {
>>  	bool sign_extend;
>>  };
>>  
>> -int kvm_handle_mmio_return(struct kvm_vcpu *vcpu, struct kvm_run *run);
>> +int kvm_writeback_mmio_data(struct kvm_vcpu *vcpu, void *data, int len,
> 
> I think this should be called kvm_write_back_mmio_data() instead.
> 
>> +			    gpa_t addr);
>>  int io_mem_abort(struct kvm_vcpu *vcpu, struct kvm_run *run,
>>  		 phys_addr_t fault_ipa);
>>  
>> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
>> index b538431..e9f593c 100644
>> --- a/arch/arm/kvm/arm.c
>> +++ b/arch/arm/kvm/arm.c
>> @@ -555,9 +555,13 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
>>  		return ret;
>>  
>>  	if (run->exit_reason == KVM_EXIT_MMIO) {
>> -		ret = kvm_handle_mmio_return(vcpu, vcpu->run);
>> -		if (ret)
>> -			return ret;
>> +		if (!run->mmio.is_write) {
>> +			ret = kvm_writeback_mmio_data(vcpu, run->mmio.data,
>> +						      run->mmio.len,
>> +						      run->mmio.phys_addr);
>> +			if (ret)
>> +				return ret;
>> +		}
> 
> I preferred all the logic be encapsulated in the function instead of
> extracting values in the caller, but it's purely a cosmetic comment.

You mean the "if (!is_write)" or wrapping the values into the kvm_run
struct?
As mentioned in the commit message, only actual userland emulation is
using run->, so for in-kernel emulation we have to set it up, which is
unnecessary copying IMHO.
By un-wrapping the parameters we just would pass is_write to exit the
function immediately if it was false, that's why the move to the callers.
But I agree it is probably bike shedding.

>>  	}
>>  
>>  	if (vcpu->sigset_active)
>> diff --git a/arch/arm/kvm/mmio.c b/arch/arm/kvm/mmio.c
>> index 0f6600f..052aa02 100644
>> --- a/arch/arm/kvm/mmio.c
>> +++ b/arch/arm/kvm/mmio.c
>> @@ -86,38 +86,33 @@ static unsigned long mmio_read_buf(char *buf, unsigned int len)
>>  }
>>  
>>  /**
>> - * kvm_handle_mmio_return -- Handle MMIO loads after user space emulation
>> + * kvm_writeback_mmio_data -- Write back emulation data into the guest's
>> + *                            target register after return from userspace.
>>   * @vcpu: The VCPU pointer
>> - * @run:  The VCPU run struct containing the mmio data
>> + * @data: A pointer to the data to be written back
>> + * @len:  The size of the read access
>> + * @addr: The original MMIO address (for the tracepoint only)
>>   *
>>   * This should only be called after returning from userspace for MMIO load
>>   * emulation.
>>   */
>> -int kvm_handle_mmio_return(struct kvm_vcpu *vcpu, struct kvm_run *run)
>> +int kvm_writeback_mmio_data(struct kvm_vcpu *vcpu, void *data_ptr, int len,
>> +			    gpa_t addr)
>>  {
>>  	unsigned long data;
>> -	unsigned int len;
>>  	int mask;
>>  
>> -	if (!run->mmio.is_write) {
>> -		len = run->mmio.len;
>> -		if (len > sizeof(unsigned long))
>> -			return -EINVAL;
>> +	data = mmio_read_buf(data_ptr, len);
>>  
>> -		data = mmio_read_buf(run->mmio.data, len);
>> -
>> -		if (vcpu->arch.mmio_decode.sign_extend &&
>> -		    len < sizeof(unsigned long)) {
>> -			mask = 1U << ((len * 8) - 1);
>> -			data = (data ^ mask) - mask;
>> -		}
>> -
>> -		trace_kvm_mmio(KVM_TRACE_MMIO_READ, len, run->mmio.phys_addr,
>> -			       data);
>> -		data = vcpu_data_host_to_guest(vcpu, data, len);
>> -		vcpu_set_reg(vcpu, vcpu->arch.mmio_decode.rt, data);
>> +	if (vcpu->arch.mmio_decode.sign_extend && len < sizeof(unsigned long)) {
>> +		mask = 1U << ((len * 8) - 1);
>> +		data = (data ^ mask) - mask;
>>  	}
>>  
>> +	trace_kvm_mmio(KVM_TRACE_MMIO_READ, len, addr, data);
>> +	data = vcpu_data_host_to_guest(vcpu, data, len);
>> +	vcpu_set_reg(vcpu, vcpu->arch.mmio_decode.rt, data);
>> +
>>  	return 0;
>>  }
>>  
>> @@ -202,22 +197,23 @@ int io_mem_abort(struct kvm_vcpu *vcpu, struct kvm_run *run,
>>  				      data_buf);
>>  	}
>>  
>> +	if (!ret) {
>> +		/* We handled the access successfully in the kernel. */
>> +		vcpu->stat.mmio_exit_kernel++;
>> +		if (!is_write)
>> +			kvm_writeback_mmio_data(vcpu, data_buf, len, fault_ipa);
> 
> are you not doing this writeback twice?  Once in the vgic and once here?
> That was the very thing I tried to address in my patch.

Right, I missed that one (which was the actual reason the code worked
before although we missed the write-back.
Not sure why it was actually in in the first place.

I guess I will just go with your patch, because it's simpler.

Cheers,
Andre.

>> +		return 1;
>> +	}
>> +
>>  	/* Now prepare kvm_run for the potential return to userland. */
>>  	run->mmio.is_write	= is_write;
>>  	run->mmio.phys_addr	= fault_ipa;
>>  	run->mmio.len		= len;
>> +	run->exit_reason	= KVM_EXIT_MMIO;
>>  	if (is_write)
>>  		memcpy(run->mmio.data, data_buf, len);
>>  
>> -	if (!ret) {
>> -		/* We handled the access successfully in the kernel. */
>> -		vcpu->stat.mmio_exit_kernel++;
>> -		kvm_handle_mmio_return(vcpu, run);
>> -		return 1;
>> -	} else {
>> -		vcpu->stat.mmio_exit_user++;
>> -	}
>> +	vcpu->stat.mmio_exit_user++;
>>  
>> -	run->exit_reason	= KVM_EXIT_MMIO;
>>  	return 0;
>>  }
>> diff --git a/arch/arm64/include/asm/kvm_mmio.h b/arch/arm64/include/asm/kvm_mmio.h
>> index fe612a9..00a57bd 100644
>> --- a/arch/arm64/include/asm/kvm_mmio.h
>> +++ b/arch/arm64/include/asm/kvm_mmio.h
>> @@ -30,7 +30,8 @@ struct kvm_decode {
>>  	bool sign_extend;
>>  };
>>  
>> -int kvm_handle_mmio_return(struct kvm_vcpu *vcpu, struct kvm_run *run);
>> +int kvm_writeback_mmio_data(struct kvm_vcpu *vcpu, void *data, int len,
>> +			    gpa_t addr);
>>  int io_mem_abort(struct kvm_vcpu *vcpu, struct kvm_run *run,
>>  		 phys_addr_t fault_ipa);
>>  
>> diff --git a/virt/kvm/arm/vgic.c b/virt/kvm/arm/vgic.c
>> index 00429b3..7a9aa56 100644
>> --- a/virt/kvm/arm/vgic.c
>> +++ b/virt/kvm/arm/vgic.c
>> @@ -821,7 +821,6 @@ static int vgic_handle_mmio_access(struct kvm_vcpu *vcpu,
>>  	struct vgic_dist *dist = &vcpu->kvm->arch.vgic;
>>  	struct vgic_io_device *iodev = container_of(this,
>>  						    struct vgic_io_device, dev);
>> -	struct kvm_run *run = vcpu->run;
>>  	const struct vgic_io_range *range;
>>  	struct kvm_exit_mmio mmio;
>>  	bool updated_state;
>> @@ -850,12 +849,9 @@ static int vgic_handle_mmio_access(struct kvm_vcpu *vcpu,
>>  		updated_state = false;
>>  	}
>>  	spin_unlock(&dist->lock);
>> -	run->mmio.is_write	= is_write;
>> -	run->mmio.len		= len;
>> -	run->mmio.phys_addr	= addr;
>> -	memcpy(run->mmio.data, val, len);
>>  
>> -	kvm_handle_mmio_return(vcpu, run);
>> +	if (!is_write)
>> +		kvm_writeback_mmio_data(vcpu, val, len, addr);
> 
> see above.
> 
>>  
>>  	if (updated_state)
>>  		vgic_kick_vcpus(vcpu->kvm);
>> -- 
>> 2.7.3
>>
> 
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux