Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 13, 2023 at 9:37 PM Jing Zhang <jingzhangos@xxxxxxxxxx> wrote:
>
> Hi Reiji,
>
> On Sun, Mar 12, 2023 at 9:13 PM Reiji Watanabe <reijiw@xxxxxxxxxx> wrote:
> >
> > Hi Jing,
> >
> > On Thu, Mar 9, 2023 at 6:38 PM Jing Zhang <jingzhangos@xxxxxxxxxx> wrote:
> > >
> > > Hi Reiji,
> > >
> > > On Wed, Mar 8, 2023 at 8:42 AM Reiji Watanabe <reijiw@xxxxxxxxxx> wrote:
> > > >
> > > > Hi Jing,
> > > >
> > > > On Mon, Feb 27, 2023 at 10:23 PM Jing Zhang <jingzhangos@xxxxxxxxxx> wrote:
> > > > >
> > > > > With per guest ID registers, PMUver settings from userspace
> > > > > can be stored in its corresponding ID register.
> > > > >
> > > > > No functional change intended.
> > > > >
> > > > > Signed-off-by: Jing Zhang <jingzhangos@xxxxxxxxxx>
> > > > > ---
> > > > >  arch/arm64/include/asm/kvm_host.h | 11 ++++---
> > > > >  arch/arm64/kvm/arm.c              |  6 ----
> > > > >  arch/arm64/kvm/id_regs.c          | 52 ++++++++++++++++++++++++-------
> > > > >  include/kvm/arm_pmu.h             |  6 ++--
> > > > >  4 files changed, 51 insertions(+), 24 deletions(-)
> > > > >
> > > > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h
> > > > > index f64347eb77c2..effb61a9a855 100644
> > > > > --- a/arch/arm64/include/asm/kvm_host.h
> > > > > +++ b/arch/arm64/include/asm/kvm_host.h
> > > > > @@ -218,6 +218,12 @@ struct kvm_arch {
> > > > >  #define KVM_ARCH_FLAG_EL1_32BIT                                4
> > > > >         /* PSCI SYSTEM_SUSPEND enabled for the guest */
> > > > >  #define KVM_ARCH_FLAG_SYSTEM_SUSPEND_ENABLED           5
> > > > > +       /*
> > > > > +        * AA64DFR0_EL1.PMUver was set as ID_AA64DFR0_EL1_PMUVer_IMP_DEF
> > > > > +        * or DFR0_EL1.PerfMon was set as ID_DFR0_EL1_PerfMon_IMPDEF from
> > > > > +        * userspace for VCPUs without PMU.
> > > > > +        */
> > > > > +#define KVM_ARCH_FLAG_VCPU_HAS_IMP_DEF_PMU             6
> > > > >
> > > > >         unsigned long flags;
> > > > >
> > > > > @@ -230,11 +236,6 @@ struct kvm_arch {
> > > > >
> > > > >         cpumask_var_t supported_cpus;
> > > > >
> > > > > -       struct {
> > > > > -               u8 imp:4;
> > > > > -               u8 unimp:4;
> > > > > -       } dfr0_pmuver;
> > > > > -
> > > > >         /* Hypercall features firmware registers' descriptor */
> > > > >         struct kvm_smccc_features smccc_feat;
> > > > >
> > > > > diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c
> > > > > index c78d68d011cb..fb2de2cb98cb 100644
> > > > > --- a/arch/arm64/kvm/arm.c
> > > > > +++ b/arch/arm64/kvm/arm.c
> > > > > @@ -138,12 +138,6 @@ int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
> > > > >         kvm_arm_set_default_id_regs(kvm);
> > > > >         kvm_arm_init_hypercalls(kvm);
> > > > >
> > > > > -       /*
> > > > > -        * Initialise the default PMUver before there is a chance to
> > > > > -        * create an actual PMU.
> > > > > -        */
> > > > > -       kvm->arch.dfr0_pmuver.imp = kvm_arm_pmu_get_pmuver_limit();
> > > > > -
> > > > >         return 0;
> > > > >
> > > > >  err_free_cpumask:
> > > > > diff --git a/arch/arm64/kvm/id_regs.c b/arch/arm64/kvm/id_regs.c
> > > > > index 36859e4caf02..21ec8fc10d79 100644
> > > > > --- a/arch/arm64/kvm/id_regs.c
> > > > > +++ b/arch/arm64/kvm/id_regs.c
> > > > > @@ -21,9 +21,12 @@
> > > > >  static u8 vcpu_pmuver(const struct kvm_vcpu *vcpu)
> > > > >  {
> > > > >         if (kvm_vcpu_has_pmu(vcpu))
> > > > > -               return vcpu->kvm->arch.dfr0_pmuver.imp;
> > > > > -
> > > > > -       return vcpu->kvm->arch.dfr0_pmuver.unimp;
> > > > > +               return FIELD_GET(ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer),
> > > > > +                               IDREG(vcpu->kvm, SYS_ID_AA64DFR0_EL1));
> > > > > +       else if (test_bit(KVM_ARCH_FLAG_VCPU_HAS_IMP_DEF_PMU, &vcpu->kvm->arch.flags))
> > > > > +               return ID_AA64DFR0_EL1_PMUVer_IMP_DEF;
> > > > > +       else
> > > > > +               return 0;
> > > > >  }
> > > > >
> > > > >  static u8 perfmon_to_pmuver(u8 perfmon)
> > > > > @@ -256,10 +259,19 @@ static int set_id_aa64dfr0_el1(struct kvm_vcpu *vcpu,
> > > > >         if (val)
> > > > >                 return -EINVAL;
> > > > >
> > > > > -       if (valid_pmu)
> > > > > -               vcpu->kvm->arch.dfr0_pmuver.imp = pmuver;
> > > > > -       else
> > > > > -               vcpu->kvm->arch.dfr0_pmuver.unimp = pmuver;
> > > > > +       if (valid_pmu) {
> > > > > +               IDREG(vcpu->kvm, SYS_ID_AA64DFR0_EL1) &= ~ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer);
> > > > > +               IDREG(vcpu->kvm, SYS_ID_AA64DFR0_EL1) |=
> > > > > +                       FIELD_PREP(ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer), pmuver);
> > > > > +
> > > > > +               IDREG(vcpu->kvm, SYS_ID_DFR0_EL1) &= ~ARM64_FEATURE_MASK(ID_DFR0_EL1_PerfMon);
> > > > > +               IDREG(vcpu->kvm, SYS_ID_DFR0_EL1) |=
> > > > > +                       FIELD_PREP(ARM64_FEATURE_MASK(ID_DFR0_EL1_PerfMon), pmuver);
> > > >
> > > > The pmuver must be converted to perfmon for ID_DFR0_EL1.
> > > Yes, wil fix it.
> > > >
> > > > Also, I think those registers should be updated atomically, although PMUver
> > > > specified by userspace will be normally the same for all vCPUs with
> > > > PMUv3 configured (I have the same comment for set_id_dfr0_el1()).
> > > >
> > > I think there is no race condition here. No corrupted data would be
> > > set in the field, right?
> >
> > If userspace tries to set inconsistent values of PMUver/Perfmon
> > for vCPUs with vPMU configured at the same time, PMUver and Perfmon
> > won't be consistent even with this KVM code.
> > It won't be sane userspace though :)
> >
> I am still not convinced. I don't believe a VM would set AArch64 and
> AArch32 ID registers at the same time.

Difference threads will set (restore) those registers for
different vCPUs in parallel, although those data are shared per VM.
(e.g. kvm_arm_set_fw_reg_bmap() addresses the similar case)

> Anyway, let's see if there are
> any ideas from others before adding the lockings.
> > > >
> > > > > +       } else if (pmuver == ID_AA64DFR0_EL1_PMUVer_IMP_DEF) {
> > > > > +               set_bit(KVM_ARCH_FLAG_VCPU_HAS_IMP_DEF_PMU, &vcpu->kvm->arch.flags);
> > > > > +       } else {
> > > > > +               clear_bit(KVM_ARCH_FLAG_VCPU_HAS_IMP_DEF_PMU, &vcpu->kvm->arch.flags);
> > > > > +       }
> > > > >
> > > > >         return 0;
> > > > >  }
> > > > > @@ -296,10 +308,19 @@ static int set_id_dfr0_el1(struct kvm_vcpu *vcpu,
> > > > >         if (val)
> > > > >                 return -EINVAL;
> > > > >
> > > > > -       if (valid_pmu)
> > > > > -               vcpu->kvm->arch.dfr0_pmuver.imp = perfmon_to_pmuver(perfmon);
> > > > > -       else
> > > > > -               vcpu->kvm->arch.dfr0_pmuver.unimp = perfmon_to_pmuver(perfmon);
> > > > > +       if (valid_pmu) {
> > > > > +               IDREG(vcpu->kvm, SYS_ID_DFR0_EL1) &= ~ARM64_FEATURE_MASK(ID_DFR0_EL1_PerfMon);
> > > > > +               IDREG(vcpu->kvm, SYS_ID_DFR0_EL1) |= FIELD_PREP(
> > > > > +                       ARM64_FEATURE_MASK(ID_DFR0_EL1_PerfMon), perfmon_to_pmuver(perfmon));
> > > >
> > > > The perfmon value should be set for ID_DFR0_EL1 (not pmuver).
> > > >
> > > Sure, will fix it.
> > > > > +
> > > > > +               IDREG(vcpu->kvm, SYS_ID_AA64DFR0_EL1) &= ~ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer);
> > > > > +               IDREG(vcpu->kvm, SYS_ID_AA64DFR0_EL1) |= FIELD_PREP(
> > > > > +                       ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer), perfmon_to_pmuver(perfmon));
> > > > > +       } else if (perfmon == ID_DFR0_EL1_PerfMon_IMPDEF) {
> > > > > +               set_bit(KVM_ARCH_FLAG_VCPU_HAS_IMP_DEF_PMU, &vcpu->kvm->arch.flags);
> > > > > +       } else {
> > > > > +               clear_bit(KVM_ARCH_FLAG_VCPU_HAS_IMP_DEF_PMU, &vcpu->kvm->arch.flags);
> > > > > +       }
> > > > >
> > > > >         return 0;
> > > > >  }
> > > > > @@ -543,4 +564,13 @@ void kvm_arm_set_default_id_regs(struct kvm *kvm)
> > > > >         }
> > > > >
> > > > >         IDREG(kvm, SYS_ID_AA64PFR0_EL1) = val;
> > > > > +
> > > > > +       /*
> > > > > +        * Initialise the default PMUver before there is a chance to
> > > > > +        * create an actual PMU.
> > > > > +        */
> > > > > +       IDREG(kvm, SYS_ID_AA64DFR0_EL1) &= ~ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer);
> > > > > +       IDREG(kvm, SYS_ID_AA64DFR0_EL1) |=
> > > > > +               FIELD_PREP(ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer),
> > > > > +                          kvm_arm_pmu_get_pmuver_limit());
> > > > >  }
> > > > > diff --git a/include/kvm/arm_pmu.h b/include/kvm/arm_pmu.h
> > > > > index 628775334d5e..eef67b7d9751 100644
> > > > > --- a/include/kvm/arm_pmu.h
> > > > > +++ b/include/kvm/arm_pmu.h
> > > > > @@ -92,8 +92,10 @@ void kvm_vcpu_pmu_restore_host(struct kvm_vcpu *vcpu);
> > > > >  /*
> > > > >   * Evaluates as true when emulating PMUv3p5, and false otherwise.
> > > > >   */
> > > > > -#define kvm_pmu_is_3p5(vcpu)                                           \
> > > > > -       (vcpu->kvm->arch.dfr0_pmuver.imp >= ID_AA64DFR0_EL1_PMUVer_V3P5)
> > > > > +#define kvm_pmu_is_3p5(vcpu)                                                                   \
> > > > > +       (kvm_vcpu_has_pmu(vcpu) &&                                                              \
> > > >
> > > > What is the reason for adding this kvm_vcpu_has_pmu() checking ?
> > > > I don't think this patch's changes necessitated this.
> > > For the same VM, is it possible that some VCPUs would have PMU, but
> > > some may not have?
> > > That's why the kvm_vcpu_has_pmu is added here.
> >
> > Yes, it's possible. But, it doesn't appear that this patch or any
> > patches in the series adds a code that newly uses the macro.
> > I believe this macro is always used for the vCPUs with vPMU
> > configured currently.
> > Did you find a case where this is used for vCPUs with no vPMU ?
> >
> > If this change tries to address an existing issue, I think it would
> > be nicer to fix this in a separate patch. Or it would be helpful
> > if you could add an explanation in the commit log at least.
> I don't think we should assume the potential users for the macro. Only
> adding kvm_vcpu_has_pmu() in the macro can have the same semantics as
> the original macro.
> The original macro would return false if it is used by a vCPU without
> vPMU. I think we should keep it as the same.

The original macro always uses dfr0_pmuver.imp, which is the PMU version
for vCPUs with PMU configured.  So, if the macro is used for vCPUs
with no PMU configured, it might return true (it depends on the value
of dfr0_pmuver.imp).
Or am I missing something ??

Thank you,
Reiji




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux