From: Marc Zyngier <maz@kernel.org>
To: Reiji Watanabe <reijiw@google.com>
Cc: kvm@vger.kernel.org, Will Deacon <will@kernel.org>,
Peter Shier <pshier@google.com>,
Paolo Bonzini <pbonzini@redhat.com>,
kvmarm@lists.cs.columbia.edu,
Linux ARM <linux-arm-kernel@lists.infradead.org>
Subject: Re: [PATCH v3 2/3] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
Date: Fri, 04 Mar 2022 14:57:26 +0000 [thread overview]
Message-ID: <87mti522ax.wl-maz@kernel.org> (raw)
In-Reply-To: <75e90ab4-141f-21a8-1559-f792b84d60fa@google.com>
On Fri, 04 Mar 2022 08:00:20 +0000,
Reiji Watanabe <reijiw@google.com> wrote:
>
> > > +{
> > > + bool is32bit;
> > > + bool allowed = true;
> > > + struct kvm *kvm = vcpu->kvm;
> > > +
> > > + is32bit = vcpu_has_feature(vcpu, KVM_ARM_VCPU_EL1_32BIT);
> > > +
> > > + mutex_lock(&kvm->lock);
> > > +
> > > + if (test_bit(KVM_ARCH_FLAG_REG_WIDTH_CONFIGURED, &kvm->arch.flags)) {
> > > + allowed = (is32bit ==
> > > + test_bit(KVM_ARCH_FLAG_EL1_32BIT, &kvm->arch.flags));
> > > + } else {
> > > + if (is32bit)
> > > + set_bit(KVM_ARCH_FLAG_EL1_32BIT, &kvm->arch.flags);
> >
> > nit: probably best written as:
> >
> > __assign_bit(KVM_ARCH_FLAG_EL1_32BIT, &kvm->arch.flags, is32bit);
> >
> > > +
> > > + set_bit(KVM_ARCH_FLAG_REG_WIDTH_CONFIGURED, &kvm->arch.flags);
> >
> > Since this is only ever set whilst holding the lock, you can user the
> > __set_bit() version.
>
> Thank you for the proposal. But since other CPUs could attempt
> to set other bits without holding the lock, I don't think we
> can use the non-atomic version here.
Ah, good point. Keep the atomic accesses then.
>
> >
> > > + }
> > > +
> > > + mutex_unlock(&kvm->lock);
> > > +
> > > + return allowed ? 0 : -EINVAL;
> > > +}
> > > +
> > > static int kvm_vcpu_set_target(struct kvm_vcpu *vcpu,
> > > const struct kvm_vcpu_init *init)
> > > {
> > > @@ -1140,6 +1177,10 @@ static int kvm_vcpu_set_target(struct kvm_vcpu *vcpu,
> > >
> > > /* Now we know what it is, we can reset it. */
> > > ret = kvm_reset_vcpu(vcpu);
> > > +
> > > + if (!ret)
> > > + ret = kvm_register_width_check_or_init(vcpu);
> >
> > Why is that called *after* resetting the vcpu, which itself relies on
> > KVM_ARM_VCPU_EL1_32BIT, which we agreed to get rid of as much as
> > possible?
>
> That's because I didn't want to set EL1_32BIT/REG_WIDTH_CONFIGURED
> for the guest based on the vCPU for which KVM_ARM_VCPU_INIT would fail.
> The flags can be set in the kvm_reset_vcpu() and cleared in
> case of failure. But then that temporary value could lead
> KVM_ARM_VCPU_INIT for other vCPUs to fail, which I don't think
> is nice to do.
But it also means that userspace is trying to create incompatible
vcpus concurrently. Why should we care? We shouldn't even consider
resetting the flags on failure, as userspace has already indicated its
intention to create a 32 or 64bit VM.
M.
--
Without deviation from the norm, progress is not possible.
_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm
next prev parent reply other threads:[~2022-03-04 14:57 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-03-03 3:54 [PATCH v3 1/3] KVM: arm64: Generalise VM features into a set of flags Reiji Watanabe
2022-03-03 3:54 ` [PATCH v3 2/3] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs Reiji Watanabe
2022-03-03 16:10 ` Marc Zyngier
2022-03-04 8:00 ` Reiji Watanabe
2022-03-04 14:57 ` Marc Zyngier [this message]
2022-03-05 2:47 ` Reiji Watanabe
2022-03-03 3:54 ` [PATCH v3 3/3] KVM: arm64: selftests: Introduce vcpu_width_config Reiji Watanabe
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87mti522ax.wl-maz@kernel.org \
--to=maz@kernel.org \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=pbonzini@redhat.com \
--cc=pshier@google.com \
--cc=reijiw@google.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox