From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v2 7/7] ARM: KVM: Unlock vgic-v3 support
Date: Tue, 6 Sep 2016 18:52:06 +0200 [thread overview]
Message-ID: <20160906165206.GF23592@cbox> (raw)
In-Reply-To: <57CEC212.401@arm.com>
On Tue, Sep 06, 2016 at 02:18:10PM +0100, Vladimir Murzin wrote:
> On 05/09/16 12:29, Christoffer Dall wrote:
> > On Tue, Aug 16, 2016 at 11:46:58AM +0100, Vladimir Murzin wrote:
> >> It is time to get access to common version of vgic-v3.
> >
> > common version?
> >
>
> Since patch#2 it not private to arm64 or I should rephrase this?
>
I think you should just use the full path of the file or say something
like:
Now when vgic-v3-sr.c can be shared between arm and arm64, we have to
blah blah blah...
> >>
> >> We basically would need to tell build system how to pick it up and
> >> undo KVM_ARM_VGIC_V3 guarding introduced in 4f64cb6 ("arm/arm64: KVM:
> >> Only allow 64bit hosts to build VGICv3") and remove stubs. However,
> >> since vgic got ITS support KVM_ARM_VGIC_V3 tend to protect a little
> >> bit more than just plain vgic-v3 - this guard is used for ITS too
> >> which is not supported in 32-bit world yet. So, along with removal of
> >> KVM_ARM_VGIC_V3 guard introduce the new one - KVM_ARM_VGIC_V3_ITS to
> >> protect ITS related code.
> >
> > I don't find this paragraph particularly helpful, I'm afraid.
> >
>
> Sorry for that. It seems to much for one patch, I'll split it per your
> suggestion bellow.
>
> >>
> >> The only unpleasant part is how we decide which save/restore sequence to
> >> use under __vgic_save_state() - we don't have patching framework in hand
> >> like arm64, so have to check runtime on every invocation.
> >
> > Do static keys work on 32-bit arm?
> >
>
> I'll try to use them.
>
> >>
> >> Signed-off-by: Vladimir Murzin <vladimir.murzin@arm.com>
> >> ---
> >> arch/arm/include/asm/kvm_host.h | 4 +++
> >> arch/arm/include/asm/kvm_hyp.h | 5 ++++
> >> arch/arm/kvm/Makefile | 2 ++
> >> arch/arm/kvm/hyp/Makefile | 1 +
> >> arch/arm/kvm/hyp/switch.c | 20 +++++++++++--
> >> arch/arm64/kvm/Kconfig | 4 +--
> >> include/kvm/arm_vgic.h | 8 ------
> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 10 ++-----
> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 2 ++
> >> virt/kvm/arm/vgic/vgic-mmio.c | 2 --
> >> virt/kvm/arm/vgic/vgic-mmio.h | 3 --
> >> virt/kvm/arm/vgic/vgic.h | 54 ++---------------------------------
> >> 12 files changed, 38 insertions(+), 77 deletions(-)
> >>
> >> diff --git a/arch/arm/include/asm/kvm_host.h b/arch/arm/include/asm/kvm_host.h
> >> index de338d9..1312597 100644
> >> --- a/arch/arm/include/asm/kvm_host.h
> >> +++ b/arch/arm/include/asm/kvm_host.h
> >> @@ -39,7 +39,11 @@
> >>
> >> #include <kvm/arm_vgic.h>
> >>
> >> +#ifdef CONFIG_ARM_GIC_V3
> >> +#define KVM_MAX_VCPUS VGIC_V3_MAX_CPUS
> >> +#else
> >> #define KVM_MAX_VCPUS VGIC_V2_MAX_CPUS
> >> +#endif
> >>
> >> #define KVM_REQ_VCPU_EXIT 8
> >>
> >> diff --git a/arch/arm/include/asm/kvm_hyp.h b/arch/arm/include/asm/kvm_hyp.h
> >> index e604ad68..95669b3 100644
> >> --- a/arch/arm/include/asm/kvm_hyp.h
> >> +++ b/arch/arm/include/asm/kvm_hyp.h
> >> @@ -88,6 +88,8 @@
> >>
> >> #define VFP_FPEXC __ACCESS_VFP(FPEXC)
> >>
> >> +#define ID_PFR1 __ACCESS_CP15(c0, 0, c1, 1)
> >> +
> >> /* AArch64 compatibility macros, only for the timer so far */
> >> #define read_sysreg_el0(r) read_sysreg(r##_el0)
> >> #define write_sysreg_el0(v, r) write_sysreg(v, r##_el0)
> >> @@ -103,6 +105,9 @@ void __timer_restore_state(struct kvm_vcpu *vcpu);
> >> void __vgic_v2_save_state(struct kvm_vcpu *vcpu);
> >> void __vgic_v2_restore_state(struct kvm_vcpu *vcpu);
> >>
> >> +void __vgic_v3_save_state(struct kvm_vcpu *vcpu);
> >> +void __vgic_v3_restore_state(struct kvm_vcpu *vcpu);
> >> +
> >> void __sysreg_save_state(struct kvm_cpu_context *ctxt);
> >> void __sysreg_restore_state(struct kvm_cpu_context *ctxt);
> >>
> >> diff --git a/arch/arm/kvm/Makefile b/arch/arm/kvm/Makefile
> >> index 10d77a6..043d817f 100644
> >> --- a/arch/arm/kvm/Makefile
> >> +++ b/arch/arm/kvm/Makefile
> >> @@ -26,8 +26,10 @@ obj-y += $(KVM)/arm/vgic/vgic.o
> >> obj-y += $(KVM)/arm/vgic/vgic-init.o
> >> obj-y += $(KVM)/arm/vgic/vgic-irqfd.o
> >> obj-y += $(KVM)/arm/vgic/vgic-v2.o
> >> +obj-y += $(KVM)/arm/vgic/vgic-v3.o
> >> obj-y += $(KVM)/arm/vgic/vgic-mmio.o
> >> obj-y += $(KVM)/arm/vgic/vgic-mmio-v2.o
> >> +obj-y += $(KVM)/arm/vgic/vgic-mmio-v3.o
> >> obj-y += $(KVM)/arm/vgic/vgic-kvm-device.o
> >> obj-y += $(KVM)/irqchip.o
> >> obj-y += $(KVM)/arm/arch_timer.o
> >> diff --git a/arch/arm/kvm/hyp/Makefile b/arch/arm/kvm/hyp/Makefile
> >> index 8dfa5f7..3023bb5 100644
> >> --- a/arch/arm/kvm/hyp/Makefile
> >> +++ b/arch/arm/kvm/hyp/Makefile
> >> @@ -5,6 +5,7 @@
> >> KVM=../../../../virt/kvm
> >>
> >> obj-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/hyp/vgic-v2-sr.o
> >> +obj-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/hyp/vgic-v3-sr.o
> >> obj-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/hyp/timer-sr.o
> >>
> >> obj-$(CONFIG_KVM_ARM_HOST) += tlb.o
> >> diff --git a/arch/arm/kvm/hyp/switch.c b/arch/arm/kvm/hyp/switch.c
> >> index b13caa9..9666bae 100644
> >> --- a/arch/arm/kvm/hyp/switch.c
> >> +++ b/arch/arm/kvm/hyp/switch.c
> >> @@ -15,6 +15,8 @@
> >> * along with this program. If not, see <http://www.gnu.org/licenses/>.
> >> */
> >>
> >> +#include <linux/irqchip/arm-gic-v3.h>
> >> +
> >> #include <asm/kvm_asm.h>
> >> #include <asm/kvm_hyp.h>
> >>
> >> @@ -74,14 +76,28 @@ static void __hyp_text __deactivate_vm(struct kvm_vcpu *vcpu)
> >> write_sysreg(read_sysreg(MIDR), VPIDR);
> >> }
> >>
> >> +static bool __hyp_text __has_useable_gicv3_cpuif(void)
> >> +{
> >> + if (IS_ENABLED(CONFIG_ARM_GIC_V3) && (read_sysreg(ID_PFR1) >> 28))
> >
> > Do we have a define for bit 28 we could use?
> >
> > Does this actually work on all v7 boards? The v7 ARM ARM seems to state
> > that this bitfield is Reserved, UNK. Does that somehow mean 'is going
> > to be zero'?
> >
Any thoughts on this one?
> >> + return !!(read_sysreg(ICC_HSRE) & ICC_SRE_EL2_SRE);
> >> + else
> >> + return false;
> >> +}
> >> +
> >> static void __hyp_text __vgic_save_state(struct kvm_vcpu *vcpu)
> >> {
> >> - __vgic_v2_save_state(vcpu);
> >> + if (__has_useable_gicv3_cpuif())
> >> + __vgic_v3_save_state(vcpu);
> >> + else
> >> + __vgic_v2_save_state(vcpu);
> >> }
> >>
> >> static void __hyp_text __vgic_restore_state(struct kvm_vcpu *vcpu)
> >> {
> >> - __vgic_v2_restore_state(vcpu);
> >> + if (__has_useable_gicv3_cpuif())
> >> + __vgic_v3_restore_state(vcpu);
> >> + else
> >> + __vgic_v2_restore_state(vcpu);
> >> }
> >>
> >> static bool __hyp_text __populate_fault_info(struct kvm_vcpu *vcpu)
> >> diff --git a/arch/arm64/kvm/Kconfig b/arch/arm64/kvm/Kconfig
> >> index 9c9edc9..6eaf12c 100644
> >> --- a/arch/arm64/kvm/Kconfig
> >> +++ b/arch/arm64/kvm/Kconfig
> >> @@ -16,7 +16,7 @@ menuconfig VIRTUALIZATION
> >>
> >> if VIRTUALIZATION
> >>
> >> -config KVM_ARM_VGIC_V3
> >> +config KVM_ARM_VGIC_V3_ITS
> >
> > I feel like this could have been simplified with adding the new ITS
> > guard in a separate patch.
> >
> > In fact, you could then have a separate patch that enables compilation
> > of the gicv3 code and removes the static inlines etc., and then finally
> > a patch that adds in the logic for the world switch.
>
> Agree. Will rework this patch.
>
Thanks, sounds good!
-Christoffer
next prev parent reply other threads:[~2016-09-06 16:52 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-08-16 10:46 [PATCH v2 0/7] ARM: KVM: Support for vgic-v3 Vladimir Murzin
2016-08-16 10:46 ` [PATCH v2 1/7] arm64: KVM: Move GIC accessors to arch_gicv3.h Vladimir Murzin
2016-09-05 11:28 ` Christoffer Dall
2016-09-06 12:33 ` Vladimir Murzin
2016-08-16 10:46 ` [PATCH v2 2/7] arm64: KVM: Move vgic-v3 save/restore to virt/kvm/arm/hyp Vladimir Murzin
2016-08-16 10:46 ` [PATCH v2 3/7] KVM: arm: vgic-new: improve compatibility with 32-bit Vladimir Murzin
2016-09-05 11:29 ` Christoffer Dall
2016-09-06 12:41 ` Vladimir Murzin
2016-09-06 13:22 ` Christoffer Dall
2016-09-06 13:54 ` Vladimir Murzin
2016-09-06 16:31 ` Christoffer Dall
2016-09-07 9:06 ` Vladimir Murzin
2016-09-07 9:43 ` Christoffer Dall
2016-08-16 10:46 ` [PATCH v2 4/7] ARM: update MPIDR accessors macro Vladimir Murzin
2016-09-05 11:29 ` Christoffer Dall
2016-09-06 12:42 ` Vladimir Murzin
2016-08-16 10:46 ` [PATCH v2 5/7] ARM: move system register accessors to asm/cp15.h Vladimir Murzin
2016-09-05 11:29 ` Christoffer Dall
2016-09-06 13:05 ` Vladimir Murzin
2016-09-06 16:34 ` Christoffer Dall
2016-08-16 10:46 ` [PATCH v2 6/7] ARM: KVM: Get ready to use vgic-v3 Vladimir Murzin
2016-09-05 11:29 ` Christoffer Dall
2016-09-06 13:12 ` Vladimir Murzin
2016-09-06 16:49 ` Christoffer Dall
2016-08-16 10:46 ` [PATCH v2 7/7] ARM: KVM: Unlock vgic-v3 support Vladimir Murzin
2016-09-05 11:29 ` Christoffer Dall
2016-09-06 13:08 ` Marc Zyngier
2016-09-06 13:18 ` Vladimir Murzin
2016-09-06 16:52 ` Christoffer Dall [this message]
2016-09-06 13:23 ` Vladimir Murzin
2016-09-06 16:55 ` Christoffer Dall
2016-09-07 10:48 ` Vladimir Murzin
2016-09-07 12:58 ` Christoffer Dall
2016-09-07 14:20 ` Peter Maydell
2016-09-07 14:47 ` Christoffer Dall
2016-09-05 11:28 ` [PATCH v2 0/7] ARM: KVM: Support for vgic-v3 Christoffer Dall
2016-09-06 12:32 ` Vladimir Murzin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160906165206.GF23592@cbox \
--to=christoffer.dall@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).