Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp3930774ybh; Tue, 6 Aug 2019 03:45:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZnIsdhkep9Y1tXOY3z2uqrAKFQ+qSZuFB131/hf6YWN6+WQa2ZpGuw2odqe93kEQPduVt X-Received: by 2002:a17:902:ea:: with SMTP id a97mr2549396pla.182.1565088318492; Tue, 06 Aug 2019 03:45:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565088318; cv=none; d=google.com; s=arc-20160816; b=UfzR4lr9Oo7LZbPHLb9L8fCgSopNmzWvu+5tfm/8r+4pTQDYwJiVB4yC0v/7QtKE5s 5JuEUwdMlj+sAgFE4vIxylqqj8ph+HXCkcCx/mGuAx8dfTpR2HTlHaoVJ13aDwwWP59K g+l3f2baqD9uIkviJ6Vso9zJ9kKg1km00+/pM+fYCRXwfLEMvrq5I0n3cSUSF3HOmbhc a5R+1cZIjQPne9frYK0oFOVwfD4x74zu47LPD7Q9M05DdolZYm2WStJw8TnTWbSvSDzR lonoz4UEA1V3euq3RgszkQKW8wmiwibYSMZFWT/KyfpozFadrX1xJCA/hhD8gEnK3C3/ jItA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=Ap1rrVlPYTOqnh4GnsE+49LzAyDM0X2cnywI59s+Owk=; b=KYRf0k8svLnif0CQjGIRf8KeTLPU9ygSZxH3iU7oHPqeUn3q7uy8KWKXIVH1OBN9BW 3C50vDVedDYTdTSwdYe43S8sd/bI0gMLsLK+OuMThhK6zzqJECjeWKo7amYpuQiVDoTN UtT85GxxkiehUpvxQClIn1l6/y3xX18jGjosctAUDvWUwFzneOE/YZ48+OgwtLxdSqKH RIZg+MfU6Tas/2fJSu90YYIRSFRk1LBoVhDAM2Jv0BNrKIeX16SPee9i+/OV0+X3MLBO t68UxMfx35v2f2hfvZw3AgqCwY3hywOTbJiFmMKfqR8gxm3shJseGn45g8a9cPZjzwEG q/yw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@brainfault-org.20150623.gappssmtp.com header.s=20150623 header.b=PUK3bgt9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e23si45189059pgv.528.2019.08.06.03.45.02; Tue, 06 Aug 2019 03:45:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@brainfault-org.20150623.gappssmtp.com header.s=20150623 header.b=PUK3bgt9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732650AbfHFKoY (ORCPT + 99 others); Tue, 6 Aug 2019 06:44:24 -0400 Received: from mail-wr1-f66.google.com ([209.85.221.66]:37494 "EHLO mail-wr1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730877AbfHFKoY (ORCPT ); Tue, 6 Aug 2019 06:44:24 -0400 Received: by mail-wr1-f66.google.com with SMTP id n9so62325415wrr.4 for ; Tue, 06 Aug 2019 03:44:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brainfault-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Ap1rrVlPYTOqnh4GnsE+49LzAyDM0X2cnywI59s+Owk=; b=PUK3bgt9LN15lKwN2Jd3tl6/+EkQUmDLcV1zX3Hh3vuwHA1bRch5y2l9rWN8Oxxofz ip4hsgOxco1e4EicK7GCXFAywyOagtEO8jJQzCZXrNAaRdysL1kC+yEyGnmMv1tmAePm woae0Zfdad0bDY2DuXQVdl9o1bKXP5YWkSJsK0Nb+PQZQGeJNQirm3K3SQ8uWO3rE4rz /AbzLp5D8ZxrcImoFo/Lgyt6niIhABzGb1r9IH+OWFs3fuZjmRw/PvHokh/zzdDLDaXh 2wGx+C2frteIuH4fXXOHP+isxxL3pdfuJMCsjGkyqMiNtJDnSeSBbWGaN3E4R4A70DwK g6Bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Ap1rrVlPYTOqnh4GnsE+49LzAyDM0X2cnywI59s+Owk=; b=HWfSOgn/bBrPZEOsFiyKj37T6ynNNclseEQ4C2viW/xGZxIDoIpxrKi5eS8SOdaOC7 lkFaqWuvypmKTRcJBAGqyQ2VTtDWikSPPFwNwhIkpzBiov6Lljt6Z/1GV5Kln1WS2stv guhdBl7T4DsBFA6y/8Dd8lAO90WiJjBvl/LcmO+p0A2OWMIicg7HuR/ozZDpQ+jW//kN 5ujlgIyGc8uyGIRIG7ypOQWQxXe/1NqQHzTIpm5qIm6rsDH+esUOnT3rrMVgAkEF6i66 iHu4fbn66g76Aw22F9V87X1KTF9BCP4LU7GBzh942Ir9ZVieM+QswFDTfuPBCcNrQpxh z9Nw== X-Gm-Message-State: APjAAAXQQFdJMta4vk+i4F986wX+M4cpTbzlrDi9wYbEmqjWnBUrtVn9 rwk2/B43CuaR7CMXwp8biQYNCRcIrcueINrb8cm4bw== X-Received: by 2002:a5d:6b11:: with SMTP id v17mr3995721wrw.323.1565088260316; Tue, 06 Aug 2019 03:44:20 -0700 (PDT) MIME-Version: 1.0 References: <20190805134201.2814-1-anup.patel@wdc.com> <20190805134201.2814-12-anup.patel@wdc.com> In-Reply-To: <20190805134201.2814-12-anup.patel@wdc.com> From: Anup Patel Date: Tue, 6 Aug 2019 16:14:09 +0530 Message-ID: Subject: Re: [PATCH v3 11/19] RISC-V: KVM: Implement VMID allocator To: Anup Patel Cc: Palmer Dabbelt , Paul Walmsley , Paolo Bonzini , Radim K , Daniel Lezcano , Thomas Gleixner , Atish Patra , Alistair Francis , Damien Le Moal , Christoph Hellwig , "kvm@vger.kernel.org" , "linux-riscv@lists.infradead.org" , "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 5, 2019 at 7:13 PM Anup Patel wrote: > > We implement a simple VMID allocator for Guests/VMs which: > 1. Detects number of VMID bits at boot-time > 2. Uses atomic number to track VMID version and increments > VMID version whenever we run-out of VMIDs > 3. Flushes Guest TLBs on all host CPUs whenever we run-out > of VMIDs > 4. Force updates HW Stage2 VMID for each Guest VCPU whenever > VMID changes using VCPU request KVM_REQ_UPDATE_HGATP > > Signed-off-by: Anup Patel > --- > arch/riscv/include/asm/kvm_host.h | 25 +++++++ > arch/riscv/kvm/Makefile | 3 +- > arch/riscv/kvm/main.c | 4 ++ > arch/riscv/kvm/tlb.S | 43 ++++++++++++ > arch/riscv/kvm/vcpu.c | 9 +++ > arch/riscv/kvm/vm.c | 6 ++ > arch/riscv/kvm/vmid.c | 111 ++++++++++++++++++++++++++++++ > 7 files changed, 200 insertions(+), 1 deletion(-) > create mode 100644 arch/riscv/kvm/tlb.S > create mode 100644 arch/riscv/kvm/vmid.c > > diff --git a/arch/riscv/include/asm/kvm_host.h b/arch/riscv/include/asm/kvm_host.h > index 947bf488f15a..a850c33634bd 100644 > --- a/arch/riscv/include/asm/kvm_host.h > +++ b/arch/riscv/include/asm/kvm_host.h > @@ -27,6 +27,7 @@ > #define KVM_REQ_SLEEP \ > KVM_ARCH_REQ_FLAGS(0, KVM_REQUEST_WAIT | KVM_REQUEST_NO_WAKEUP) > #define KVM_REQ_VCPU_RESET KVM_ARCH_REQ(1) > +#define KVM_REQ_UPDATE_HGATP KVM_ARCH_REQ(2) > > struct kvm_vm_stat { > ulong remote_tlb_flush; > @@ -47,7 +48,19 @@ struct kvm_vcpu_stat { > struct kvm_arch_memory_slot { > }; > > +struct kvm_vmid { > + /* > + * Writes to vmid_version and vmid happen with vmid_lock held > + * whereas reads happen without any lock held. > + */ > + unsigned long vmid_version; > + unsigned long vmid; > +}; > + > struct kvm_arch { > + /* stage2 vmid */ > + struct kvm_vmid vmid; > + > /* stage2 page table */ > pgd_t *pgd; > phys_addr_t pgd_phys; > @@ -166,6 +179,12 @@ static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {} > static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {} > static inline void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu) {} > > +extern void __kvm_riscv_hfence_gvma_vmid_gpa(unsigned long vmid, > + unsigned long gpa); > +extern void __kvm_riscv_hfence_gvma_vmid(unsigned long vmid); > +extern void __kvm_riscv_hfence_gvma_gpa(unsigned long gpa); > +extern void __kvm_riscv_hfence_gvma_all(void); > + > int kvm_riscv_stage2_map(struct kvm_vcpu *vcpu, gpa_t gpa, unsigned long hva, > bool is_write); > void kvm_riscv_stage2_flush_cache(struct kvm_vcpu *vcpu); > @@ -173,6 +192,12 @@ int kvm_riscv_stage2_alloc_pgd(struct kvm *kvm); > void kvm_riscv_stage2_free_pgd(struct kvm *kvm); > void kvm_riscv_stage2_update_hgatp(struct kvm_vcpu *vcpu); > > +void kvm_riscv_stage2_vmid_detect(void); > +unsigned long kvm_riscv_stage2_vmid_bits(void); > +int kvm_riscv_stage2_vmid_init(struct kvm *kvm); > +bool kvm_riscv_stage2_vmid_ver_changed(struct kvm_vmid *vmid); > +void kvm_riscv_stage2_vmid_update(struct kvm_vcpu *vcpu); > + > int kvm_riscv_vcpu_mmio_return(struct kvm_vcpu *vcpu, struct kvm_run *run); > int kvm_riscv_vcpu_exit(struct kvm_vcpu *vcpu, struct kvm_run *run, > unsigned long scause, unsigned long stval); > diff --git a/arch/riscv/kvm/Makefile b/arch/riscv/kvm/Makefile > index 845579273727..c0f57f26c13d 100644 > --- a/arch/riscv/kvm/Makefile > +++ b/arch/riscv/kvm/Makefile > @@ -8,6 +8,7 @@ ccflags-y := -Ivirt/kvm -Iarch/riscv/kvm > > kvm-objs := $(common-objs-y) > > -kvm-objs += main.o vm.o mmu.o vcpu.o vcpu_exit.o vcpu_switch.o > +kvm-objs += main.o vm.o vmid.o tlb.o mmu.o > +kvm-objs += vcpu.o vcpu_exit.o vcpu_switch.o > > obj-$(CONFIG_KVM) += kvm.o > diff --git a/arch/riscv/kvm/main.c b/arch/riscv/kvm/main.c > index f4a7a3c67f8e..927d232ee0a1 100644 > --- a/arch/riscv/kvm/main.c > +++ b/arch/riscv/kvm/main.c > @@ -66,8 +66,12 @@ int kvm_arch_init(void *opaque) > return -ENODEV; > } > > + kvm_riscv_stage2_vmid_detect(); > + > kvm_info("hypervisor extension available\n"); > > + kvm_info("host has %ld VMID bits\n", kvm_riscv_stage2_vmid_bits()); > + > return 0; > } > > diff --git a/arch/riscv/kvm/tlb.S b/arch/riscv/kvm/tlb.S > new file mode 100644 > index 000000000000..453fca8d7940 > --- /dev/null > +++ b/arch/riscv/kvm/tlb.S > @@ -0,0 +1,43 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +/* > + * Copyright (C) 2019 Western Digital Corporation or its affiliates. > + * > + * Authors: > + * Anup Patel > + */ > + > +#include > +#include > + > + .text > + .altmacro > + .option norelax > + > + /* > + * Instruction encoding of hfence.gvma is: > + * 0110001 rs2(5) rs1(5) 000 00000 1110011 > + */ > + > +ENTRY(__kvm_riscv_hfence_gvma_vmid_gpa) > + /* hfence.gvma a1, a0 */ > + .word 0x62a60073 > + ret > +ENDPROC(__kvm_riscv_hfence_gvma_vmid_gpa) > + > +ENTRY(__kvm_riscv_hfence_gvma_vmid) > + /* hfence.gvma zero, a0 */ > + .word 0x62a00073 > + ret > +ENDPROC(__kvm_riscv_hfence_gvma_vmid) > + > +ENTRY(__kvm_riscv_hfence_gvma_gpa) > + /* hfence.gvma a0 */ > + .word 0x62050073 > + ret > +ENDPROC(__kvm_riscv_hfence_gvma_gpa) > + > +ENTRY(__kvm_riscv_hfence_gvma_all) > + /* hfence.gvma */ > + .word 0x62000073 > + ret > +ENDPROC(__kvm_riscv_hfence_gvma_all) > diff --git a/arch/riscv/kvm/vcpu.c b/arch/riscv/kvm/vcpu.c > index b1591d962cee..1cba8d3af63a 100644 > --- a/arch/riscv/kvm/vcpu.c > +++ b/arch/riscv/kvm/vcpu.c > @@ -626,6 +626,12 @@ static void kvm_riscv_check_vcpu_requests(struct kvm_vcpu *vcpu) > > if (kvm_check_request(KVM_REQ_VCPU_RESET, vcpu)) > kvm_riscv_reset_vcpu(vcpu); > + > + if (kvm_check_request(KVM_REQ_UPDATE_HGATP, vcpu)) > + kvm_riscv_stage2_update_hgatp(vcpu); > + > + if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) > + __kvm_riscv_hfence_gvma_all(); > } > } > > @@ -674,6 +680,8 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run) > /* Check conditions before entering the guest */ > cond_resched(); > > + kvm_riscv_stage2_vmid_update(vcpu); > + > kvm_riscv_check_vcpu_requests(vcpu); > > preempt_disable(); > @@ -710,6 +718,7 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run) > kvm_riscv_update_vsip(vcpu); > > if (ret <= 0 || > + kvm_riscv_stage2_vmid_ver_changed(&vcpu->kvm->arch.vmid) || > kvm_request_pending(vcpu)) { > vcpu->mode = OUTSIDE_GUEST_MODE; > local_irq_enable(); > diff --git a/arch/riscv/kvm/vm.c b/arch/riscv/kvm/vm.c > index ac0211820521..c5aab5478c38 100644 > --- a/arch/riscv/kvm/vm.c > +++ b/arch/riscv/kvm/vm.c > @@ -26,6 +26,12 @@ int kvm_arch_init_vm(struct kvm *kvm, unsigned long type) > if (r) > return r; > > + r = kvm_riscv_stage2_vmid_init(kvm); > + if (r) { > + kvm_riscv_stage2_free_pgd(kvm); > + return r; > + } > + > return 0; > } > > diff --git a/arch/riscv/kvm/vmid.c b/arch/riscv/kvm/vmid.c > new file mode 100644 > index 000000000000..df19a44e1a4b > --- /dev/null > +++ b/arch/riscv/kvm/vmid.c > @@ -0,0 +1,111 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (C) 2019 Western Digital Corporation or its affiliates. > + * > + * Authors: > + * Anup Patel > + */ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +static unsigned long vmid_version = 1; > +static unsigned long vmid_next; > +static unsigned long vmid_bits; > +static DEFINE_SPINLOCK(vmid_lock); > + > +void kvm_riscv_stage2_vmid_detect(void) > +{ > + unsigned long old; > + > + /* Figure-out number of VMID bits in HW */ > + old = csr_read(CSR_HGATP); > + csr_write(CSR_HGATP, old | HGATP_VMID_MASK); > + vmid_bits = csr_read(CSR_HGATP); > + vmid_bits = (vmid_bits & HGATP_VMID_MASK) >> HGATP_VMID_SHIFT; > + vmid_bits = fls_long(vmid_bits); > + csr_write(CSR_HGATP, old); > + > + /* We polluted local TLB so flush all guest TLB */ > + __kvm_riscv_hfence_gvma_all(); > + > + /* We don't use VMID bits if they are not sufficient */ > + if ((1UL << vmid_bits) < num_possible_cpus()) > + vmid_bits = 0; > +} > + > +unsigned long kvm_riscv_stage2_vmid_bits(void) > +{ > + return vmid_bits; > +} > + > +int kvm_riscv_stage2_vmid_init(struct kvm *kvm) > +{ > + /* Mark the initial VMID and VMID version invalid */ > + kvm->arch.vmid.vmid_version = 0; > + kvm->arch.vmid.vmid = 0; > + > + return 0; > +} > + > +bool kvm_riscv_stage2_vmid_ver_changed(struct kvm_vmid *vmid) > +{ > + if (!vmid_bits) > + return false; > + > + return unlikely(READ_ONCE(vmid->vmid_version) != > + READ_ONCE(vmid_version)); > +} > + > +void kvm_riscv_stage2_vmid_update(struct kvm_vcpu *vcpu) > +{ > + int i; > + struct kvm_vcpu *v; > + struct kvm_vmid *vmid = &vcpu->kvm->arch.vmid; > + > + if (!kvm_riscv_stage2_vmid_ver_changed(vmid)) > + return; > + > + spin_lock(&vmid_lock); > + > + /* > + * We need to re-check the vmid_version here to ensure that if > + * another vcpu already allocated a valid vmid for this vm. > + */ > + if (!kvm_riscv_stage2_vmid_ver_changed(vmid)) { > + spin_unlock(&vmid_lock); > + return; > + } > + > + /* First user of a new VMID version? */ > + if (unlikely(vmid_next == 0)) { > + WRITE_ONCE(vmid_version, READ_ONCE(vmid_version) + 1); > + vmid_next = 1; > + > + /* > + * On SMP, we know no other CPUs can use this CPU's or > + * each other's VMID after forced exit returns since the > + * vmid_lock blocks them from re-entry to the guest. > + */ > + spin_unlock(&vmid_lock); > + kvm_flush_remote_tlbs(vcpu->kvm); > + spin_lock(&vmid_lock); I looked at the VMID allocator again. The intention here was to force exit on all Host CPUs and not just CPUs on which given Guest/VM is running whenever we run-out of VMIDs. To further explain above, let's say we have four Guests with single VCPU and only four possible VMIDs. Also, let's assume Guest0 to Guest2 are assigned VMID 1 to 3 respectively with VMID_VERSION = 1. Now when Guest3 starts running we run-out of VMIDs (i.e. vmid_next == 0) so kvm_riscv_stage2_vmid_update() (called for Guest3) will make the VMID_VERSION = 2 and it will be assigned VMID = 1. The previous VMID and VMID_VERSION assigned to Guest0, Guest1, and Guest2 are not out-of-date so we have to force exit for all running Guest instances so that kvm_riscv_stage2_vmid_update() is called for all Guest instances. Due to above reasons, we had an explicit IPI call previously (upto v2) instead of kvm_flush_remote_tlbs(). Regards, Anup > + } > + > + vmid->vmid = vmid_next; > + vmid_next++; > + vmid_next &= (1 << vmid_bits) - 1; > + > + WRITE_ONCE(vmid->vmid_version, READ_ONCE(vmid_version)); > + > + spin_unlock(&vmid_lock); > + > + /* Request stage2 page table update for all VCPUs */ > + kvm_for_each_vcpu(i, v, vcpu->kvm) > + kvm_make_request(KVM_REQ_UPDATE_HGATP, v); > +} > -- > 2.17.1 >