Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2139941iof; Tue, 7 Jun 2022 21:05:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJydicYX5agHpnHJ1PE/BZsdlqKz3hgl9NiL7BYlozuuzA/idzkUKoChpalvCEgZ8VQPpnMH X-Received: by 2002:a62:ed0e:0:b0:4fa:11ed:2ad1 with SMTP id u14-20020a62ed0e000000b004fa11ed2ad1mr32900680pfh.34.1654661106498; Tue, 07 Jun 2022 21:05:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654661106; cv=none; d=google.com; s=arc-20160816; b=mdvpjfICU4s/rG693GWVGMwjDRoQVIeRmNLcK7Ue5fpIVLklPFRsAZoUw4WFIy0rjX Hs9bjWDuPQnFqwqCNLY8aU0sIqKW2iKFwQnrGQEwGTsMcJ2FYcAfveTCBJFjpYqCh78I +jTbX+JeH+UyI5OL2Wv3OuDC66ryWxvLGXd2ylpimOMZaa+D6/Og4BvZwjqwgvxZsihQ thLBZNa31bRdYxVXX3Cwa6/14hA0VVF/fp2sndZThMOfAKlSaPhdJecsyErnRrfltQb2 IopooB6oNSDiDq/4my+OPoJ0lmtOSJISbEMaG2WSlsULpY5lfsCq6ckYcbBj9aPr7aqU xowg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=dtAAFPAK9nZ0pTcwBhR9/Qp8U0Xo4Qyrs4+xY7EZesg=; b=zRmmB9my57drUI/sEi6SrQrzGujN7Iw6f7ZH3kos5+yFmiKLYGSV1isI5pVmY3o+cx TzMdHEwFtdjtKqaQDSueKsgTj2Pg8+1/+R2pvagp4GB5yXrPoNCQ7JLO7K0IdUa+XRTB OPT6IHe9nKdq6hrb76QibaO3gGjLR/xHxttwkh6TxuwHNe+TfxxGQZn8oqW01mF5/dYP ypTbkbnEte3iaVOyslps+Y22w3VGGY6AkuBbqUPaJbsne4FmH3auDFOuxY8xVWOmqLJP /BdIQvKz9T1v0HYnSDAR5NB+imyhNJkbsnePG7BI9naf9t1oJJvh0j6p15AMlRwVzFWl SPKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hPP3PYKS; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id ge7-20020a17090b0e0700b001d2865c095fsi24125937pjb.61.2022.06.07.21.05.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 21:05:06 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hPP3PYKS; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id AA6C6195968; Tue, 7 Jun 2022 20:31:06 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239549AbiFGJdp (ORCPT + 99 others); Tue, 7 Jun 2022 05:33:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58456 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234297AbiFGJdn (ORCPT ); Tue, 7 Jun 2022 05:33:43 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8EEFB1A3AF for ; Tue, 7 Jun 2022 02:33:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1654594421; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=dtAAFPAK9nZ0pTcwBhR9/Qp8U0Xo4Qyrs4+xY7EZesg=; b=hPP3PYKSmBPkKvBopf10SiJHOJY80kO1EtShu+rsdy3eXj+v7zflFtmwJmTpxnIEyN2K5Q j+kiKcnxXY/n5Hd71yuL3aohT3DxHQtWYSTxu0VsteVa79aBfrAfbWxZ1fV+YOh8PaNtpt y/QG0I3NndwLp/f9fmwHoGERYf1d1yE= Received: from mail-qt1-f197.google.com (mail-qt1-f197.google.com [209.85.160.197]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-257-SayrG_wsN0i5qYj-CgknEw-1; Tue, 07 Jun 2022 05:33:38 -0400 X-MC-Unique: SayrG_wsN0i5qYj-CgknEw-1 Received: by mail-qt1-f197.google.com with SMTP id m6-20020ac866c6000000b002f52f9fb4edso13474244qtp.19 for ; Tue, 07 Jun 2022 02:33:37 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=dtAAFPAK9nZ0pTcwBhR9/Qp8U0Xo4Qyrs4+xY7EZesg=; b=q1bZILI0ZZXttJO4DUOm/rIyt/uZSxjlEct5/GORivo2kHBlvQ1PLCv5KaEdoLLf0H I+iLAVwwhx/gmCg+a4Uyld/JuJtu/BdvshMvFzm8Odh/fyNx6uGXWjLoz7pAC/MLJCfu 3xjAYwvzFh19sJ96bzlYIDZjyMrUXzqCA3wF3i3a+PCk0/IFVJj+RvxYRQYmOxAZHdXb wvpr/9HhLpBF75ePvdfVtR5rq/Gq0gRJWDSle7aMhpvQSpzT59O3KJBeiWwW71Snhx65 x1b6fAKiQmlZ33Y6F1FXr1CNH+5s37GYLExMXNs6ZgygGpF/E9UlSAUB6yvI95Kay5VI 9pRQ== X-Gm-Message-State: AOAM533tPfNxMQ1sfQo2JEnQw5lyIvYXKVgULkF2hIm8ossbH2DczGs0 jlaf8JHJtIrA5aD9np/srwPXmmfdA27aG7Gzz3ev6iNmlq3LkBftVMlVcAmh4fnrXEXL+2/5Rlv BBYkLGZhwehlIupAA+PVsHuar X-Received: by 2002:ae9:efd4:0:b0:6a6:accc:3923 with SMTP id d203-20020ae9efd4000000b006a6accc3923mr10260015qkg.572.1654594417417; Tue, 07 Jun 2022 02:33:37 -0700 (PDT) X-Received: by 2002:ae9:efd4:0:b0:6a6:accc:3923 with SMTP id d203-20020ae9efd4000000b006a6accc3923mr10260002qkg.572.1654594417172; Tue, 07 Jun 2022 02:33:37 -0700 (PDT) Received: from [10.35.4.238] (bzq-82-81-161-50.red.bezeqint.net. [82.81.161.50]) by smtp.gmail.com with ESMTPSA id g20-20020a05620a40d400b006a5d8d96681sm5490218qko.100.2022.06.07.02.33.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 02:33:36 -0700 (PDT) Message-ID: <72303d13380dedcfa273d471b8fc7ebf89fb403f.camel@redhat.com> Subject: Re: [PATCH v6 11/38] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush From: Maxim Levitsky To: Vitaly Kuznetsov , kvm@vger.kernel.org, Paolo Bonzini Cc: Sean Christopherson , Wanpeng Li , Jim Mattson , Michael Kelley , Siddharth Chandrasekaran , Yuan Yao , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 07 Jun 2022 12:33:33 +0300 In-Reply-To: <20220606083655.2014609-12-vkuznets@redhat.com> References: <20220606083655.2014609-1-vkuznets@redhat.com> <20220606083655.2014609-12-vkuznets@redhat.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.40.4 (3.40.4-2.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2022-06-06 at 10:36 +0200, Vitaly Kuznetsov wrote: > To handle L2 TLB flush requests, KVM needs to use a separate fifo from > regular (L1) Hyper-V TLB flush requests: e.g. when a request to flush > something in L2 is made, the target vCPU can transition from L2 to L1, > receive a request to flush a GVA for L1 and then try to enter L2 back. > The first request needs to be processed at this point. Similarly, > requests to flush GVAs in L1 must wait until L2 exits to L1. > > No functional change as KVM doesn't handle L2 TLB flush requests from > L2 yet. > > Signed-off-by: Vitaly Kuznetsov > --- >  arch/x86/include/asm/kvm_host.h |  8 +++++++- >  arch/x86/kvm/hyperv.c           | 11 +++++++---- >  arch/x86/kvm/hyperv.h           | 17 ++++++++++++++--- >  3 files changed, 28 insertions(+), 8 deletions(-) > > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index cf3748be236d..0e58ab00dff0 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -613,6 +613,12 @@ struct kvm_vcpu_hv_synic { >   */ >  #define KVM_HV_TLB_FLUSHALL_ENTRY  ((u64)-1) >   > +enum hv_tlb_flush_fifos { > +       HV_L1_TLB_FLUSH_FIFO, > +       HV_L2_TLB_FLUSH_FIFO, > +       HV_NR_TLB_FLUSH_FIFOS, > +}; > + >  struct kvm_vcpu_hv_tlb_flush_fifo { >         spinlock_t write_lock; >         DECLARE_KFIFO(entries, u64, KVM_HV_TLB_FLUSH_FIFO_SIZE); > @@ -638,7 +644,7 @@ struct kvm_vcpu_hv { >                 u32 syndbg_cap_eax; /* HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES.EAX */ >         } cpuid_cache; >   > -       struct kvm_vcpu_hv_tlb_flush_fifo tlb_flush_fifo; > +       struct kvm_vcpu_hv_tlb_flush_fifo tlb_flush_fifo[HV_NR_TLB_FLUSH_FIFOS]; >  }; >   >  /* Xen HVM per vcpu emulation context */ > diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c > index b347971b3924..32f223bbea6b 100644 > --- a/arch/x86/kvm/hyperv.c > +++ b/arch/x86/kvm/hyperv.c > @@ -956,8 +956,10 @@ static int kvm_hv_vcpu_init(struct kvm_vcpu *vcpu) >   >         hv_vcpu->vp_index = vcpu->vcpu_idx; >   > -       INIT_KFIFO(hv_vcpu->tlb_flush_fifo.entries); > -       spin_lock_init(&hv_vcpu->tlb_flush_fifo.write_lock); > +       for (i = 0; i < HV_NR_TLB_FLUSH_FIFOS; i++) { > +               INIT_KFIFO(hv_vcpu->tlb_flush_fifo[i].entries); > +               spin_lock_init(&hv_vcpu->tlb_flush_fifo[i].write_lock); > +       } >   >         return 0; >  } > @@ -1843,7 +1845,8 @@ static void hv_tlb_flush_enqueue(struct kvm_vcpu *vcpu, u64 *entries, int count) >         if (!hv_vcpu) >                 return; >   > -       tlb_flush_fifo = &hv_vcpu->tlb_flush_fifo; > +       /* kvm_hv_flush_tlb() is not ready to handle requests for L2s yet */ > +       tlb_flush_fifo = &hv_vcpu->tlb_flush_fifo[HV_L1_TLB_FLUSH_FIFO]; Yes, as expected here the local var starts to make sense. >   >         spin_lock_irqsave(&tlb_flush_fifo->write_lock, flags); >   > @@ -1880,7 +1883,7 @@ void kvm_hv_vcpu_flush_tlb(struct kvm_vcpu *vcpu) >                 return; >         } >   > -       tlb_flush_fifo = &hv_vcpu->tlb_flush_fifo; > +       tlb_flush_fifo = kvm_hv_get_tlb_flush_fifo(vcpu); >   >         count = kfifo_out(&tlb_flush_fifo->entries, entries, KVM_HV_TLB_FLUSH_FIFO_SIZE); >   > diff --git a/arch/x86/kvm/hyperv.h b/arch/x86/kvm/hyperv.h > index e5b32266ff7d..207d24efdc5a 100644 > --- a/arch/x86/kvm/hyperv.h > +++ b/arch/x86/kvm/hyperv.h > @@ -22,6 +22,7 @@ >  #define __ARCH_X86_KVM_HYPERV_H__ >   >  #include > +#include "x86.h" >   >  /* >   * The #defines related to the synthetic debugger are required by KDNet, but > @@ -147,16 +148,26 @@ int kvm_vm_ioctl_hv_eventfd(struct kvm *kvm, struct kvm_hyperv_eventfd *args); >  int kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid, >                      struct kvm_cpuid_entry2 __user *entries); >   > +static inline struct kvm_vcpu_hv_tlb_flush_fifo *kvm_hv_get_tlb_flush_fifo(struct kvm_vcpu *vcpu) > +{ > +       struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); > +       int i = !is_guest_mode(vcpu) ? HV_L1_TLB_FLUSH_FIFO : > +                                      HV_L2_TLB_FLUSH_FIFO; > + > +       /* KVM does not handle L2 TLB flush requests yet */ > +       WARN_ON_ONCE(i != HV_L1_TLB_FLUSH_FIFO); > + > +       return &hv_vcpu->tlb_flush_fifo[i]; > +} >   >  static inline void kvm_hv_vcpu_empty_flush_tlb(struct kvm_vcpu *vcpu) >  { >         struct kvm_vcpu_hv_tlb_flush_fifo *tlb_flush_fifo; > -       struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); >   > -       if (!hv_vcpu || !kvm_check_request(KVM_REQ_HV_TLB_FLUSH, vcpu)) > +       if (!to_hv_vcpu(vcpu) || !kvm_check_request(KVM_REQ_HV_TLB_FLUSH, vcpu)) >                 return; >   > -       tlb_flush_fifo = &hv_vcpu->tlb_flush_fifo; > +       tlb_flush_fifo = kvm_hv_get_tlb_flush_fifo(vcpu); >   >         kfifo_reset_out(&tlb_flush_fifo->entries); >  } Looks great, Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky