Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp4806450rdb; Fri, 15 Sep 2023 12:53:00 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGe4bfMxBcSsMqIjFpXAaKHFtx3xfLlVkdPwCgcWxNVYB9ltREPbOUccK+Ag0yyGZmDLv4X X-Received: by 2002:a05:6358:89d:b0:142:e748:8f0a with SMTP id m29-20020a056358089d00b00142e7488f0amr2976811rwj.1.1694807579885; Fri, 15 Sep 2023 12:52:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694807579; cv=none; d=google.com; s=arc-20160816; b=RIM/Gg1EoAoAqNaOhFuyX7YMtcQP4ZeayBUJq69VZI/8e2frH1ZWEsAuJerG+y0lLc P17A3pjFaAuTqW+WlqSKC8JNLBEzVEs99IqRB4P3nwKU1631bY15Kync4MRj0QGL9R7m zBMtofi+tgv7m4FAm9fBlXgp/MqnKYFWZoozs1EI9dfOo4nCN8jaDfzrpCOoJcew5hxd OGMnQ0GupWTcvTK6uhqAMyYHi5ftbmr9CXCI6ovGShfpYVEMbSX39w414oAPcuNUZfhm 4Hlx8KzZ33A9Q2ZXUwSLojNpyFTFjA5pjwKZ+drtQ6oK+QI3ChFPOseik3WDXD28ntFV ef2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=6ggp2BB16iuPy0E9mpIKP4GvDgaoK0t3AKedagkTatk=; fh=4I6BNv7iobpZrRcbueKA7r9RD02xPQmynyU/PeDFguM=; b=YfVb9BYUCwfxOXctMV3T8vFVcD27NcOMBQVkVvreZGWdk8uBuKn6K24pRu2ibq8Qu3 3VtUNFvI3gSNzakOson12vx1SGAdr0x/NnDQ652tQlrbck/cpfGc3XxnRZzAr/UHcvRP n6lhGe+bmopTFja0COviyscnDk684oneD4lqZ/TlwbjMtquCDSQC6wsU66nRcx/y95/9 pyoNVBsl+OUoaB4tMY4Qyby7O2hBU7LUOKVHEKX+GVqpF2UFpxN+J7nu1BV0YbsxdT8l BJ+6l6Kc3a2BK+1oovCgnzIL9SgSORBsKWEg2IkViq1IuAUVtyBrT42pKb1EjufZ8z2Z Wjpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=ZzbIXviT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id o23-20020a63fb17000000b00573fa4cfe49si3689995pgh.166.2023.09.15.12.52.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Sep 2023 12:52:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=ZzbIXviT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id AC76C82B64E1; Fri, 15 Sep 2023 12:34:28 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237003AbjIOTdz (ORCPT + 99 others); Fri, 15 Sep 2023 15:33:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59698 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237078AbjIOTde (ORCPT ); Fri, 15 Sep 2023 15:33:34 -0400 Received: from out-221.mta0.migadu.com (out-221.mta0.migadu.com [IPv6:2001:41d0:1004:224b::dd]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 773331FD0 for ; Fri, 15 Sep 2023 12:33:28 -0700 (PDT) Date: Fri, 15 Sep 2023 19:33:21 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1694806406; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=6ggp2BB16iuPy0E9mpIKP4GvDgaoK0t3AKedagkTatk=; b=ZzbIXviTy6bhzqZZX5Ps8kN8VwMXijVJBl8SakQ+eOQu2eaUOTkrr24QCItPxAwDZ4fuyw 1hh5gZkmOd82Epwsq1elQzCHy8ZZ5gh9ICdXBB3IkqiWRAl/WGWSHhGVvs9I1YlmAb9C3v AQ/T2RAVP3V6v1p0eYFhGlBhKJs1Mpc= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Oliver Upton To: Raghavendra Rao Ananta Cc: Marc Zyngier , Alexandru Elisei , James Morse , Suzuki K Poulose , Paolo Bonzini , Zenghui Yu , Shaoqin Huang , Jing Zhang , Reiji Watanabe , Colton Lewis , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: Re: [PATCH v5 02/12] KVM: arm64: PMU: Set the default PMU for the guest on vCPU reset Message-ID: References: <20230817003029.3073210-1-rananta@google.com> <20230817003029.3073210-3-rananta@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230817003029.3073210-3-rananta@google.com> X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 15 Sep 2023 12:34:28 -0700 (PDT) On Thu, Aug 17, 2023 at 12:30:19AM +0000, Raghavendra Rao Ananta wrote: > From: Reiji Watanabe > > The following patches will use the number of counters information > from the arm_pmu and use this to set the PMCR.N for the guest > during vCPU reset. However, since the guest is not associated > with any arm_pmu until userspace configures the vPMU device > attributes, and a reset can happen before this event, call > kvm_arm_support_pmu_v3() just before doing the reset. > > No functional change intended. But there absolutely is a functional change here, and user visible at that. KVM_ARM_VCPU_INIT ioctls can now fail with -ENODEV, which is not part of the documented errors for the interface. > Signed-off-by: Reiji Watanabe > Signed-off-by: Raghavendra Rao Ananta > --- > arch/arm64/kvm/pmu-emul.c | 9 +-------- > arch/arm64/kvm/reset.c | 18 +++++++++++++----- > include/kvm/arm_pmu.h | 6 ++++++ > 3 files changed, 20 insertions(+), 13 deletions(-) > > diff --git a/arch/arm64/kvm/pmu-emul.c b/arch/arm64/kvm/pmu-emul.c > index 0ffd1efa90c07..b87822024828a 100644 > --- a/arch/arm64/kvm/pmu-emul.c > +++ b/arch/arm64/kvm/pmu-emul.c > @@ -865,7 +865,7 @@ static bool pmu_irq_is_valid(struct kvm *kvm, int irq) > return true; > } > > -static int kvm_arm_set_vm_pmu(struct kvm *kvm, struct arm_pmu *arm_pmu) > +int kvm_arm_set_vm_pmu(struct kvm *kvm, struct arm_pmu *arm_pmu) > { > lockdep_assert_held(&kvm->arch.config_lock); > > @@ -937,13 +937,6 @@ int kvm_arm_pmu_v3_set_attr(struct kvm_vcpu *vcpu, struct kvm_device_attr *attr) > if (vcpu->arch.pmu.created) > return -EBUSY; > > - if (!kvm->arch.arm_pmu) { > - int ret = kvm_arm_set_vm_pmu(kvm, NULL); > - > - if (ret) > - return ret; > - } > - > switch (attr->attr) { > case KVM_ARM_VCPU_PMU_V3_IRQ: { > int __user *uaddr = (int __user *)(long)attr->addr; > diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c > index bc8556b6f4590..4c20f1ccd0789 100644 > --- a/arch/arm64/kvm/reset.c > +++ b/arch/arm64/kvm/reset.c > @@ -206,6 +206,7 @@ static int kvm_vcpu_enable_ptrauth(struct kvm_vcpu *vcpu) > */ > int kvm_reset_vcpu(struct kvm_vcpu *vcpu) > { > + struct kvm *kvm = vcpu->kvm; > struct vcpu_reset_state reset_state; > int ret; > bool loaded; > @@ -216,6 +217,18 @@ int kvm_reset_vcpu(struct kvm_vcpu *vcpu) > vcpu->arch.reset_state.reset = false; > spin_unlock(&vcpu->arch.mp_state_lock); > > + /* > + * When the vCPU has a PMU, but no PMU is set for the guest > + * yet, set the default one. > + */ > + if (kvm_vcpu_has_pmu(vcpu) && unlikely(!kvm->arch.arm_pmu)) { > + ret = -EINVAL; > + if (kvm_arm_support_pmu_v3()) > + ret = kvm_arm_set_vm_pmu(kvm, NULL); > + if (ret) > + return ret; > + } > + On top of my prior suggestion w.r.t. the default PMU helper, I'd rather see this block look like: if (kvm_vcpu_has_pmu(vcpu)) { if (!kvm_arm_support_pmu_v3()) return -EINVAL; /* * When the vCPU has a PMU but no PMU is set for the * guest yet, set the default one. */ if (unlikely(!kvm->arch.arm_pmu) && kvm_set_default_pmu(kvm)) return -EINVAL; } This would eliminate the possibility of returning ENODEV to userspace where we shouldn't. -- Thanks, Oliver