Received: by 2002:ab2:7b86:0:b0:1f7:5705:b850 with SMTP id q6csp1220072lqh; Mon, 6 May 2024 00:07:16 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUTLwQBcJ4EEx9MCxd6cDHE7HIDSioS1kmBZM4OjiNUVVLGAqDM2ckXoE6qukI62JIWbtBy0vLJSPywpY4IdwEOLXDdeplfQL9WNcjnHQ== X-Google-Smtp-Source: AGHT+IEJ8v6XA+2aucs2Xy4LSr4kcBCbcf7OCT0Ixz3MwwKarS5aleGCGepfhDjSnPzGqfVEZ6EM X-Received: by 2002:a50:d641:0:b0:568:d55c:1bb3 with SMTP id c1-20020a50d641000000b00568d55c1bb3mr6241353edj.31.1714979236592; Mon, 06 May 2024 00:07:16 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714979236; cv=pass; d=google.com; s=arc-20160816; b=Y1Aaar361gieDqnSmiccGYy3QNaO3b2CBtwr8z6UGaxj2cd7p7PB+xj8Y0wxR7sPR8 7usua27S0oA1vgddSqkV5TkfuRFtyeAo6XY1X+Xj3x2WIPKIde0hW9Qsi/Fg222+8cQA sRChP0EMR0DBw0N96xLBo1MVPwNSfx741SfwhZ7ENtUDCT+maH1IcPv0ASf15iCl36ej eGZBwGgKtEgMV/qFzO+Ygl8j5sEKm1p87nCn9nTFLybGI4euqVakFPX/gBePpbUcAn/R ByB+U1FU0jRLOiGVrjEJk8/FRmYeOIe0JV4XSWct/JxwEkWitYEXalucmGsAyQxKmwGR yhvg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=PgSmT5vdFAduLOTUYL3Yr/BMORRqakwwBXrfUPi5REE=; fh=0mm+bLaAbnvs8cOag0T92H1mdAQlIrwkTdrd0CIz3IU=; b=ftmWh0Qqdhc/Up6P+54glMAgjjj5Y4xfMm6+oWx9my9+vhnrEhr/l+x62a7vXPf+kY MndsTSCvUtm5LMxlm50PY///TMJMmWTNZ0S89ksI9NOeRYrKvW8+NZVNTjyBb8lVegol O3JDt3mSr15BSyxggoO+Rc7mHzMCH+zodoqZ5WB/TSflZVb2DCRcj6zvNfIbgZTKYk8o H6/DhC0CsgCJ0SBuJv7CdRYIM8dRElc8QRLmN68JA+GySHmWNIWIAVMJbdZDi1ilfaYG Okfa88D9mM/mN59B1PUwYbXD7u27v1QTNtnEodL5fMkk+uiRQgVLrhdeHBPf9TG5lF8M w59w==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mdcepn2e; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-169393-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-169393-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id bo17-20020a0564020b3100b005726d24cf83si4834589edb.156.2024.05.06.00.07.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 May 2024 00:07:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-169393-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mdcepn2e; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-169393-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-169393-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 2C3B61F21B31 for ; Mon, 6 May 2024 07:07:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3840E13774B; Mon, 6 May 2024 07:06:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Mdcepn2e" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DA3A850263; Mon, 6 May 2024 07:06:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714979203; cv=none; b=LkLjj85TkESi/vQoY9ZUQ9O5aGsZUmJE0+o3tUqvQpJx4RrYBpIjHLVOY1EYvEvH8UUWEzYgXqQ3IEOE3+twXg5Ss449WyWIWEaNJoIreiBA1j/Mz8fj4Ao7qjig3yrqsqn39kAd6iiT6IzeeWfQ+ZQwNq1Y6wyu3dvk4VXBvNw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714979203; c=relaxed/simple; bh=5h1FDPF6IB8H4iMHnXWkNl2tz1/bEqTnlhVm+ZhVrAk=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=FYxXwZIzCF7Nv6xso6U4uPYBI53p9sSA69TTW8Us8MmoBcaXgw+P82pn/GIQsvN2uX4pFRxci4wetOKyyUMIrJifSwxH3UWuKULBK8Mc6AZreYitYuyNBXKQH/VC2AzuhTvjSxiO+W0G/cet+f+DPM+hmwEhfXH/4Rs0KseI9D8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Mdcepn2e; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7A0CFC4AF63; Mon, 6 May 2024 07:06:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1714979203; bh=5h1FDPF6IB8H4iMHnXWkNl2tz1/bEqTnlhVm+ZhVrAk=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Mdcepn2e6ubFkSTIzkJ+qlh/SsBvE+H1KhTKFq7tgxQylOqNilkrqMBBeaJVHu7Jo WWx9xbWQvJUfNfLAmx8h7sSCjW0oBWLyXwz6ijfRrNBjv0jODvdoIcwY3gKz7hpzTT z3vJq2MUNGeAqLuC6N0cEqQDvlF+2/rURGmC0KQs5oQqKw8owxsQ+kLc9xs6TO0VTu V6jiFu67sSDPdDJjRCh/m0RczlaP2N4INBw7yd+MHfAqvixwK3FqsJu1DQhIA9W2hp CxYvjKAzI6J6/edeoRPGjOLZZunFRv7AyPaPw1A1m6TI9Zrd36YpJFpwXNbEv02xB5 Mtsd5IyHag+sw== Received: by mail-ej1-f49.google.com with SMTP id a640c23a62f3a-a59b178b75bso192716966b.0; Mon, 06 May 2024 00:06:43 -0700 (PDT) X-Forwarded-Encrypted: i=1; AJvYcCVGqEAPj1gfKlC7IpkGF5rWtzal4FzHvaQpMB/FMfPAON15ewpOBF8sHvOJ/9wt2ifYqGJFOhKD5NR/E4p8afz5vQnYL9hg85FmnWGkJoXRx1DdWoqO4DhwReVMPFm2sAeG X-Gm-Message-State: AOJu0Yz4ok1sgJfjeU/KxIFB3q6r0PEWDjzkCwmeo3fpkLU24ypje5mH rrw+OcxO8zJ8nBD22JXzTFyZaVP4dRNLR+paNy/cj34QKXTCU1erIfwES2bf2VaRsgQ9HKdz6kg V0u8Ai8JyoldvPN1XDqEhSCyUISc= X-Received: by 2002:a17:906:8462:b0:a59:9c58:763f with SMTP id hx2-20020a170906846200b00a599c58763fmr4720113ejc.39.1714979201968; Mon, 06 May 2024 00:06:41 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240428100518.1642324-1-maobibo@loongson.cn> <20240428100518.1642324-5-maobibo@loongson.cn> <7335dcde-1b3a-1260-ac62-d2d9fcbd6a78@loongson.cn> In-Reply-To: <7335dcde-1b3a-1260-ac62-d2d9fcbd6a78@loongson.cn> From: Huacai Chen Date: Mon, 6 May 2024 15:06:33 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v8 4/6] LoongArch: KVM: Add vcpu search support from physical cpuid To: maobibo Cc: Tianrui Zhao , Juergen Gross , Paolo Bonzini , Jonathan Corbet , loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, virtualization@lists.linux.dev, kvm@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi, Bibo, On Mon, May 6, 2024 at 2:36=E2=80=AFPM maobibo wrote: > > > > On 2024/5/6 =E4=B8=8A=E5=8D=889:49, Huacai Chen wrote: > > Hi, Bibo, > > > > On Sun, Apr 28, 2024 at 6:05=E2=80=AFPM Bibo Mao = wrote: > >> > >> Physical cpuid is used for interrupt routing for irqchips such as > >> ipi/msi/extioi interrupt controller. And physical cpuid is stored > >> at CSR register LOONGARCH_CSR_CPUID, it can not be changed once vcpu > >> is created and physical cpuid of two vcpus cannot be the same. > >> > >> Different irqchips have different size declaration about physical cpui= d, > >> max cpuid value for CSR LOONGARCH_CSR_CPUID on 3A5000 is 512, max cpui= d > >> supported by IPI hardware is 1024, 256 for extioi irqchip, and 65536 > >> for MSI irqchip. > >> > >> The smallest value from all interrupt controllers is selected now, > >> and the max cpuid size is defines as 256 by KVM which comes from > >> extioi irqchip. > >> > >> Signed-off-by: Bibo Mao > >> --- > >> arch/loongarch/include/asm/kvm_host.h | 26 ++++++++ > >> arch/loongarch/include/asm/kvm_vcpu.h | 1 + > >> arch/loongarch/kvm/vcpu.c | 93 +++++++++++++++++++++++++= +- > >> arch/loongarch/kvm/vm.c | 11 ++++ > >> 4 files changed, 130 insertions(+), 1 deletion(-) > >> > >> diff --git a/arch/loongarch/include/asm/kvm_host.h b/arch/loongarch/in= clude/asm/kvm_host.h > >> index 2d62f7b0d377..3ba16ef1fe69 100644 > >> --- a/arch/loongarch/include/asm/kvm_host.h > >> +++ b/arch/loongarch/include/asm/kvm_host.h > >> @@ -64,6 +64,30 @@ struct kvm_world_switch { > >> > >> #define MAX_PGTABLE_LEVELS 4 > >> > >> +/* > >> + * Physical cpu id is used for interrupt routing, there are different > >> + * definitions about physical cpuid on different hardwares. > >> + * For LOONGARCH_CSR_CPUID register, max cpuid size if 512 > >> + * For IPI HW, max dest CPUID size 1024 > >> + * For extioi interrupt controller, max dest CPUID size is 256 > >> + * For MSI interrupt controller, max supported CPUID size is 65536 > >> + * > >> + * Currently max CPUID is defined as 256 for KVM hypervisor, in futur= e > >> + * it will be expanded to 4096, including 16 packages at most. And ev= ery > >> + * package supports at most 256 vcpus > >> + */ > >> +#define KVM_MAX_PHYID 256 > >> + > >> +struct kvm_phyid_info { > >> + struct kvm_vcpu *vcpu; > >> + bool enabled; > >> +}; > >> + > >> +struct kvm_phyid_map { > >> + int max_phyid; > >> + struct kvm_phyid_info phys_map[KVM_MAX_PHYID]; > >> +}; > >> + > >> struct kvm_arch { > >> /* Guest physical mm */ > >> kvm_pte_t *pgd; > >> @@ -71,6 +95,8 @@ struct kvm_arch { > >> unsigned long invalid_ptes[MAX_PGTABLE_LEVELS]; > >> unsigned int pte_shifts[MAX_PGTABLE_LEVELS]; > >> unsigned int root_level; > >> + spinlock_t phyid_map_lock; > >> + struct kvm_phyid_map *phyid_map; > >> > >> s64 time_offset; > >> struct kvm_context __percpu *vmcs; > >> diff --git a/arch/loongarch/include/asm/kvm_vcpu.h b/arch/loongarch/in= clude/asm/kvm_vcpu.h > >> index 0cb4fdb8a9b5..9f53950959da 100644 > >> --- a/arch/loongarch/include/asm/kvm_vcpu.h > >> +++ b/arch/loongarch/include/asm/kvm_vcpu.h > >> @@ -81,6 +81,7 @@ void kvm_save_timer(struct kvm_vcpu *vcpu); > >> void kvm_restore_timer(struct kvm_vcpu *vcpu); > >> > >> int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu, struct kvm_inter= rupt *irq); > >> +struct kvm_vcpu *kvm_get_vcpu_by_cpuid(struct kvm *kvm, int cpuid); > >> > >> /* > >> * Loongarch KVM guest interrupt handling > >> diff --git a/arch/loongarch/kvm/vcpu.c b/arch/loongarch/kvm/vcpu.c > >> index 3a8779065f73..b633fd28b8db 100644 > >> --- a/arch/loongarch/kvm/vcpu.c > >> +++ b/arch/loongarch/kvm/vcpu.c > >> @@ -274,6 +274,95 @@ static int _kvm_getcsr(struct kvm_vcpu *vcpu, uns= igned int id, u64 *val) > >> return 0; > >> } > >> > >> +static inline int kvm_set_cpuid(struct kvm_vcpu *vcpu, u64 val) > >> +{ > >> + int cpuid; > >> + struct loongarch_csrs *csr =3D vcpu->arch.csr; > >> + struct kvm_phyid_map *map; > >> + > >> + if (val >=3D KVM_MAX_PHYID) > >> + return -EINVAL; > >> + > >> + cpuid =3D kvm_read_sw_gcsr(csr, LOONGARCH_CSR_ESTAT); > >> + map =3D vcpu->kvm->arch.phyid_map; > >> + spin_lock(&vcpu->kvm->arch.phyid_map_lock); > >> + if (map->phys_map[cpuid].enabled) { > >> + /* > >> + * Cpuid is already set before > >> + * Forbid changing different cpuid at runtime > >> + */ > >> + if (cpuid !=3D val) { > >> + /* > >> + * Cpuid 0 is initial value for vcpu, maybe in= valid > >> + * unset value for vcpu > >> + */ > >> + if (cpuid) { > >> + spin_unlock(&vcpu->kvm->arch.phyid_map= _lock); > >> + return -EINVAL; > >> + } > >> + } else { > >> + /* Discard duplicated cpuid set */ > >> + spin_unlock(&vcpu->kvm->arch.phyid_map_lock); > >> + return 0; > >> + } > >> + } > > I have changed the logic and comments when I apply, you can double > > check whether it is correct. > I checkout the latest version, the modification in function > kvm_set_cpuid() is good for me. Now the modified version is like this: + if (map->phys_map[cpuid].enabled) { + /* Discard duplicated CPUID set operation */ + if (cpuid =3D=3D val) { + spin_unlock(&vcpu->kvm->arch.phyid_map_lock); + return 0; + } + + /* + * CPUID is already set before + * Forbid changing different CPUID at runtime + * But CPUID 0 is the initial value for vcpu, so allow + * changing from 0 to others + */ + if (cpuid) { + spin_unlock(&vcpu->kvm->arch.phyid_map_lock); + return -EINVAL; + } + } But I still doubt whether we should allow changing from 0 to others while map->phys_map[cpuid].enabled is 1. Huacai > > > >> + > >> + if (map->phys_map[val].enabled) { > >> + /* > >> + * New cpuid is already set with other vcpu > >> + * Forbid sharing the same cpuid between different vcp= us > >> + */ > >> + if (map->phys_map[val].vcpu !=3D vcpu) { > >> + spin_unlock(&vcpu->kvm->arch.phyid_map_lock); > >> + return -EINVAL; > >> + } > >> + > >> + /* Discard duplicated cpuid set operation*/ > >> + spin_unlock(&vcpu->kvm->arch.phyid_map_lock); > >> + return 0; > >> + } > >> + > >> + kvm_write_sw_gcsr(csr, LOONGARCH_CSR_CPUID, val); > >> + map->phys_map[val].enabled =3D true; > >> + map->phys_map[val].vcpu =3D vcpu; > >> + if (map->max_phyid < val) > >> + map->max_phyid =3D val; > >> + spin_unlock(&vcpu->kvm->arch.phyid_map_lock); > >> + return 0; > >> +} > >> + > >> +struct kvm_vcpu *kvm_get_vcpu_by_cpuid(struct kvm *kvm, int cpuid) > >> +{ > >> + struct kvm_phyid_map *map; > >> + > >> + if (cpuid >=3D KVM_MAX_PHYID) > >> + return NULL; > >> + > >> + map =3D kvm->arch.phyid_map; > >> + if (map->phys_map[cpuid].enabled) > >> + return map->phys_map[cpuid].vcpu; > >> + > >> + return NULL; > >> +} > >> + > >> +static inline void kvm_drop_cpuid(struct kvm_vcpu *vcpu) > >> +{ > >> + int cpuid; > >> + struct loongarch_csrs *csr =3D vcpu->arch.csr; > >> + struct kvm_phyid_map *map; > >> + > >> + map =3D vcpu->kvm->arch.phyid_map; > >> + cpuid =3D kvm_read_sw_gcsr(csr, LOONGARCH_CSR_ESTAT); > >> + if (cpuid >=3D KVM_MAX_PHYID) > >> + return; > >> + > >> + if (map->phys_map[cpuid].enabled) { > >> + map->phys_map[cpuid].vcpu =3D NULL; > >> + map->phys_map[cpuid].enabled =3D false; > >> + kvm_write_sw_gcsr(csr, LOONGARCH_CSR_CPUID, 0); > >> + } > >> +} > > While kvm_set_cpuid() is protected by a spinlock, do kvm_drop_cpuid() > > and kvm_get_vcpu_by_cpuid() also need it? > > > It is good to me that spinlock is added in function kvm_drop_cpuid(). > And thinks for the efforts. > > Regards > Bibo Mao > >> + > >> static int _kvm_setcsr(struct kvm_vcpu *vcpu, unsigned int id, u64 v= al) > >> { > >> int ret =3D 0, gintc; > >> @@ -291,7 +380,8 @@ static int _kvm_setcsr(struct kvm_vcpu *vcpu, unsi= gned int id, u64 val) > >> kvm_set_sw_gcsr(csr, LOONGARCH_CSR_ESTAT, gintc); > >> > >> return ret; > >> - } > >> + } else if (id =3D=3D LOONGARCH_CSR_CPUID) > >> + return kvm_set_cpuid(vcpu, val); > >> > >> kvm_write_sw_gcsr(csr, id, val); > >> > >> @@ -943,6 +1033,7 @@ void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu) > >> hrtimer_cancel(&vcpu->arch.swtimer); > >> kvm_mmu_free_memory_cache(&vcpu->arch.mmu_page_cache); > >> kfree(vcpu->arch.csr); > >> + kvm_drop_cpuid(vcpu); > > I think this line should be before the above kfree(), otherwise you > > get a "use after free". > > > > Huacai > > > >> > >> /* > >> * If the vCPU is freed and reused as another vCPU, we don't = want the > >> diff --git a/arch/loongarch/kvm/vm.c b/arch/loongarch/kvm/vm.c > >> index 0a37f6fa8f2d..6006a28653ad 100644 > >> --- a/arch/loongarch/kvm/vm.c > >> +++ b/arch/loongarch/kvm/vm.c > >> @@ -30,6 +30,14 @@ int kvm_arch_init_vm(struct kvm *kvm, unsigned long= type) > >> if (!kvm->arch.pgd) > >> return -ENOMEM; > >> > >> + kvm->arch.phyid_map =3D kvzalloc(sizeof(struct kvm_phyid_map), > >> + GFP_KERNEL_ACCOUNT); > >> + if (!kvm->arch.phyid_map) { > >> + free_page((unsigned long)kvm->arch.pgd); > >> + kvm->arch.pgd =3D NULL; > >> + return -ENOMEM; > >> + } > >> + > >> kvm_init_vmcs(kvm); > >> kvm->arch.gpa_size =3D BIT(cpu_vabits - 1); > >> kvm->arch.root_level =3D CONFIG_PGTABLE_LEVELS - 1; > >> @@ -44,6 +52,7 @@ int kvm_arch_init_vm(struct kvm *kvm, unsigned long = type) > >> for (i =3D 0; i <=3D kvm->arch.root_level; i++) > >> kvm->arch.pte_shifts[i] =3D PAGE_SHIFT + i * (PAGE_SH= IFT - 3); > >> > >> + spin_lock_init(&kvm->arch.phyid_map_lock); > >> return 0; > >> } > >> > >> @@ -51,7 +60,9 @@ void kvm_arch_destroy_vm(struct kvm *kvm) > >> { > >> kvm_destroy_vcpus(kvm); > >> free_page((unsigned long)kvm->arch.pgd); > >> + kvfree(kvm->arch.phyid_map); > >> kvm->arch.pgd =3D NULL; > >> + kvm->arch.phyid_map =3D NULL; > >> } > >> > >> int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > >> -- > >> 2.39.3 > >> >