From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C9A20C432BE for ; Thu, 26 Aug 2021 10:51:04 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id A893C60F58 for ; Thu, 26 Aug 2021 10:51:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234327AbhHZKvu (ORCPT ); Thu, 26 Aug 2021 06:51:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:51804 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234055AbhHZKvu (ORCPT ); Thu, 26 Aug 2021 06:51:50 -0400 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 379C360ED5; Thu, 26 Aug 2021 10:51:03 +0000 (UTC) Received: from sofa.misterjones.org ([185.219.108.64] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1mJCyL-007KSd-6a; Thu, 26 Aug 2021 11:51:01 +0100 Date: Thu, 26 Aug 2021 11:51:00 +0100 Message-ID: <8735qwpjhn.wl-maz@kernel.org> From: Marc Zyngier To: Oliver Upton Cc: kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, Peter Shier , Ricardo Koller , Jing Zhang , Raghavendra Rao Anata , James Morse , Alexandru Elisei , Suzuki K Poulose , Andrew Jones Subject: Re: [PATCH 0/6] KVM: arm64: Implement PSCI SYSTEM_SUSPEND support In-Reply-To: References: <20210819223640.3564975-1-oupton@google.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: oupton@google.com, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, pshier@google.com, ricarkol@google.com, jingzhangos@google.com, rananta@google.com, james.morse@arm.com, Alexandru.Elisei@arm.com, suzuki.poulose@arm.com, drjones@redhat.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On Sun, 22 Aug 2021 20:56:13 +0100, Oliver Upton wrote: > > Marc, > > On Thu, Aug 19, 2021 at 3:36 PM Oliver Upton wrote: > > > > Certain VMMs/operators may wish to give their guests the ability to > > initiate a system suspend that could result in the VM being saved to > > persistent storage to be resumed at a later time. The PSCI v1.0 > > specification describes an SMC, SYSTEM_SUSPEND, that allows a kernel to > > request a system suspend. This call is optional for v1.0, and KVM > > elected to not support the call in its v1.0 implementation. > > > > This series adds support for the SYSTEM_SUSPEND PSCI call to KVM/arm64. > > Since this is a system-scoped event, KVM cannot quiesce the VM on its > > own. We add a new system exit type in this series to clue in userspace > > that a suspend was requested. Per the KVM_EXIT_SYSTEM_EVENT ABI, a VMM > > that doesn't care about this event can simply resume the guest without > > issue (we set up the calling vCPU to come out of reset correctly on next > > KVM_RUN). > > > > Patch 1 is unrelated, and is a fix for "KVM: arm64: Enforce reserved > > bits for PSCI target affinities" on the kvmarm/next branch. Nothing > > particularly hairy, just an unused param. > > Title line may not have been clear on this series, Patch 1 is a fix > for the PSCI CPU_ON series that's in kvmarm/next to suppress a > compiler warning. I'm not getting this warning. What are you compiling with? In general, the compiler should shout about unused function parameters. > > > Patch 2 simplifies the function to check if KVM allows a particular PSCI > > function. We can generally disallow any PSCI function that sets the > > SMC64 bit in the PSCI function ID. > > > > Patch 3 wraps up the PSCI reset logic used for CPU_ON, which will be > > needed later to queue up a reset on the vCPU that requested the system > > suspend. > > > > Patch 4 brings in the new UAPI and PSCI call, guarded behind a VM > > capability for backwards compatibility. > > > > Patch 5 is indirectly related to this series, and avoids compiler > > reordering on PSCI calls in the selftest introduced by "selftests: KVM: > > Introduce psci_cpu_on_test". > > This too is a fix for the PSCI CPU_ON series. Just wanted to raise it > to your attention beyond the new feature I'm working on here. I'm not sure this actually need fixing. The dependencies on the input and output will effectively prevent such reordering. That will definitely be a good cleanup though, but maybe not worth taking out of this series. Thanks, M. (trying to find excuses to close the tree quickly). -- Without deviation from the norm, progress is not possible.