From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B58FC38A24 for ; Thu, 7 May 2020 14:22:47 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 0D1722084D for ; Thu, 7 May 2020 14:22:46 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="M9oBaw/C" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0D1722084D Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:Date: Message-ID:References:To:Subject:From:Reply-To:Content-ID:Content-Description :Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=bh20cS6v1yD+tftrv9xnsFQrRZUaad4kPURPYa29n4Y=; b=M9oBaw/CYfLPnL mwpDTMQCKm/hM9edKEDCtS/3+HDUb1MZUi4p7p2PUsjH9/58/sxHPgqyq4bVNHSOYX231FPoYjpL9 MW2RjXcNNyCsZGD4+raz/SPn0nZC2japKSs9iEJwH6lfYfCAuPO4aqoTOKA9tqC0J1ck+SZbW9lRa SAdbLJX0284/RChNl6vnDqoStHwwyn9qrt+9akKTF8Wyk5zHkvmSDvyeJE4DvVF5lSdb+0qOjXP7r omVvl5+U8gXb2gD+WD0IrbrHHcaEavUX3cXCFwgspZwtUxdnK354PEEL+9R77jf8PxXOEbrdNwCvO nG58L3KoQk5Npm3jXjhw==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jWhQE-00061d-HH; Thu, 07 May 2020 14:22:46 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jWhQ9-00060j-Dq for linux-arm-kernel@lists.infradead.org; Thu, 07 May 2020 14:22:44 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F3F41D6E; Thu, 7 May 2020 07:22:39 -0700 (PDT) Received: from [10.163.73.155] (unknown [10.163.73.155]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D8ED23F68F; Thu, 7 May 2020 07:22:36 -0700 (PDT) From: Anshuman Khandual Subject: Re: [PATCH] arm64/cpufeature: Verify KVM capabilities during CPU hotplug To: Marc Zyngier References: <1588832387-8489-1-git-send-email-anshuman.khandual@arm.com> <20200507112028.4a5cc279@why> Message-ID: <5f75d3e5-df3a-0570-4cb1-37826b9099d8@arm.com> Date: Thu, 7 May 2020 19:52:06 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20200507112028.4a5cc279@why> Content-Language: en-US X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200507_072241_549827_BC16ADA5 X-CRM114-Status: GOOD ( 22.14 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Suzuki K Poulose , Catalin Marinas , linux-kernel@vger.kernel.org, James Morse , Will Deacon , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org On 05/07/2020 03:50 PM, Marc Zyngier wrote: > On Thu, 7 May 2020 11:49:47 +0530 > Anshuman Khandual wrote: > > Hi Anshuman, Hi Marc, > >> This validates KVM capabilities like VMID width, IPA range for hotplug CPU >> against system finalized values. While here, it factors out get_vmid_bits() >> for general use and also defines ID_AA64MMFR0_PARANGE_MASK. > > nit: these are not KVM-specific capabilities, but general > virtualization features. Sure, will change as (s/kvm/hyp) instead and update the commit message here. > >> >> Cc: Catalin Marinas >> Cc: Will Deacon >> Cc: Marc Zyngier >> Cc: Mark Rutland >> Cc: James Morse >> Cc: Suzuki K Poulose >> Cc: linux-arm-kernel@lists.infradead.org >> Cc: kvmarm@lists.cs.columbia.edu >> Cc: linux-kernel@vger.kernel.org >> >> Suggested-by: Suzuki Poulose >> Signed-off-by: Anshuman Khandual >> --- >> arch/arm64/include/asm/cpufeature.h | 22 +++++++++++++++++++ >> arch/arm64/include/asm/kvm_mmu.h | 2 +- >> arch/arm64/include/asm/sysreg.h | 1 + >> arch/arm64/kernel/cpufeature.c | 2 ++ >> arch/arm64/kvm/reset.c | 33 +++++++++++++++++++++++++++-- >> 5 files changed, 57 insertions(+), 3 deletions(-) >> >> diff --git a/arch/arm64/include/asm/cpufeature.h b/arch/arm64/include/asm/cpufeature.h >> index afe08251ff95..6808a2091de4 100644 >> --- a/arch/arm64/include/asm/cpufeature.h >> +++ b/arch/arm64/include/asm/cpufeature.h >> @@ -745,6 +745,28 @@ static inline bool cpu_has_hw_af(void) >> extern bool cpu_has_amu_feat(int cpu); >> #endif >> >> +static inline unsigned int get_vmid_bits(u64 mmfr1) >> +{ >> + int vmid_bits; >> + >> + vmid_bits = cpuid_feature_extract_unsigned_field(mmfr1, >> + ID_AA64MMFR1_VMIDBITS_SHIFT); >> + if (vmid_bits == ID_AA64MMFR1_VMIDBITS_16) >> + return 16; >> + >> + /* >> + * Return the default here even if any reserved >> + * value is fetched from the system register. >> + */ >> + return 8; >> +} >> + >> +#ifdef CONFIG_KVM_ARM_HOST >> +void verify_kvm_capabilities(void); >> +#else >> +static inline void verify_kvm_capabilities(void) { } >> +#endif >> + >> #endif /* __ASSEMBLY__ */ >> >> #endif >> diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h >> index 30b0e8d6b895..a7137e144b97 100644 >> --- a/arch/arm64/include/asm/kvm_mmu.h >> +++ b/arch/arm64/include/asm/kvm_mmu.h >> @@ -416,7 +416,7 @@ static inline unsigned int kvm_get_vmid_bits(void) >> { >> int reg = read_sanitised_ftr_reg(SYS_ID_AA64MMFR1_EL1); >> >> - return (cpuid_feature_extract_unsigned_field(reg, >> ID_AA64MMFR1_VMIDBITS_SHIFT) == 2) ? 16 : 8; >> + return get_vmid_bits(reg); >> } >> >> /* >> diff --git a/arch/arm64/include/asm/sysreg.h >> b/arch/arm64/include/asm/sysreg.h index c4ac0ac25a00..3510a4668970 >> 100644 --- a/arch/arm64/include/asm/sysreg.h >> +++ b/arch/arm64/include/asm/sysreg.h >> @@ -705,6 +705,7 @@ >> #define ID_AA64MMFR0_TGRAN16_SUPPORTED 0x1 >> #define ID_AA64MMFR0_PARANGE_48 0x5 >> #define ID_AA64MMFR0_PARANGE_52 0x6 >> +#define ID_AA64MMFR0_PARANGE_MASK 0x7 >> >> #ifdef CONFIG_ARM64_PA_BITS_52 >> #define ID_AA64MMFR0_PARANGE_MAX ID_AA64MMFR0_PARANGE_52 >> diff --git a/arch/arm64/kernel/cpufeature.c >> b/arch/arm64/kernel/cpufeature.c index 9fac745aa7bb..041dd610b0f8 >> 100644 --- a/arch/arm64/kernel/cpufeature.c >> +++ b/arch/arm64/kernel/cpufeature.c >> @@ -2206,6 +2206,8 @@ static void verify_local_cpu_capabilities(void) >> >> if (system_supports_sve()) >> verify_sve_features(); >> + >> + verify_kvm_capabilities(); > > You should only check this if booted at EL2. Otherwise, it doesn't > really matter. Sure, will first check on is_hyp_mode_available() before calling into verify_kvm_capabilities(). > >> } >> >> void check_local_cpu_capabilities(void) >> diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c >> index 30b7ea680f66..1eebcc2a8396 100644 >> --- a/arch/arm64/kvm/reset.c >> +++ b/arch/arm64/kvm/reset.c >> @@ -340,11 +340,39 @@ int kvm_reset_vcpu(struct kvm_vcpu *vcpu) >> return ret; >> } >> >> +void verify_kvm_capabilities(void) > > This is really in the wrong file. reset.c is supposed to contain things > that are meaningful to the guest reset state. This clearly isn't. I'd > suggest you add an accessor for the kvm_ipa_limit variable, and keep > the function next to the other verify_* functions in cpufeature.c. Sure, will do. _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel