From patchwork Fri Oct 11 07:50:49 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Shameerali Kolothum Thodi X-Patchwork-Id: 13832213 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8FE7FCFC611 for ; Fri, 11 Oct 2024 07:56:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Transfer-Encoding: Content-Type:MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:CC: To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=s7ZctIcJ0cn+7juijKKhLuupgvrcayc2ebyOOkEtKOk=; b=oi88TI2x0OlKtrZ9V/GDQx0mWc ElJPVW6WlvLGkPQ084xKzOdbsGUwNwCxTsq9HyW9gPmdZXUJwCHf9M8CzPw09YHAwyEL1XnI0I2Ss UXSQbeH/Zh0tX+z85iQi6VPARHp5elvaF/WW3phG7npqxBa34kA8vtsrDiVb6u6AesZsYIVI+G2ht vza3JbmiQmhhvm2iNMQupIu6GjRs/ETtog9Ydy4ANHFGTHLLROlZfKJxDy9v40r3Qvh1PxQdOigbO MmixU6TuWTVdWeyftq8uWHmZM3Nf0bXgWjpM0j3k7Cx13dHxoQ5aHPopCLTTvB2lR1XV7yqjz/zsQ reWpj8Lw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98 #2 (Red Hat Linux)) id 1szAVX-0000000Fcpb-20iH; Fri, 11 Oct 2024 07:56:19 +0000 Received: from frasgout.his.huawei.com ([185.176.79.56]) by bombadil.infradead.org with esmtps (Exim 4.98 #2 (Red Hat Linux)) id 1szARd-0000000FcKg-1NRD for linux-arm-kernel@lists.infradead.org; Fri, 11 Oct 2024 07:52:18 +0000 Received: from mail.maildlp.com (unknown [172.18.186.216]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4XPzNS51Jxz6JB4C; Fri, 11 Oct 2024 15:51:52 +0800 (CST) Received: from frapeml500008.china.huawei.com (unknown [7.182.85.71]) by mail.maildlp.com (Postfix) with ESMTPS id 8EF461400D7; Fri, 11 Oct 2024 15:52:15 +0800 (CST) Received: from A2303104131.china.huawei.com (10.203.177.241) by frapeml500008.china.huawei.com (7.182.85.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Fri, 11 Oct 2024 09:52:08 +0200 From: Shameer Kolothum To: , , CC: , , , , , , , , , , , Subject: [RFC PATCH 2/6] KVM: arm64: Add support for VMM to set migration target Date: Fri, 11 Oct 2024 08:50:49 +0100 Message-ID: <20241011075053.80540-3-shameerali.kolothum.thodi@huawei.com> X-Mailer: git-send-email 2.12.0.windows.1 In-Reply-To: <20241011075053.80540-1-shameerali.kolothum.thodi@huawei.com> References: <20241011075053.80540-1-shameerali.kolothum.thodi@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.203.177.241] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To frapeml500008.china.huawei.com (7.182.85.71) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20241011_005217_694887_D8A73013 X-CRM114-Status: GOOD ( 15.33 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Add a VM IOCTL to allow userspace(VMM) to set a number of migration target CPUs. This can be used to tell KVM the list of targets this VM will encounter in its lifetime. In subsequent patches, KVM will use this information to enable errata associated with all the target CPUs for this VM. Signed-off-by: Shameer Kolothum --- arch/arm64/include/asm/kvm_host.h | 3 +++ arch/arm64/include/uapi/asm/kvm.h | 12 ++++++++++ arch/arm64/kvm/arm.c | 38 +++++++++++++++++++++++++++++++ include/uapi/linux/kvm.h | 2 ++ 4 files changed, 55 insertions(+) diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h index 329619c6fa96..952af38729bf 100644 --- a/arch/arm64/include/asm/kvm_host.h +++ b/arch/arm64/include/asm/kvm_host.h @@ -375,6 +375,9 @@ struct kvm_arch { * the associated pKVM instance in the hypervisor. */ struct kvm_protected_vm pkvm; + + u32 num_migrn_cpus; + struct migrn_target_cpu *migrn_cpu; }; struct kvm_vcpu_fault_info { diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h index 964df31da975..321f86d747c8 100644 --- a/arch/arm64/include/uapi/asm/kvm.h +++ b/arch/arm64/include/uapi/asm/kvm.h @@ -540,6 +540,18 @@ struct reg_mask_range { __u32 reserved[13]; }; +struct migrn_target_cpu { + __u32 midr; + __u32 revidr; + __u32 aidr; + __u32 reserved; +}; + +struct kvm_arm_migrn_cpus { + __u32 ncpus; + struct migrn_target_cpu entries[] __counted_by(ncpus); +}; + #endif #endif /* __ARM_KVM_H__ */ diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c index a0d01c46e408..a7eab4095683 100644 --- a/arch/arm64/kvm/arm.c +++ b/arch/arm64/kvm/arm.c @@ -48,6 +48,9 @@ #include "sys_regs.h" +/* For now set to 4 */ +#define MAX_MIGRN_TARGET_CPUS 4 + static enum kvm_mode kvm_mode = KVM_MODE_DEFAULT; enum kvm_wfx_trap_policy { @@ -267,6 +270,7 @@ void kvm_arch_destroy_vm(struct kvm *kvm) kvm_destroy_mpidr_data(kvm); kfree(kvm->arch.sysreg_masks); + kfree(kvm->arch.migrn_cpu); kvm_destroy_vcpus(kvm); kvm_unshare_hyp(kvm, kvm + 1); @@ -339,6 +343,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) case KVM_CAP_ARM_SYSTEM_SUSPEND: case KVM_CAP_IRQFD_RESAMPLE: case KVM_CAP_COUNTER_OFFSET: + case KVM_CAP_ARM_MIGRN_TARGET_CPUS: r = 1; break; case KVM_CAP_SET_GUEST_DEBUG2: @@ -1904,6 +1909,39 @@ int kvm_arch_vm_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) return -EFAULT; return kvm_vm_ioctl_get_reg_writable_masks(kvm, &range); } + case KVM_ARM_SET_MIGRN_TARGET_CPUS: { + struct kvm_arm_migrn_cpus __user *user_cpus = argp; + struct kvm_arm_migrn_cpus cpus; + struct migrn_target_cpu *entries; + u32 size; + int ret; + + mutex_lock(&kvm->lock); + if (kvm->arch.num_migrn_cpus) { + ret = -EINVAL; + goto migrn_target_cpus_unlock; + } + if (copy_from_user(&cpus, user_cpus, sizeof(*user_cpus))) { + ret = -EFAULT; + goto migrn_target_cpus_unlock; + } + if (cpus.ncpus > MAX_MIGRN_TARGET_CPUS) { + ret = -E2BIG; + goto migrn_target_cpus_unlock; + } + size = sizeof(struct migrn_target_cpu) * cpus.ncpus; + entries = memdup_user(user_cpus->entries, size); + if (IS_ERR(entries)) { + ret = PTR_ERR(entries); + goto migrn_target_cpus_unlock; + } + kvm->arch.num_migrn_cpus = cpus.ncpus; + kvm->arch.migrn_cpu = entries; + ret = 0; +migrn_target_cpus_unlock: + mutex_unlock(&kvm->lock); + return ret; + } default: return -EINVAL; } diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 637efc055145..5ec035a7092a 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -933,6 +933,7 @@ struct kvm_enable_cap { #define KVM_CAP_PRE_FAULT_MEMORY 236 #define KVM_CAP_X86_APIC_BUS_CYCLES_NS 237 #define KVM_CAP_X86_GUEST_MODE 238 +#define KVM_CAP_ARM_MIGRN_TARGET_CPUS 239 struct kvm_irq_routing_irqchip { __u32 irqchip; @@ -1250,6 +1251,7 @@ struct kvm_vfio_spapr_tce { /* Available with KVM_CAP_COUNTER_OFFSET */ #define KVM_ARM_SET_COUNTER_OFFSET _IOW(KVMIO, 0xb5, struct kvm_arm_counter_offset) #define KVM_ARM_GET_REG_WRITABLE_MASKS _IOR(KVMIO, 0xb6, struct reg_mask_range) +#define KVM_ARM_SET_MIGRN_TARGET_CPUS _IOW(KVMIO, 0xb7, struct kvm_arm_migrn_cpus) /* ioctl for vm fd */ #define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)