Message ID | 20230116040405.260935-2-gshan@redhat.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp1010560wrn; Sun, 15 Jan 2023 20:08:54 -0800 (PST) X-Google-Smtp-Source: AMrXdXvMS1LW28BoXDwSV3GS+S5ZFbrNWW0AvtfirYH7fWNECsv4DSQV92jN7Zf7E5AJvPBJjXR8 X-Received: by 2002:a17:90a:ead2:b0:226:f8dc:b237 with SMTP id ev18-20020a17090aead200b00226f8dcb237mr31338978pjb.31.1673842134157; Sun, 15 Jan 2023 20:08:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673842134; cv=none; d=google.com; s=arc-20160816; b=JgP11fWxWa2aEzmUhkpcwUB6GLJSIfDMDzVq98DJndA9gMSAcfHBb5bgglFrOOY0r2 SbkiL2gp1MyIlzROG3ZZ5Uj6In8EMwEONYcHtBf9sTq7iAbsh6v7pWh5/qbNQ7sL9aru NWM4GQBiRHgVS87Nihj/ko+Ml4bFBGKysvaicceo87rCm4SR6asZPSGHMAyxAUBkzCAF SvPh3VKV478c/6KXgRmnjMSjGye/EI8tRDfMekHr5A8aBJPSfVfjNQlfMD15Z2Su97Sx i7fy7BwVDq1GwQdm5yxDAujAT6MQzMlFaYonIoXE8GC7akoCytMD4GyXX14DRZ3Xg6YH 4jUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=QaWOUNPCOLrCK48ZZkRvvzXiWltPmrtQJNoTHypPAnc=; b=cGKRgeRs5+oVu8Epqlads/gex8c9tFBbWHwuoCCWShz1mKsJ6IwAlBkNT7JE0QFh27 QHsnTh4Ye9FOZmR6IJ4pNm2DwtJROHz+00DkMXVIcJUgJaUia7c0JSDk0eRjaY7rQzM5 3NJ9rd9IlEBwwvoD49olPpSvQwH+frRF7DkdtArcZfffYBfBPEoH41gL9h8nr9KdETFg u+5luzq6u1sMwg0l5UhNGEHXDx5x7me9kmBf7AWQF/VA4Ipl+eZbtbrGO8Lfh7WxNmYS 7uNzMYTzRtFVyNsqATnz/yuKwdOFrhfFg9Lkv43se+GRfVBFZgltlyoOViKBZuVsE8u6 hhyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HKDbWkaD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g6-20020a636b06000000b004788e156154si28764903pgc.360.2023.01.15.20.08.42; Sun, 15 Jan 2023 20:08:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HKDbWkaD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231874AbjAPEFv (ORCPT <rfc822;stefanalexe802@gmail.com> + 99 others); Sun, 15 Jan 2023 23:05:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49944 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231831AbjAPEFj (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Sun, 15 Jan 2023 23:05:39 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 548F672B0 for <linux-kernel@vger.kernel.org>; Sun, 15 Jan 2023 20:04:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1673841890; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=QaWOUNPCOLrCK48ZZkRvvzXiWltPmrtQJNoTHypPAnc=; b=HKDbWkaDlwvANzXdGDMBuAvQQLQ5wZgG+kfzUKN96ItVWuO08B1eTLHdqFAUx13ulTRGvK 4LOKJxSep5X2Nv+N/e6NPSJoLlwkOjqD64tpL8uxWLDhU9mAjVLoY5Oh/UyJYc6cxN2Pbk MFUrAZbHzwSrdqSCn5TRMAydDtxLIrA= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-556-v6iwQVNQNJqo5UeIelcYkA-1; Sun, 15 Jan 2023 23:04:45 -0500 X-MC-Unique: v6iwQVNQNJqo5UeIelcYkA-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 3F8691C08DA2; Mon, 16 Jan 2023 04:04:44 +0000 (UTC) Received: from gshan.redhat.com (vpn2-54-98.bne.redhat.com [10.64.54.98]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 44027492B05; Mon, 16 Jan 2023 04:04:36 +0000 (UTC) From: Gavin Shan <gshan@redhat.com> To: kvmarm@lists.linux.dev Cc: kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, pbonzini@redhat.com, maz@kernel.org, corbet@lwn.net, james.morse@arm.com, suzuki.poulose@arm.com, oliver.upton@linux.dev, yuzenghui@huawei.com, catalin.marinas@arm.com, will@kernel.org, ricarkol@google.com, eric.auger@redhat.com, yuzhe@nfschina.com, renzhengeek@gmail.com, ardb@kernel.org, peterx@redhat.com, seanjc@google.com, shan.gavin@gmail.com Subject: [PATCH 1/4] KVM: arm64: Allow saving vgic3 LPI pending status in no running vcpu context Date: Mon, 16 Jan 2023 12:04:02 +0800 Message-Id: <20230116040405.260935-2-gshan@redhat.com> In-Reply-To: <20230116040405.260935-1-gshan@redhat.com> References: <20230116040405.260935-1-gshan@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755150689576176683?= X-GMAIL-MSGID: =?utf-8?q?1755150689576176683?= |
Series |
Improve dirty ring warning report
|
|
Commit Message
Gavin Shan
Jan. 16, 2023, 4:04 a.m. UTC
When dirty ring is enabled, the dirty page information is pushed to
the dirty ring if there is a running VCPU context. Otherwise, the
dirty page information is still tracked by the backup dirty bitmap.
In order to detect if there is a running VCPU context when a guest
page becomes dirty, kvm_arch_allow_write_without_running_vcpu() was
introduced to warn when no running VCPU context exists on unknown
cases.
Other than the site of saving ITS tables, it's possible to save vgic3
LPI pending status in no running vcpu context because it can happen when
ITS ITE is restored through the command KVM_DEV_ARM_ITS_RESTORE_TABLES
on 'kvm-arm-vgic-its' device.
Fix it by allowing to save vgic3 LPI pending status in no running
vcpu context.
Signed-off-by: Gavin Shan <gshan@redhat.com>
---
Documentation/virt/kvm/api.rst | 5 +++--
arch/arm64/kvm/vgic/vgic-its.c | 3 ++-
arch/arm64/kvm/vgic/vgic-v3.c | 3 +++
include/kvm/arm_vgic.h | 1 +
4 files changed, 9 insertions(+), 3 deletions(-)
Comments
Hi Gavin, On Mon, Jan 16, 2023 at 12:04:02PM +0800, Gavin Shan wrote: > When dirty ring is enabled, the dirty page information is pushed to > the dirty ring if there is a running VCPU context. Otherwise, the > dirty page information is still tracked by the backup dirty bitmap. > In order to detect if there is a running VCPU context when a guest > page becomes dirty, kvm_arch_allow_write_without_running_vcpu() was > introduced to warn when no running VCPU context exists on unknown > cases. > > Other than the site of saving ITS tables, it's possible to save vgic3 > LPI pending status in no running vcpu context because it can happen when > ITS ITE is restored through the command KVM_DEV_ARM_ITS_RESTORE_TABLES > on 'kvm-arm-vgic-its' device. > > Fix it by allowing to save vgic3 LPI pending status in no running > vcpu context. > > Signed-off-by: Gavin Shan <gshan@redhat.com> > --- > Documentation/virt/kvm/api.rst | 5 +++-- > arch/arm64/kvm/vgic/vgic-its.c | 3 ++- > arch/arm64/kvm/vgic/vgic-v3.c | 3 +++ > include/kvm/arm_vgic.h | 1 + > 4 files changed, 9 insertions(+), 3 deletions(-) > > diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst > index 9807b05a1b57..18b245a0ba02 100644 > --- a/Documentation/virt/kvm/api.rst > +++ b/Documentation/virt/kvm/api.rst > @@ -8071,8 +8071,9 @@ state is final and avoid missing dirty pages from another ioctl ordered > after the bitmap collection. > > NOTE: One example of using the backup bitmap is saving arm64 vgic/its > -tables through KVM_DEV_ARM_{VGIC_GRP_CTRL, ITS_SAVE_TABLES} command on > -KVM device "kvm-arm-vgic-its" when dirty ring is enabled. > +tables and vgic3 LPI pending status through KVM_DEV_ARM_{VGIC_GRP_CTRL, > +ITS_SAVE_TABLES} and KVM_DEV_ARM_{VGIC_GRP_CTRL, ITS_RESTORE_TABLES} > +command on KVM device "kvm-arm-vgic-its" when dirty ring is enabled. > > 8.30 KVM_CAP_XEN_HVM > -------------------- > diff --git a/arch/arm64/kvm/vgic/vgic-its.c b/arch/arm64/kvm/vgic/vgic-its.c > index 94a666dd1443..119a9c7a0a52 100644 > --- a/arch/arm64/kvm/vgic/vgic-its.c > +++ b/arch/arm64/kvm/vgic/vgic-its.c > @@ -2792,7 +2792,8 @@ bool kvm_arch_allow_write_without_running_vcpu(struct kvm *kvm) > { > struct vgic_dist *dist = &kvm->arch.vgic; > > - return dist->save_its_tables_in_progress; > + return dist->save_vgic_v3_tables_in_progress || > + dist->save_its_tables_in_progress; I'd much prefer using a single bool to keep track of this, i.e: return dist->save_tables_in_progress; > } > > static int vgic_its_set_attr(struct kvm_device *dev, > diff --git a/arch/arm64/kvm/vgic/vgic-v3.c b/arch/arm64/kvm/vgic/vgic-v3.c > index 2074521d4a8c..32998c8587a8 100644 > --- a/arch/arm64/kvm/vgic/vgic-v3.c > +++ b/arch/arm64/kvm/vgic/vgic-v3.c > @@ -304,6 +304,7 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) > int vgic_v3_lpi_sync_pending_status(struct kvm *kvm, struct vgic_irq *irq) > { > struct kvm_vcpu *vcpu; > + struct vgic_dist *dist = &kvm->arch.vgic; > int byte_offset, bit_nr; > gpa_t pendbase, ptr; > bool status; > @@ -339,7 +340,9 @@ int vgic_v3_lpi_sync_pending_status(struct kvm *kvm, struct vgic_irq *irq) > if (status) { > /* clear consumed data */ > val &= ~(1 << bit_nr); > + dist->save_vgic_v3_tables_in_progress = true; > ret = kvm_write_guest_lock(kvm, ptr, &val, 1); > + dist->save_vgic_v3_tables_in_progress = false; With the above suggestion of using a bool, this should become a helper used at all the affected callsites: static int vgic_write_guest_lock(struct kvm *kvm, gpa_t gpa, const void *data, unsigned long len) { struct vgic_dist *dist = &kvm->arch.vgic; int ret; dist->save_tables_in_progress = true; ret = kvm_write_guest_lock(kvm, gpa, data, len); dist->save_tables_in_progress = false; return ret; } -- Thanks, Oliver
Hi Oliver, On 1/18/23 7:51 AM, Oliver Upton wrote: > On Mon, Jan 16, 2023 at 12:04:02PM +0800, Gavin Shan wrote: >> When dirty ring is enabled, the dirty page information is pushed to >> the dirty ring if there is a running VCPU context. Otherwise, the >> dirty page information is still tracked by the backup dirty bitmap. >> In order to detect if there is a running VCPU context when a guest >> page becomes dirty, kvm_arch_allow_write_without_running_vcpu() was >> introduced to warn when no running VCPU context exists on unknown >> cases. >> >> Other than the site of saving ITS tables, it's possible to save vgic3 >> LPI pending status in no running vcpu context because it can happen when >> ITS ITE is restored through the command KVM_DEV_ARM_ITS_RESTORE_TABLES >> on 'kvm-arm-vgic-its' device. >> >> Fix it by allowing to save vgic3 LPI pending status in no running >> vcpu context. >> >> Signed-off-by: Gavin Shan <gshan@redhat.com> >> --- >> Documentation/virt/kvm/api.rst | 5 +++-- >> arch/arm64/kvm/vgic/vgic-its.c | 3 ++- >> arch/arm64/kvm/vgic/vgic-v3.c | 3 +++ >> include/kvm/arm_vgic.h | 1 + >> 4 files changed, 9 insertions(+), 3 deletions(-) >> >> diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst >> index 9807b05a1b57..18b245a0ba02 100644 >> --- a/Documentation/virt/kvm/api.rst >> +++ b/Documentation/virt/kvm/api.rst >> @@ -8071,8 +8071,9 @@ state is final and avoid missing dirty pages from another ioctl ordered >> after the bitmap collection. >> >> NOTE: One example of using the backup bitmap is saving arm64 vgic/its >> -tables through KVM_DEV_ARM_{VGIC_GRP_CTRL, ITS_SAVE_TABLES} command on >> -KVM device "kvm-arm-vgic-its" when dirty ring is enabled. >> +tables and vgic3 LPI pending status through KVM_DEV_ARM_{VGIC_GRP_CTRL, >> +ITS_SAVE_TABLES} and KVM_DEV_ARM_{VGIC_GRP_CTRL, ITS_RESTORE_TABLES} >> +command on KVM device "kvm-arm-vgic-its" when dirty ring is enabled. >> >> 8.30 KVM_CAP_XEN_HVM >> -------------------- >> diff --git a/arch/arm64/kvm/vgic/vgic-its.c b/arch/arm64/kvm/vgic/vgic-its.c >> index 94a666dd1443..119a9c7a0a52 100644 >> --- a/arch/arm64/kvm/vgic/vgic-its.c >> +++ b/arch/arm64/kvm/vgic/vgic-its.c >> @@ -2792,7 +2792,8 @@ bool kvm_arch_allow_write_without_running_vcpu(struct kvm *kvm) >> { >> struct vgic_dist *dist = &kvm->arch.vgic; >> >> - return dist->save_its_tables_in_progress; >> + return dist->save_vgic_v3_tables_in_progress || >> + dist->save_its_tables_in_progress; > > I'd much prefer using a single bool to keep track of this, i.e: > Yes, it's clean to have 'dist->save_tables_in_progress' for all 3 cases. One more concern like below. > return dist->save_tables_in_progress; > >> } >> >> static int vgic_its_set_attr(struct kvm_device *dev, >> diff --git a/arch/arm64/kvm/vgic/vgic-v3.c b/arch/arm64/kvm/vgic/vgic-v3.c >> index 2074521d4a8c..32998c8587a8 100644 >> --- a/arch/arm64/kvm/vgic/vgic-v3.c >> +++ b/arch/arm64/kvm/vgic/vgic-v3.c >> @@ -304,6 +304,7 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) >> int vgic_v3_lpi_sync_pending_status(struct kvm *kvm, struct vgic_irq *irq) >> { >> struct kvm_vcpu *vcpu; >> + struct vgic_dist *dist = &kvm->arch.vgic; >> int byte_offset, bit_nr; >> gpa_t pendbase, ptr; >> bool status; >> @@ -339,7 +340,9 @@ int vgic_v3_lpi_sync_pending_status(struct kvm *kvm, struct vgic_irq *irq) >> if (status) { >> /* clear consumed data */ >> val &= ~(1 << bit_nr); >> + dist->save_vgic_v3_tables_in_progress = true; >> ret = kvm_write_guest_lock(kvm, ptr, &val, 1); >> + dist->save_vgic_v3_tables_in_progress = false; > > With the above suggestion of using a bool, this should become a helper > used at all the affected callsites: > > static int vgic_write_guest_lock(struct kvm *kvm, gpa_t gpa, > const void *data, unsigned long len) > { > struct vgic_dist *dist = &kvm->arch.vgic; > int ret; > > dist->save_tables_in_progress = true; > ret = kvm_write_guest_lock(kvm, gpa, data, len); > dist->save_tables_in_progress = false; > > return ret; > } > I will have vgic_write_guest_lock() in v2. Note that those 3 paths can't be running in parallel since one switch is shared by them. Alternatively, we extend struct vgic_dist::save_tables_in_progress from 'bool' to 'unsigned long'. Several bit is defined for each site as below. In this way, the 3 paths can be running in parallel: unsigned long struct vgic_dist::save_tables_in_progress #define VGIC_DIST_SAVE_ITS_ITE 0 /* ITS Translation Entry */ #define VGIC_DIST_SAVE_ITS_DTE 1 /* ITS Device Table Entry */ #define VGIC_DIST_SAVE_ITS_CTE 2 /* ITS Collection Table Entry */ #define VGIC_DIST_SAVE_ITS_CT 3 /* ITS Collection Table */ #define VGIC_DIST_SAVE_VGIC3_LPI 4 /* VGIC3 LPI Pending Status */ #define VGIC_DIST_SAVE_VGIC3_PENDING_TABLE 5 /* VGIC3 Pending Table */ The drawback is the calls are limited to 64. If those 3 paths can't be running in parallel, we needn't the extension at all. Thanks, Gavin
On Thu, 19 Jan 2023 01:11:44 +0000, Gavin Shan <gshan@redhat.com> wrote: > > I will have vgic_write_guest_lock() in v2. Note that those 3 paths can't be > running in parallel since one switch is shared by them. Alternatively, we > extend struct vgic_dist::save_tables_in_progress from 'bool' to 'unsigned long'. > Several bit is defined for each site as below. In this way, the 3 paths can be > running in parallel: > > unsigned long struct vgic_dist::save_tables_in_progress > > #define VGIC_DIST_SAVE_ITS_ITE 0 /* ITS Translation Entry */ > #define VGIC_DIST_SAVE_ITS_DTE 1 /* ITS Device Table Entry */ > #define VGIC_DIST_SAVE_ITS_CTE 2 /* ITS Collection Table Entry */ > #define VGIC_DIST_SAVE_ITS_CT 3 /* ITS Collection Table */ > #define VGIC_DIST_SAVE_VGIC3_LPI 4 /* VGIC3 LPI Pending Status */ > #define VGIC_DIST_SAVE_VGIC3_PENDING_TABLE 5 /* VGIC3 Pending Table */ > > The drawback is the calls are limited to 64. If those 3 paths can't be running > in parallel, we needn't the extension at all. It should all be completely sequential. KVM_DEV_ARM_ITS_SAVE_TABLES runs in a context where everything is locked, and so is VGIC_DIST_SAVE_VGIC3_PENDING_TABLE. M.
Hi Marc, On 1/20/23 2:47 AM, Marc Zyngier wrote: > On Thu, 19 Jan 2023 01:11:44 +0000, > Gavin Shan <gshan@redhat.com> wrote: >> >> I will have vgic_write_guest_lock() in v2. Note that those 3 paths can't be >> running in parallel since one switch is shared by them. Alternatively, we >> extend struct vgic_dist::save_tables_in_progress from 'bool' to 'unsigned long'. >> Several bit is defined for each site as below. In this way, the 3 paths can be >> running in parallel: >> >> unsigned long struct vgic_dist::save_tables_in_progress >> >> #define VGIC_DIST_SAVE_ITS_ITE 0 /* ITS Translation Entry */ >> #define VGIC_DIST_SAVE_ITS_DTE 1 /* ITS Device Table Entry */ >> #define VGIC_DIST_SAVE_ITS_CTE 2 /* ITS Collection Table Entry */ >> #define VGIC_DIST_SAVE_ITS_CT 3 /* ITS Collection Table */ >> #define VGIC_DIST_SAVE_VGIC3_LPI 4 /* VGIC3 LPI Pending Status */ >> #define VGIC_DIST_SAVE_VGIC3_PENDING_TABLE 5 /* VGIC3 Pending Table */ >> >> The drawback is the calls are limited to 64. If those 3 paths can't be running >> in parallel, we needn't the extension at all. > > It should all be completely sequential. KVM_DEV_ARM_ITS_SAVE_TABLES > runs in a context where everything is locked, and so is > VGIC_DIST_SAVE_VGIC3_PENDING_TABLE. > Thanks for your confirm. Yeah, it's sequential because 'kvm->lock' is hold on KVM_DEV_ARM_ITS_SAVE_TABLES and VGIC_DIST_SAVE_VGIC3_PENDING_TABLE. So all good to have one shared switch. v2 will be posted pretty soon. Thanks, Gavin
diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 9807b05a1b57..18b245a0ba02 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -8071,8 +8071,9 @@ state is final and avoid missing dirty pages from another ioctl ordered after the bitmap collection. NOTE: One example of using the backup bitmap is saving arm64 vgic/its -tables through KVM_DEV_ARM_{VGIC_GRP_CTRL, ITS_SAVE_TABLES} command on -KVM device "kvm-arm-vgic-its" when dirty ring is enabled. +tables and vgic3 LPI pending status through KVM_DEV_ARM_{VGIC_GRP_CTRL, +ITS_SAVE_TABLES} and KVM_DEV_ARM_{VGIC_GRP_CTRL, ITS_RESTORE_TABLES} +command on KVM device "kvm-arm-vgic-its" when dirty ring is enabled. 8.30 KVM_CAP_XEN_HVM -------------------- diff --git a/arch/arm64/kvm/vgic/vgic-its.c b/arch/arm64/kvm/vgic/vgic-its.c index 94a666dd1443..119a9c7a0a52 100644 --- a/arch/arm64/kvm/vgic/vgic-its.c +++ b/arch/arm64/kvm/vgic/vgic-its.c @@ -2792,7 +2792,8 @@ bool kvm_arch_allow_write_without_running_vcpu(struct kvm *kvm) { struct vgic_dist *dist = &kvm->arch.vgic; - return dist->save_its_tables_in_progress; + return dist->save_vgic_v3_tables_in_progress || + dist->save_its_tables_in_progress; } static int vgic_its_set_attr(struct kvm_device *dev, diff --git a/arch/arm64/kvm/vgic/vgic-v3.c b/arch/arm64/kvm/vgic/vgic-v3.c index 2074521d4a8c..32998c8587a8 100644 --- a/arch/arm64/kvm/vgic/vgic-v3.c +++ b/arch/arm64/kvm/vgic/vgic-v3.c @@ -304,6 +304,7 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) int vgic_v3_lpi_sync_pending_status(struct kvm *kvm, struct vgic_irq *irq) { struct kvm_vcpu *vcpu; + struct vgic_dist *dist = &kvm->arch.vgic; int byte_offset, bit_nr; gpa_t pendbase, ptr; bool status; @@ -339,7 +340,9 @@ int vgic_v3_lpi_sync_pending_status(struct kvm *kvm, struct vgic_irq *irq) if (status) { /* clear consumed data */ val &= ~(1 << bit_nr); + dist->save_vgic_v3_tables_in_progress = true; ret = kvm_write_guest_lock(kvm, ptr, &val, 1); + dist->save_vgic_v3_tables_in_progress = false; if (ret) return ret; } diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h index 9270cd87da3f..0485b4e82b00 100644 --- a/include/kvm/arm_vgic.h +++ b/include/kvm/arm_vgic.h @@ -264,6 +264,7 @@ struct vgic_dist { bool has_its; bool save_its_tables_in_progress; + bool save_vgic_v3_tables_in_progress; /* * Contains the attributes and gpa of the LPI configuration table.