Received: by 10.223.176.5 with SMTP id f5csp2206827wra; Thu, 8 Feb 2018 10:05:55 -0800 (PST) X-Google-Smtp-Source: AH8x226cXcL2NjmakKIo6hA19JRFaZoY5Hyk2dDRgQ0eXHO2wmk2o4qvbBxxtbDVebc+nPa6ygPT X-Received: by 10.99.143.18 with SMTP id n18mr40653pgd.254.1518113155449; Thu, 08 Feb 2018 10:05:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518113155; cv=none; d=google.com; s=arc-20160816; b=yIpkClXBNnKnrXkBX0e2v4ciHM6tOCgS80B9Ow2U7P5XUxWWhVPUgkdOzMylDUIdfC qNEZw8Wa2vdVAiT636NvSwX5THYsnlbLlXKBc8nvrjRUuNFZMP6CQp/pN/J+GhcGYF0q Jktd/2gNwjt+gPfeLaYf/afiVSTQxCUTpIA0tszye+uCEyxBQ9s4LN6xuV10SClv1/Mf kK/Ysb5mxZWVvEdVYNjzAFRqOK6zJ/eWTU8aGKskkTkJSEULM68Cmp7QmuYNofd3L9wh F9ZJeKwzDc2xYAOWxSxM/VM9HkIYpSbQQCczy1Bor7dr7wJyNMWP1FMtpIWwSluIhNR9 b0uQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=4z690h8QpOva/EMvj7AS+SovNdaAEJlwU8KPtPc241o=; b=iAPeKcW7jlmpPCJBBfIrGHIzyeJoc+6M5P/4UELhz4HtFOXUp2YPqSYnpV5IFZC39o EpahpnyPBDEI8S+WybGZtIKnJDpYcR2Q7WrUdynNKFwnLrcHPkazYlYCi7zdt/pbk+rm gyfEF5kzuQ+8bsQgCHqcJdDxpSXytsZx4jJZ5mz36LWgZj/u7e+y2KBJGXzT9v3d3XQo srAdt0C1atbmCSLiJMkqfxxYc1mkJ62FHP79shCe0N0etvDpsQAL/KxcwzNEBEkq9pAp pv9yUXAW4j8FkBmD/H4AVmx/Nxsj4ciHnK2/RrN2frW28sBPqFHxDASSLPv7vv0ZnyOi K80A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=AhvDqpz4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g6-v6si278245pln.755.2018.02.08.10.05.41; Thu, 08 Feb 2018 10:05:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=AhvDqpz4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752485AbeBHSEU (ORCPT + 99 others); Thu, 8 Feb 2018 13:04:20 -0500 Received: from mail-pl0-f66.google.com ([209.85.160.66]:41277 "EHLO mail-pl0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752317AbeBHSEP (ORCPT ); Thu, 8 Feb 2018 13:04:15 -0500 Received: by mail-pl0-f66.google.com with SMTP id k8so208904pli.8 for ; Thu, 08 Feb 2018 10:04:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=4z690h8QpOva/EMvj7AS+SovNdaAEJlwU8KPtPc241o=; b=AhvDqpz4GjWHHZvGNYhRuwZxyRW5Vmn+atJAtWkZN6eQ48bCqxqRvqdL7lFTEFQ6D6 MtoeBxTXQIWdMELG266XLhkl/Jow+V3LlvmmHGDNh5CExH56gNW7GWQoLQPPjMHgLbzA z7pjbgW2qezUcMdXEbQBGPWCWx/q5ttTbn41I= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=4z690h8QpOva/EMvj7AS+SovNdaAEJlwU8KPtPc241o=; b=a449hCY0fvvkktGTM0Qb8zxFMyNM+sGsU7KZ5yic8T24878C4BuF+X6dPymlga51VD hC0ldhFqZTHnsb5NeFdRmnF5I5d1i+C3E+p34E0AzOkeW3ZjEftT6EGubtfgBsYW4JHR 1/OCx6x2YbELlrgIiA3GOXGXmaUQeBFDSx+7D7UHSfBTcMs4wGCPZJT+BPaldsHCW6RC x5L/SJB9wwHT2FJ4IaFacS0+dqVuaOky9F+FEHd+tbXWDnpmStwgSlgIhwbx07PuHt2r 4gjgftNK0Fj5GnV0r25KHShBjyMSNv3oSy6p0YqMOcNHRdsH5qE0J9Qzx2azbRqz7gi3 WQNg== X-Gm-Message-State: APf1xPC8yWgxAy1YofNa+V3nrIg3QW3jkGO2EzzQB0rCzK/TppgkStAM kjyvw7fItIDMtMtVp5UZ2C+ozt5GZivhhp6t75DxlA== X-Received: by 2002:a17:902:8a91:: with SMTP id p17-v6mr14211plo.375.1518113054774; Thu, 08 Feb 2018 10:04:14 -0800 (PST) MIME-Version: 1.0 Received: by 10.100.137.235 with HTTP; Thu, 8 Feb 2018 10:04:14 -0800 (PST) In-Reply-To: <20180109190414.4017-14-suzuki.poulose@arm.com> References: <20180109190414.4017-1-suzuki.poulose@arm.com> <20180109190414.4017-14-suzuki.poulose@arm.com> From: Christoffer Dall Date: Thu, 8 Feb 2018 19:04:14 +0100 Message-ID: Subject: Re: [PATCH v1 13/16] kvm: arm64: Configure VTCR per VM To: Suzuki K Poulose Cc: Linux ARM , KVM , kvmarm@lists.cs.columbia.edu, Marc Zyngier , Linux Kernel Mailing List , Kristina Martsenko , Peter Maydell , Paolo Bonzini , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Will Deacon , Ard Biesheuvel , Mark Rutland , Catalin Marinas , Christoffer Dall Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 09, 2018 at 07:04:08PM +0000, Suzuki K Poulose wrote: > We set VTCR_EL2 very early during the stage2 init and don't > touch it ever. This is fine as we had a fixed IPA size. This > patch changes the behavior to set the VTCR for a given VM, > depending on its stage2 table. The common configuration for > VTCR is still performed during the early init. But the SL0 > and T0SZ are programmed for each VM and is cleared once we > exit the VM. > > Cc: Marc Zyngier > Cc: Christoffer Dall > Signed-off-by: Suzuki K Poulose > --- > arch/arm64/include/asm/kvm_arm.h | 16 ++++++---------- > arch/arm64/include/asm/kvm_asm.h | 2 +- > arch/arm64/include/asm/kvm_host.h | 8 +++++--- > arch/arm64/kvm/hyp/s2-setup.c | 16 +--------------- > arch/arm64/kvm/hyp/switch.c | 9 +++++++++ > 5 files changed, 22 insertions(+), 29 deletions(-) > > diff --git a/arch/arm64/include/asm/kvm_arm.h b/arch/arm64/include/asm/kvm_arm.h > index eb90d349e55f..d5c40816f073 100644 > --- a/arch/arm64/include/asm/kvm_arm.h > +++ b/arch/arm64/include/asm/kvm_arm.h > @@ -115,9 +115,7 @@ > #define VTCR_EL2_IRGN0_WBWA TCR_IRGN0_WBWA > #define VTCR_EL2_SL0_SHIFT 6 > #define VTCR_EL2_SL0_MASK (3 << VTCR_EL2_SL0_SHIFT) > -#define VTCR_EL2_SL0_LVL1 (1 << VTCR_EL2_SL0_SHIFT) > #define VTCR_EL2_T0SZ_MASK 0x3f > -#define VTCR_EL2_T0SZ_40B 24 > #define VTCR_EL2_VS_SHIFT 19 > #define VTCR_EL2_VS_8BIT (0 << VTCR_EL2_VS_SHIFT) > #define VTCR_EL2_VS_16BIT (1 << VTCR_EL2_VS_SHIFT) > @@ -139,38 +137,36 @@ > * D4-23 and D4-25 in ARM DDI 0487A.b. > */ > > -#define VTCR_EL2_T0SZ_IPA VTCR_EL2_T0SZ_40B > #define VTCR_EL2_COMMON_BITS (VTCR_EL2_SH0_INNER | VTCR_EL2_ORGN0_WBWA | \ > VTCR_EL2_IRGN0_WBWA | VTCR_EL2_RES1) > +#define VTCR_EL2_PRIVATE_MASK (VTCR_EL2_SL0_MASK | VTCR_EL2_T0SZ_MASK) > > #ifdef CONFIG_ARM64_64K_PAGES > /* > * Stage2 translation configuration: > * 64kB pages (TG0 = 1) > - * 2 level page tables (SL = 1) > */ > -#define VTCR_EL2_TGRAN_FLAGS (VTCR_EL2_TG0_64K | VTCR_EL2_SL0_LVL1) > +#define VTCR_EL2_TGRAN VTCR_EL2_TG0_64K > #define VTCR_EL2_TGRAN_SL0_BASE 3UL > > #elif defined(CONFIG_ARM64_16K_PAGES) > /* > * Stage2 translation configuration: > * 16kB pages (TG0 = 2) > - * 2 level page tables (SL = 1) > */ > -#define VTCR_EL2_TGRAN_FLAGS (VTCR_EL2_TG0_16K | VTCR_EL2_SL0_LVL1) > +#define VTCR_EL2_TGRAN VTCR_EL2_TG0_16K > #define VTCR_EL2_TGRAN_SL0_BASE 3UL > #else /* 4K */ > /* > * Stage2 translation configuration: > * 4kB pages (TG0 = 0) > - * 3 level page tables (SL = 1) > */ > -#define VTCR_EL2_TGRAN_FLAGS (VTCR_EL2_TG0_4K | VTCR_EL2_SL0_LVL1) > +#define VTCR_EL2_TGRAN VTCR_EL2_TG0_4K > #define VTCR_EL2_TGRAN_SL0_BASE 2UL > #endif > > -#define VTCR_EL2_FLAGS (VTCR_EL2_COMMON_BITS | VTCR_EL2_TGRAN_FLAGS) > +#define VTCR_EL2_FLAGS (VTCR_EL2_COMMON_BITS | VTCR_EL2_TGRAN) > + > /* > * VTCR_EL2:SL0 indicates the entry level for Stage2 translation. > * Interestingly, it depends on the page size. > diff --git a/arch/arm64/include/asm/kvm_asm.h b/arch/arm64/include/asm/kvm_asm.h > index ab4d0a926043..21cfd1fe692c 100644 > --- a/arch/arm64/include/asm/kvm_asm.h > +++ b/arch/arm64/include/asm/kvm_asm.h > @@ -66,7 +66,7 @@ extern void __vgic_v3_init_lrs(void); > > extern u32 __kvm_get_mdcr_el2(void); > > -extern u32 __init_stage2_translation(void); > +extern void __init_stage2_translation(void); > > #endif > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > index ea6cb5b24258..9a9ddeb33c84 100644 > --- a/arch/arm64/include/asm/kvm_host.h > +++ b/arch/arm64/include/asm/kvm_host.h > @@ -380,10 +380,12 @@ int kvm_arm_vcpu_arch_has_attr(struct kvm_vcpu *vcpu, > > static inline void __cpu_init_stage2(void) > { > - u32 parange = kvm_call_hyp(__init_stage2_translation); > + u32 ps; > > - WARN_ONCE(parange < 40, > - "PARange is %d bits, unsupported configuration!", parange); > + kvm_call_hyp(__init_stage2_translation); > + ps = id_aa64mmfr0_parange_to_phys_shift(read_sysreg(id_aa64mmfr0_el1)); > + WARN_ONCE(ps < 40, > + "PARange is %d bits, unsupported configuration!", ps); > } > > /* > diff --git a/arch/arm64/kvm/hyp/s2-setup.c b/arch/arm64/kvm/hyp/s2-setup.c > index b1129c83c531..5c26ad4b8ac9 100644 > --- a/arch/arm64/kvm/hyp/s2-setup.c > +++ b/arch/arm64/kvm/hyp/s2-setup.c > @@ -19,13 +19,11 @@ > #include > #include > #include > -#include > > -u32 __hyp_text __init_stage2_translation(void) > +void __hyp_text __init_stage2_translation(void) > { > u64 val = VTCR_EL2_FLAGS; > u64 parange; > - u32 phys_shift; > u64 tmp; > > /* > @@ -38,16 +36,6 @@ u32 __hyp_text __init_stage2_translation(void) > parange = ID_AA64MMFR0_PARANGE_MAX; > val |= parange << 16; > > - /* Compute the actual PARange... */ > - phys_shift = id_aa64mmfr0_parange_to_phys_shift(parange); > - > - /* > - * ... and clamp it to 40 bits, unless we have some braindead > - * HW that implements less than that. In all cases, we'll > - * return that value for the rest of the kernel to decide what > - * to do. > - */ > - val |= 64 - (phys_shift > 40 ? 40 : phys_shift); > > /* > * Check the availability of Hardware Access Flag / Dirty Bit > @@ -67,6 +55,4 @@ u32 __hyp_text __init_stage2_translation(void) > VTCR_EL2_VS_8BIT; > > write_sysreg(val, vtcr_el2); > - > - return phys_shift; > } > diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c > index f7c651f3a8c0..523471f0af7b 100644 > --- a/arch/arm64/kvm/hyp/switch.c > +++ b/arch/arm64/kvm/hyp/switch.c > @@ -157,11 +157,20 @@ static void __hyp_text __deactivate_traps(struct kvm_vcpu *vcpu) > static void __hyp_text __activate_vm(struct kvm_vcpu *vcpu) > { > struct kvm *kvm = kern_hyp_va(vcpu->kvm); > + u64 vtcr = read_sysreg(vtcr_el2); > + > + vtcr &= ~VTCR_EL2_PRIVATE_MASK; > + vtcr |= VTCR_EL2_SL0(stage2_pt_levels(kvm)) | > + VTCR_EL2_T0SZ(kvm_phys_shift(kvm)); > + write_sysreg(vtcr, vtcr_el2); If we're writing VTCR_EL2 on each entry, do we really need to read the value back first and calculate things on every entry to the VM? It seems to me we should be able to compute the vtcr_el2 and store it on struct kvm, and simply restore that per-VM value upon entering the VM? > write_sysreg(kvm->arch.vttbr, vttbr_el2); > } > > static void __hyp_text __deactivate_vm(struct kvm_vcpu *vcpu) > { > + u64 vtcr = read_sysreg(vtcr_el2) & ~VTCR_EL2_PRIVATE_MASK; > + > + write_sysreg(vtcr, vtcr_el2); Why do we need to care about restoring VTCR when returning to the host? > write_sysreg(0, vttbr_el2); > } > > -- > 2.13.6 > Thanks, -Christoffer