Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp405527pxf; Wed, 17 Mar 2021 07:44:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWdgriMfrigBWgiJJsMrC78LxizNKbpNAhBglQV8+BoQzrB7hd8TzI/l50hMPk+wPCiwrE X-Received: by 2002:a17:906:dfce:: with SMTP id jt14mr36138279ejc.83.1615992282496; Wed, 17 Mar 2021 07:44:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615992282; cv=none; d=google.com; s=arc-20160816; b=wcC6eloscmCNkJvc+xtjd4fkB0AfKc72PlGjzytbXAcKm5ZZr2/0M1cBjd2EW9pd9j qVqMhfaS3TKGm3qZ62UNuA5XbZUnn1ZjhUPpVYwoKXtFIhV35Ft/3/jMSZK6JxKjAP7I 5hHiNw8RF0hvUu6H4KYosntpjlFTf2dwgpVCx4jApskzAwKhmREb74+js5GAwp25EgK8 CX2WQAYy+tkhe4NTm5Dr/gQ4EW826vclJMvBVM0ryvWRP60Urfa23Y9ESGqnC6NknWk9 VDnTvYrwSJQ3uZHnYWlsqLJjjR8wtCiwNflY3pR4dMOz4wkm6EWQuerYsmfpibJqj+rt CFaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=f+GMxdoR14JCofR4k3nNWGYDPB2EjS75zTBynyQglNA=; b=sUtpExOYjiaAg9690pjdeVQNPBz6YUiaxL+qdCV1NZr3516Ng978ozaVAA7RYD4/xF z3H/1vUOXe1j4DRbOC5j/zDfLr4JO0iGtBEakTzz/R1jUnWC8KH67AIkZ011ZcQJ3m0a CJ6sugQj9xMJlV4xa1KhGHx0hcL2tTIXH1HPi52Fmt71Hvy60oRixab2CEmaS93m96p/ tmAu2wn5877sfxd5das85lWHr8687F+mujDBItmUeNhBRb7RfxeDH3z+9rqu6N2gJ8Hm eS/cGLke+i2J1NpCluxRqFKEGuT45FJyJ2C8Vp2JcioslVEt4xL0Hf1CRrxYYd02++vo ncig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=MYjxLi1M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u19si16525102edo.410.2021.03.17.07.44.19; Wed, 17 Mar 2021 07:44:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=MYjxLi1M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231932AbhCQOnH (ORCPT + 99 others); Wed, 17 Mar 2021 10:43:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:58714 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231877AbhCQOmx (ORCPT ); Wed, 17 Mar 2021 10:42:53 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B973564F69; Wed, 17 Mar 2021 14:42:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1615992173; bh=zYeJEe+1T7U7FbkjlOOSfPVIwk/cDkVQk58lJ9Xg7wI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=MYjxLi1MA2lcM3Z1mTuAs/Q/gY5RJnCGdsb4y1jndOdKfT00MFr2Z2oJxe1G7GKpI UaGC3RrUohWq62gZotVwrCFTAwNZ3wiRX6udcTSMsbgkHMpd3vv5xDMIwf4WdTMaTh uYWRDTNyahxFmxihcGt+axuLrRcn5exdIab09vzv7Q0b49axWZx6MNwUF8o+6F4FEn 6CFM24Lssc+cBvrj9cXd10xscbTRBOTgPcWuoURSp0tAXl/sY/HP1tqx5eOb9e2WHZ aU7ZgKcSqsPvpv/ub50dTPXkyorxUF1Rf+tc2vlr2Lk1EAsbbsAVNvSbW/k3TWP+yC qYph4wtzdsAog== Date: Wed, 17 Mar 2021 14:42:46 +0000 From: Will Deacon To: Quentin Perret Cc: catalin.marinas@arm.com, maz@kernel.org, james.morse@arm.com, julien.thierry.kdev@gmail.com, suzuki.poulose@arm.com, android-kvm@google.com, seanjc@google.com, linux-kernel@vger.kernel.org, robh+dt@kernel.org, linux-arm-kernel@lists.infradead.org, kernel-team@android.com, kvmarm@lists.cs.columbia.edu, tabba@google.com, ardb@kernel.org, mark.rutland@arm.com, dbrazdil@google.com, mate.toth-pal@arm.com Subject: Re: [PATCH 1/2] KVM: arm64: Introduce KVM_PGTABLE_S2_NOFWB Stage-2 flag Message-ID: <20210317144246.GE5393@willie-the-truck> References: <20210315143536.214621-34-qperret@google.com> <20210317141714.383046-1-qperret@google.com> <20210317141714.383046-2-qperret@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210317141714.383046-2-qperret@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 17, 2021 at 02:17:13PM +0000, Quentin Perret wrote: > In order to further configure stage-2 page-tables, pass flags to the > init function using a new enum. > > The first of these flags allows to disable FWB even if the hardware > supports it as we will need to do so for the host stage-2. > > Signed-off-by: Quentin Perret > > --- > > One question is, do we want to use stage2_has_fwb() everywhere, including > guest-specific paths (e.g. kvm_arch_prepare_memory_region(), ...) ? > > That'd make this patch more intrusive, but would make the whole codebase > work with FWB enabled on a guest by guest basis. I don't see us use that > anytime soon (other than maybe debug of some sort?) but it'd be good to > have an agreement. I don't see the value in spreading this everywhere for now. > arch/arm64/include/asm/kvm_pgtable.h | 19 +++++++++-- > arch/arm64/include/asm/pgtable-prot.h | 4 +-- > arch/arm64/kvm/hyp/pgtable.c | 49 +++++++++++++++++---------- > 3 files changed, 50 insertions(+), 22 deletions(-) > > diff --git a/arch/arm64/include/asm/kvm_pgtable.h b/arch/arm64/include/asm/kvm_pgtable.h > index b93a2a3526ab..7382bdfb6284 100644 > --- a/arch/arm64/include/asm/kvm_pgtable.h > +++ b/arch/arm64/include/asm/kvm_pgtable.h > @@ -56,6 +56,15 @@ struct kvm_pgtable_mm_ops { > phys_addr_t (*virt_to_phys)(void *addr); > }; > > +/** > + * enum kvm_pgtable_stage2_flags - Stage-2 page-table flags. > + * @KVM_PGTABLE_S2_NOFWB: Don't enforce Normal-WB even if the CPUs have > + * ARM64_HAS_STAGE2_FWB. > + */ > +enum kvm_pgtable_stage2_flags { > + KVM_PGTABLE_S2_NOFWB = BIT(0), > +}; > + > /** > * struct kvm_pgtable - KVM page-table. > * @ia_bits: Maximum input address size, in bits. > @@ -72,6 +81,7 @@ struct kvm_pgtable { > > /* Stage-2 only */ > struct kvm_s2_mmu *mmu; > + enum kvm_pgtable_stage2_flags flags; > }; > > /** > @@ -201,11 +211,16 @@ u64 kvm_get_vtcr(u64 mmfr0, u64 mmfr1, u32 phys_shift); > * @arch: Arch-specific KVM structure representing the guest virtual > * machine. > * @mm_ops: Memory management callbacks. > + * @flags: Stage-2 configuration flags. > * > * Return: 0 on success, negative error code on failure. > */ > -int kvm_pgtable_stage2_init(struct kvm_pgtable *pgt, struct kvm_arch *arch, > - struct kvm_pgtable_mm_ops *mm_ops); > +int kvm_pgtable_stage2_init_flags(struct kvm_pgtable *pgt, struct kvm_arch *arch, > + struct kvm_pgtable_mm_ops *mm_ops, > + enum kvm_pgtable_stage2_flags flags); > + > +#define kvm_pgtable_stage2_init(pgt, arch, mm_ops) \ > + kvm_pgtable_stage2_init_flags(pgt, arch, mm_ops, 0) nit: I think some of the kerneldoc refers to "kvm_pgtable_stage_init()" so that needs a trivial update to e.g. "kvm_pgtable_stage_init*()". > diff --git a/arch/arm64/include/asm/pgtable-prot.h b/arch/arm64/include/asm/pgtable-prot.h > index 046be789fbb4..beeb722a82d3 100644 > --- a/arch/arm64/include/asm/pgtable-prot.h > +++ b/arch/arm64/include/asm/pgtable-prot.h > @@ -72,10 +72,10 @@ extern bool arm64_use_ng_mappings; > #define PAGE_KERNEL_EXEC __pgprot(PROT_NORMAL & ~PTE_PXN) > #define PAGE_KERNEL_EXEC_CONT __pgprot((PROT_NORMAL & ~PTE_PXN) | PTE_CONT) > > -#define PAGE_S2_MEMATTR(attr) \ > +#define PAGE_S2_MEMATTR(attr, has_fwb) \ > ({ \ > u64 __val; \ > - if (cpus_have_const_cap(ARM64_HAS_STAGE2_FWB)) \ > + if (has_fwb) \ > __val = PTE_S2_MEMATTR(MT_S2_FWB_ ## attr); \ > else \ > __val = PTE_S2_MEMATTR(MT_S2_ ## attr); \ Can you take the pgt structure instead of a bool here, or does it end up being really ugly? Will