Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5118409pxv; Wed, 28 Jul 2021 03:39:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxpRQyVxpSjOtkmWn4LjChcvAnA41JzP8e/afT73+qWHh5AcSd0FFjX3NmmMool2E71zU6R X-Received: by 2002:a92:7b08:: with SMTP id w8mr20427917ilc.190.1627468794086; Wed, 28 Jul 2021 03:39:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627468794; cv=none; d=google.com; s=arc-20160816; b=wQpjde62lkL09dpcbuLe2a6vEOkvFi4V0fztpMnscAFfMpD2TNRh0EBuX9ur5Ft2aU GdCyu9KKJa1gJoRRS7gXTn/Cn5XYNmz2IsvjlraN961FVWOKNc8Yhlrt3OET7xpe0ta3 ctN2ZzJMT/IL98h2n7nDUQW8EC4dWF31PFoS0hYginEcbHn7bI8S67UsBNA7DnCN9tji tT05wQz8Y6FUlMcwTzIPnHL+JFTPykV5e4IoGpRFRi2sNA1FdNRUKs60scKZeE05JG+P YgLO+yqJFry9HLEUBmJIghhk1Z6TXA7iGcdQczlVgdQrDdt8lU4yHVKFjgnQDLKivm1w 7hpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date; bh=Km1E7gB9H47okOT0cCAXPueM/hLB/d3bJLsuwYsQ2IY=; b=X0MvVaMifdJs10UM22cORvxx36QGHtG69GHXl75phIhGFQhaopVzA1gVRSDENZkOUm uJOjgBhEsdMj6oOPK8KgMbmcSJtVXblJLMlOj2f97ufjYAakurdtmx8sEEWbdMCNunNO ighwY+NNZIAU5M4YIWaJjcU5IL8MuWNELhFxKi8aztKnFhfZPtpvzzQyv5EOvagdgXe4 IM5F6o+0+XQtEQLU1p7psBUs5H3OoMoqJ092WssGA6P803a5vJAKEvx/keFYkfIvSsp3 MOY/Dn9MR3fFzqfHVqkE/ScwCoAYpvz+aFJMJKrTG5V/BjOoBM+MttgdYnFZYDHwSVqw ubiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k14si783472jad.34.2021.07.28.03.39.42; Wed, 28 Jul 2021 03:39:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235974AbhG1Kij (ORCPT + 99 others); Wed, 28 Jul 2021 06:38:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:47078 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234261AbhG1Kij (ORCPT ); Wed, 28 Jul 2021 06:38:39 -0400 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D598C60F9B; Wed, 28 Jul 2021 10:38:37 +0000 (UTC) Received: from sofa.misterjones.org ([185.219.108.64] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1m8gxP-001VeA-OZ; Wed, 28 Jul 2021 11:38:35 +0100 Date: Wed, 28 Jul 2021 11:38:35 +0100 Message-ID: <87wnpad8pg.wl-maz@kernel.org> From: Marc Zyngier To: Will Deacon Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, qperret@google.com, dbrazdil@google.com, Srivatsa Vaddagiri , Shanker R Donthineni , James Morse , Suzuki K Poulose , Alexandru Elisei , kernel-team@android.com Subject: Re: [PATCH 06/16] KVM: arm64: Force a full unmap on vpcu reinit In-Reply-To: <20210727181132.GE19173@willie-the-truck> References: <20210715163159.1480168-1-maz@kernel.org> <20210715163159.1480168-7-maz@kernel.org> <20210727181132.GE19173@willie-the-truck> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: will@kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, qperret@google.com, dbrazdil@google.com, vatsa@codeaurora.org, sdonthineni@nvidia.com, james.morse@arm.com, suzuki.poulose@arm.com, alexandru.elisei@arm.com, kernel-team@android.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 27 Jul 2021 19:11:33 +0100, Will Deacon wrote: > > On Thu, Jul 15, 2021 at 05:31:49PM +0100, Marc Zyngier wrote: > > As we now keep information in the S2PT, we must be careful not > > to keep it across a VM reboot, which could otherwise lead to > > interesting problems. > > > > Make sure that the S2 is completely discarded on reset of > > a vcpu, and remove the flag that enforces the MMIO check. > > > > Signed-off-by: Marc Zyngier > > --- > > arch/arm64/kvm/arm.c | 8 +++++++- > > 1 file changed, 7 insertions(+), 1 deletion(-) > > > > diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c > > index 97ab1512c44f..b0d2225190d2 100644 > > --- a/arch/arm64/kvm/arm.c > > +++ b/arch/arm64/kvm/arm.c > > @@ -1096,12 +1096,18 @@ static int kvm_arch_vcpu_ioctl_vcpu_init(struct kvm_vcpu *vcpu, > > * ensuring that the data side is always coherent. We still > > * need to invalidate the I-cache though, as FWB does *not* > > * imply CTR_EL0.DIC. > > + * > > + * If the MMIO guard was enabled, we pay the price of a full > > + * unmap to get back to a sane state (and clear the flag). > > */ > > if (vcpu->arch.has_run_once) { > > - if (!cpus_have_final_cap(ARM64_HAS_STAGE2_FWB)) > > + if (!cpus_have_final_cap(ARM64_HAS_STAGE2_FWB) || > > + test_bit(KVM_ARCH_FLAG_MMIO_GUARD, &vcpu->kvm->arch.flags)) > > stage2_unmap_vm(vcpu->kvm); > > else > > icache_inval_all_pou(); > > + > > + clear_bit(KVM_ARCH_FLAG_MMIO_GUARD, &vcpu->kvm->arch.flags); > > What prevents this racing with another vCPU trying to set the bit? Not much. We could take the kvm lock on both ends to serialize it, but that's pretty ugly. And should we care? What is the semantic of resetting a vcpu while another is still running? If we want to support this sort of behaviour, then our tracking is totally bogus, because it is VM-wide. And you don't even have to play with that bit from another vcpu: all the information is lost at the point where we unmap the S2 PTs. Maybe an alternative is to move this to the halt/reboot PSCI handlers, making it clearer what we expect? M. -- Without deviation from the norm, progress is not possible.