Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1041180rwb; Thu, 1 Dec 2022 11:30:53 -0800 (PST) X-Google-Smtp-Source: AA0mqf6jLdaYyAUQCxTr85d2ehK5texcblIlE9lPd3gTw3Umgvjk7kQlRC1FKOTvoB7Ob1F/UkXj X-Received: by 2002:a05:6402:5d5:b0:464:fa1:9ece with SMTP id n21-20020a05640205d500b004640fa19ecemr37284493edx.262.1669923052780; Thu, 01 Dec 2022 11:30:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669923052; cv=none; d=google.com; s=arc-20160816; b=QYYymxqCVv0MNefylMSu48hHCPElku9nuy9yFHPsredO4m+GwTMNBzQT05Hse7xf+s 73/7Nw1N25PLkaFKafGgaoi/UxAEfTrDWeSgSjb5VpnkHw2FWlj57F2gxcnUA+aEdMCL vNDSwK7v/1Sgz3D94HKUn0ile8Zuwn71haiHUMA4IJhAY8F3r9wSP1y0XtoYoI7Sq77K Cqigh+JVVJw70FRz4eYR8L7GWPB6CLxjQui6OzuBfGJofYOHeKJTQ4sMKdWj3mN7xikX pltg90oW8j+KwvZqmAcgPk0bg3+u0AfeFN9s6GBlcMRfKAYgyCffBRPBPI31OkH8T17m MzPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=jbNkyJRZNLSZzv6fzVp+Oqm7mNoBogduDpr5zEVK+Q4=; b=lukNJ+amq2je2Jd5WIR3wsMhJIyD/aiWFVUL4k6hWkyyDy9jC78+J4pV9kxFTBw3p9 xay27dXQkirYc4c0wM5Wy4Wv5BXUCjRkv37c2URsJXnFW0jatODQOcXdNwE4yBXOy+C+ KC2EbeF/5UHMwLalzywMwlaPMPe+oliMtF8BcsH3eaZVXAZne/scwQR1D9xJ+/fW5YBm o2HmPcBTHw5xSTWofQmEC+hctYyLFNfwgPntSC6xE9/LCVBBbjJyz0XTEb6ZKeB54bp2 1K9V5POXIsI8TI2ciQgV94i6hgHHMfe6j22w+U0DQDXErT+P3x9Xwlus48CK+ynu//aK 19sQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sg40-20020a170907a42800b007b4d76f5b17si4623934ejc.82.2022.12.01.11.30.33; Thu, 01 Dec 2022 11:30:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229973AbiLASaB (ORCPT + 82 others); Thu, 1 Dec 2022 13:30:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57514 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229515AbiLAS37 (ORCPT ); Thu, 1 Dec 2022 13:29:59 -0500 Received: from out2.migadu.com (out2.migadu.com [IPv6:2001:41d0:2:aacc::]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 379339B7A5 for ; Thu, 1 Dec 2022 10:29:58 -0800 (PST) Date: Thu, 1 Dec 2022 18:29:51 +0000 X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Oliver Upton To: Marc Zyngier Cc: Akihiko Odaki , linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, Mathieu Poirier , Suzuki K Poulose , Alexandru Elisei , James Morse , Will Deacon , Catalin Marinas , asahi@lists.linux.dev, Alyssa Rosenzweig , Sven Peter , Hector Martin Subject: Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches Message-ID: References: <20221201104914.28944-1-akihiko.odaki@daynix.com> <867czbmlh1.wl-maz@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <867czbmlh1.wl-maz@kernel.org> X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 01, 2022 at 11:06:50AM +0000, Marc Zyngier wrote: [...] > It would be a lot better to expose a virtual topology > (one set, one way, one level). It would also save us from the CCSIDRX > silliness. > > The only complexity would be to still accept different topologies from > userspace so that we can restore a VM saved before this virtual > topology. I generally agree that the reported topology is meaningless to non-secure software. However, with the cloud vendor hat on, I'm worried that inevitably some customer will inspect the cache topology of the VM we've provided them and complain. Could we extend your suggestion about accepting different topologies to effectively tolerate _any_ topology provided by userspace? KVM can default to the virtual topology, but a well-informed userspace could still provide different values to its guest. No point in trying to babyproofing the UAPI further, IMO. -- Thanks, Oliver