Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1330801rwb; Thu, 1 Dec 2022 16:03:36 -0800 (PST) X-Google-Smtp-Source: AA0mqf7zSSlRAU2P0wg/6Xi9wVLoqviSCLZgbSCsFhxPuhXaoO/QCKU3TJynSOioKkNhV9rk0l7+ X-Received: by 2002:a17:906:524f:b0:7ae:59dd:e3f4 with SMTP id y15-20020a170906524f00b007ae59dde3f4mr47049886ejm.755.1669939415996; Thu, 01 Dec 2022 16:03:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669939415; cv=none; d=google.com; s=arc-20160816; b=H2eRlYfJ2uPDkSeBdlAk5xWvi8zQuuFC24ItqVbfqRF87W/iwHxksdsqPpMZWF0FiP bXjgmk0MxCoTgBnjnmuWF2jojawugAZB5TqWEPq5VtweePL7ljW77Q3tI3mea7I9koXl k8pudIfu4gVuDzS7E6DUUZtVP/44UMK3LtApxwE800rZ9s5UqXSCkh9X8TQ5lUhTIDze THcIMXo0mYk12AmIuvo4CjNQHQ1SchjRiPqD/Vi/IoXltUO/7krKPuOUQENMQ0sRfz+x uO46Vg0ArcZHy5ftw1e3W/QWZp+h4bIySv6jGtZQaTWZHMgmKN5SJSs997O0XMPoAdv7 Wz+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=17iLUr3pJ5kIxoy7HWiIRYcvmYF3cqTfWMGgy/1L9lM=; b=KHsRbuidlTRWkcBooriwHezrPW0btHRkqtNa4uX+QZdzdQPdITWnMFroqTVigf4UXs B45gNeJeNPrqUgkpAtW84Cr321980zaO0Bw/g4hHWvnv5Gf35lHYfMip2tgJvVU0TwvT fBg4Q8TpKGTfos9X8JJc0YhkXdOkMSz0i3gAJ6fmbwyEsppVUeF9S7+AsCRk6qmh07f6 0K80Qo4VTQ3mUp8bVO20Q6J8+TlVq5MA7FipuHGTzqKZ3nZQZf1xW4KhLKr0old3lign 3ML1U9ng+SqcsX7byzTMSo2HEMraI9F/k83OSMgSv4Tarm7QeUGWW7d1/XYmt1kuudU1 VxxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=rsthgWMx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ht13-20020a170907608d00b007830e41ed56si4990362ejc.431.2022.12.01.16.03.16; Thu, 01 Dec 2022 16:03:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=rsthgWMx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231299AbiLAXOz (ORCPT + 81 others); Thu, 1 Dec 2022 18:14:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45246 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231269AbiLAXOx (ORCPT ); Thu, 1 Dec 2022 18:14:53 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 858E024BCF for ; Thu, 1 Dec 2022 15:14:50 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1FAF162169 for ; Thu, 1 Dec 2022 23:14:50 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7D45EC433D6; Thu, 1 Dec 2022 23:14:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669936489; bh=sW2w9vG53AsHMr88biNtK5xVlmmBmRvG3cpj2Bp8Jg4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=rsthgWMx6bnE+lspTiwU+KDdWOou+nBiG3jBf5wj014VIwGxMiGdpV0oRwYMbTQhb ZL0lRC49+Aq+/cPwWa63O2wtLQlh6jnj1ogAw12hQA7fMVGdJAnuRdy49S75f786Ph zNF7ejF1U0y7fcmlqghsZZoMx57g/TNk6H2DSbzsWvuxke0S8psrF2s5eznardWAXR aaE11RfDe/Gsb0L3onC8e+fvwJ11mKK9LgoxzrDNMgv9xOau9QBaZx7PwiaTrLBe83 ICp/+PraeAlJ8qLbEftISRM3qylUs/D2MwvJ0tUJi71BOk9/SzCDLqD5JgBPWlRJbj ucGRYQH0OBf8A== Received: from 51-171-6-54-dynamic.agg9.chf.chf-qkr.eircom.net ([51.171.6.54] helo=wait-a-minute.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1p0slT-009wHo-7n; Thu, 01 Dec 2022 23:14:47 +0000 Date: Thu, 01 Dec 2022 23:14:43 +0000 Message-ID: <87k03au36k.wl-maz@kernel.org> From: Marc Zyngier To: Oliver Upton Cc: Akihiko Odaki , linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, Mathieu Poirier , Suzuki K Poulose , Alexandru Elisei , James Morse , Will Deacon , Catalin Marinas , asahi@lists.linux.dev, Alyssa Rosenzweig , Sven Peter , Hector Martin Subject: Re: [PATCH 0/3] KVM: arm64: Handle CCSIDR associativity mismatches In-Reply-To: References: <20221201104914.28944-1-akihiko.odaki@daynix.com> <867czbmlh1.wl-maz@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 51.171.6.54 X-SA-Exim-Rcpt-To: oliver.upton@linux.dev, akihiko.odaki@daynix.com, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, mathieu.poirier@linaro.org, suzuki.poulose@arm.com, alexandru.elisei@arm.com, james.morse@arm.com, will@kernel.org, catalin.marinas@arm.com, asahi@lists.linux.dev, alyssa@rosenzweig.io, sven@svenpeter.dev, marcan@marcan.st X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 01 Dec 2022 18:29:51 +0000, Oliver Upton wrote: > > On Thu, Dec 01, 2022 at 11:06:50AM +0000, Marc Zyngier wrote: > > [...] > > > It would be a lot better to expose a virtual topology > > (one set, one way, one level). It would also save us from the CCSIDRX > > silliness. > > > > The only complexity would be to still accept different topologies from > > userspace so that we can restore a VM saved before this virtual > > topology. > > I generally agree that the reported topology is meaningless to > non-secure software. > > However, with the cloud vendor hat on, I'm worried that inevitably some > customer will inspect the cache topology of the VM we've provided them > and complain. That's their prerogative. It is idiotic, but I guess paying customers get this privilege ;-). > Could we extend your suggestion about accepting different topologies to > effectively tolerate _any_ topology provided by userspace? KVM can > default to the virtual topology, but a well-informed userspace could > still provide different values to its guest. No point in trying to > babyproofing the UAPI further, IMO. I think this is *exactly* what I suggested. Any valid topology should be able to be restored, as we currently present the VM with any topology the host HW may have. This must be preserved. Eventually, we may even have to expose CCSIDRX, but let's cross that bridge when we get to it. Thanks, M. -- Without deviation from the norm, progress is not possible.