Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp6405459rwl; Tue, 4 Apr 2023 12:10:00 -0700 (PDT) X-Google-Smtp-Source: AKy350ZcSCexpcHxNoTYgRSb5KfnpKYMpuqangvGQEVYOZEnIGw8BDR0qZeBbxakJnghKohPA5ci X-Received: by 2002:a17:902:ecca:b0:19c:da68:337a with SMTP id a10-20020a170902ecca00b0019cda68337amr4646527plh.31.1680635400455; Tue, 04 Apr 2023 12:10:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680635400; cv=none; d=google.com; s=arc-20160816; b=hORBzhHcLzwJFKWdcncDkg6a0Cofp6B7m/FLYSp1ODphi23DVZ28Wi9YDWF6kmvyAy uBVADyozzWqbhLJQzQcnfGHEa7EN6PHEOkxQvzRrZCNClbwkfVaaScyAEL27KqUdS5zW DpKPzB0BWyUPj5AlcGz9MgUvWef7HjNSxKrthdUbhHVhrm1hj2N52Kes3sCU6fDMxRik hlzuUlPgAz5kCuKIm2oKGXylZhVi2MyHMKT/IujrbfawsQGmVVs5DiPeeZ92bY/OvWk2 7QmqK2hjmXSZ2XvldxtI//yp0jfCuJwCYY+MB/ldszTSMY+bmAX3qsafeMUDUxUdTxoF JTsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:dkim-signature:date; bh=S1gwK2nwRYjccyYSDh2DfgE6FA3Ietx2jBphXAwjNbk=; b=bMc8OUKoCEK5Wl+o7bKl/zw7H0BGYXzmZz+cVuHdx/S5o2ZOm1eRB9O4F+7mpNZUK9 1yC9GMKq/S2aihF514Z6P4MP7nIylP/t9hdR5MSr9HnSuUD6jJvhIwdXISaDBaBOg6dd m/W0LlzbhIN3tHf4IHRY0Q8ueF7JbwPSX7p8/txQaqe/5p8Q7tKhKMTUWERJXhiczMeH tplN2ZkRJ6kheKaXgLOgr4eQdQrfZYiclLbrt3PChNbRTzzIn4bLxFcO9ZHvCWnkXUsT CwtBljGr59VX7kC7d6W1B7EVcMOeA4tLptboA9DpX/P9eFdXJyGt1u4rRsEkyFOFk12P 9xKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=Yu2TDQQa; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i12-20020a655b8c000000b0050bfc20c788si11067827pgr.282.2023.04.04.12.09.48; Tue, 04 Apr 2023 12:10:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=Yu2TDQQa; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235223AbjDDTJc (ORCPT + 99 others); Tue, 4 Apr 2023 15:09:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43334 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235018AbjDDTJb (ORCPT ); Tue, 4 Apr 2023 15:09:31 -0400 Received: from out-38.mta1.migadu.com (out-38.mta1.migadu.com [95.215.58.38]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C81F12D50 for ; Tue, 4 Apr 2023 12:09:26 -0700 (PDT) Date: Tue, 4 Apr 2023 19:09:17 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1680635363; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=S1gwK2nwRYjccyYSDh2DfgE6FA3Ietx2jBphXAwjNbk=; b=Yu2TDQQadJpNt4mwGvQ9bzOiNHxLFFVeynE9Zm4Z/2zV4EpNmeVQ0aosrF7mNhuNrIwjzT gapdoPi3cKVwSWnN3/qKJohgqXd7/RWoQXLNr/W+t79INkjFQMYcwXRQ4AKeiSxDFLeBKr b8zbHPJJu5vXodgmHwXHnG2L+fKTZPM= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Oliver Upton To: Raghavendra Rao Ananta Cc: Oliver Upton , Marc Zyngier , Ricardo Koller , Reiji Watanabe , James Morse , Alexandru Elisei , Suzuki K Poulose , Will Deacon , Paolo Bonzini , Catalin Marinas , Jing Zhang , Colton Lewis , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: Re: [PATCH v2 4/7] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range() Message-ID: References: <20230206172340.2639971-1-rananta@google.com> <20230206172340.2639971-5-rananta@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 03, 2023 at 02:23:17PM -0700, Raghavendra Rao Ananta wrote: > On Wed, Mar 29, 2023 at 5:53 PM Oliver Upton wrote: > > > > On Mon, Feb 06, 2023 at 05:23:37PM +0000, Raghavendra Rao Ananta wrote: > > > Implement kvm_arch_flush_remote_tlbs_range() for arm64, > > > such that it can utilize the TLBI range based instructions > > > if supported. > > > > > > Signed-off-by: Raghavendra Rao Ananta > > > --- > > > arch/arm64/include/asm/kvm_host.h | 3 +++ > > > arch/arm64/kvm/mmu.c | 15 +++++++++++++++ > > > 2 files changed, 18 insertions(+) > > > > > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > > > index dee530d75b957..211fab0c1de74 100644 > > > --- a/arch/arm64/include/asm/kvm_host.h > > > +++ b/arch/arm64/include/asm/kvm_host.h > > > @@ -1002,6 +1002,9 @@ struct kvm *kvm_arch_alloc_vm(void); > > > #define __KVM_HAVE_ARCH_FLUSH_REMOTE_TLBS > > > int kvm_arch_flush_remote_tlbs(struct kvm *kvm); > > > > > > +#define __KVM_HAVE_ARCH_FLUSH_REMOTE_TLBS_RANGE > > > +int kvm_arch_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages); > > > + > > > static inline bool kvm_vm_is_protected(struct kvm *kvm) > > > { > > > return false; > > > diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c > > > index e98910a8d0af6..409cb187f4911 100644 > > > --- a/arch/arm64/kvm/mmu.c > > > +++ b/arch/arm64/kvm/mmu.c > > > @@ -91,6 +91,21 @@ int kvm_arch_flush_remote_tlbs(struct kvm *kvm) > > > return 0; > > > } > > > > > > +int kvm_arch_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages) > > > +{ > > > + phys_addr_t start, end; > > > + > > > + if (!system_supports_tlb_range()) > > > + return -EOPNOTSUPP; > > > > There's multiple layers of fallback throughout this series, as it would > > appear that deep in __kvm_tlb_flush_range() you're blasting the whole > > VMID if either the range is too large or the feature isn't supported. > > > > Is it possible to just normalize on a single spot to gate the use of > > range-based invalidations? I have a slight preference for doing it deep > > in the handler, as it keeps the upper layers of code a bit more > > readable. > > > I was a little skeptical on this part, since the > kvm_arch_flush_remote_tlbs_range() expects to return -EOPNOTSUPP if > indeed there's no support. Well, the arch-neutral code can expect whatever it wants :) The only real contract we have with it is to return 0 iff the specified range has been invalidated, even if that comes with over-invalidating. > But I see your point. The if-else in kvm_pgtable_stage2_flush_range() > seems redundant and I can simply manage this conditions inside > __kvm_tlb_flush_range_vmid_ipa() itself, but I'll leave the > kvm_arch_flush_remote_tlbs_range()'s implementation as is. Thoughts? The largest concern I had is that the series is testing for FEAT_TLBIRANGE all over the shop and I just raised that concern on this patch. AFAICT, the iterative approach to invalidating a range of IPAs is effectively dead code, as all flows into __kvm_tlb_flush_range_vmid_ipa() are gated by system_supports_tlb_range() somewhere. Personally, I prefer keeping the higher level software models making aggressive use of range-based interfaces and letting the actual implementation under the hood select the appropriate instruction. That helps readability, as it directly communicates the expected outcome of the invalidation. So, if you want to make use of the iterative approach to TLB invalidations on !TLBIRANGE systems, then this function should _not_ return EOPNOTSUPP. -- Thanks, Oliver