Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp2184679rwl; Thu, 13 Apr 2023 02:55:17 -0700 (PDT) X-Google-Smtp-Source: AKy350Y3x56r+ovvOn4BTZ+pO1nZhd9mUmcGDbw+T7y4RgFMJY1ajxfeAv2nhVHq0uYdUfvdO5U/ X-Received: by 2002:a05:6a20:6620:b0:be:da1c:df65 with SMTP id n32-20020a056a20662000b000beda1cdf65mr1471327pzh.28.1681379717634; Thu, 13 Apr 2023 02:55:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681379717; cv=none; d=google.com; s=arc-20160816; b=Cl4UoATRTgAAwaE/a7Z4rGlIcFHuCm3i8XmTZn37ZMzrb+xJUGna2JbmCOf0twHbfo cX4Orl+3q5joij4BwcQ3n0WGu2LtLYKkUQK/xPoRs+UB5gvTDhX3XkU6vknAUNi5BbMk 9NUMJSyPkePsdwOY6pd2p5VO25hYf+inIeoX09qJEeeCdwW6XZ3gPUZfH049TmURJ67c Xb+NdP+iDjwvQPpZBUFAKOqq3EaHNcN+z+N8tS3bXAQ2dSY+9pZiM0SEkWZwtOMjbQWb mt6CsCarow/38dPfPeO8nDJCjnrtGn2U3QUa1yMw3eJfPEzil6yQ/20JNyqrRl2P0aJY nTaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=57A2BMMP3/yQMc9mvS1/WGnVuMG6M+KRKDU2Vzffo40=; b=sY5QPlxT05M9j/6KJfRNyaaByNFfPtTbM8bVfRhV8nLgbYC+30kb7zdcGXT/LInOMI pyxu1hRS/5QWxXlbAHHgVgt66KlljguQUg6lWH/El5aBh+mZ8duz5CbXUiI4TnlKUYln 6TuAfT2X30rnQF5GKJLPtpX7METpq67c4b+baAeiXoch+qSO4JHlamKBig3ngt26QNRU tBnJI+uQrUw9eWRGAXYFUvpot5COH/8YMn48Vq3gi7puLlMLsHhMItJcRltuY/ReyAk1 Depkj0kWwdf4OgDBGhc3JCbJZPl4b29LN4GN2npUEAbe607bh67p04VKKPcLSrKUcCyh 3FuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ozUVL5Wl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i186-20020a6387c3000000b0051b28ed8e0asi1744228pge.540.2023.04.13.02.55.06; Thu, 13 Apr 2023 02:55:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ozUVL5Wl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229713AbjDMJwW (ORCPT + 99 others); Thu, 13 Apr 2023 05:52:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229708AbjDMJwR (ORCPT ); Thu, 13 Apr 2023 05:52:17 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EDB3E30F3; Thu, 13 Apr 2023 02:52:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8C0F863CC9; Thu, 13 Apr 2023 09:52:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F0009C433D2; Thu, 13 Apr 2023 09:52:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1681379533; bh=z5Duc20+BxsHeLAvvLwabMO0xTmluXnayswo1xBwGrY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ozUVL5WlWHFn6r0EiW5ErMVPB1jWgajxhrwnHdVCEkdfHry6uEFXEaQpfJQ7CuIkt QDEMsqngpDBM4QYA1+HbPlhMD/Bqopw1wMulPu79MkMY3SbXrTthfSnU3LTs46I+JU 1lE2G0qLOap8DdgJx1a5lwumH4SHx/VpEngECJcmOJ+lYzUMcjGQjxhToN9cIpwYhP VmmtzMSIUMB/0MhKFYeR8mWRtWXfw36lRIDMoRZHZOMmstSJoPk7k2sNIjvMlyPOUA U6wNf08ZZ2BL3VM807G4O6CHMsrY8DYl7h2cDVbUc8VXDGu2eNNtb3jxsLs9oIT/09 Cf9MipMxCdRag== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1pmtcg-0084PT-JS; Thu, 13 Apr 2023 10:52:10 +0100 Date: Thu, 13 Apr 2023 10:52:10 +0100 Message-ID: <86ile0kt2t.wl-maz@kernel.org> From: Marc Zyngier To: Jason Gunthorpe Cc: ankita@nvidia.com, alex.williamson@redhat.com, naoya.horiguchi@nec.com, oliver.upton@linux.dev, aniketa@nvidia.com, cjia@nvidia.com, kwankhede@nvidia.com, targupta@nvidia.com, vsethi@nvidia.com, acurrid@nvidia.com, apopple@nvidia.com, jhubbard@nvidia.com, danw@nvidia.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org Subject: Re: [PATCH v3 0/6] Expose GPU memory as coherently CPU accessible In-Reply-To: References: <20230405180134.16932-1-ankita@nvidia.com> <86sfd5l1yf.wl-maz@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/28.2 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: jgg@nvidia.com, ankita@nvidia.com, alex.williamson@redhat.com, naoya.horiguchi@nec.com, oliver.upton@linux.dev, aniketa@nvidia.com, cjia@nvidia.com, kwankhede@nvidia.com, targupta@nvidia.com, vsethi@nvidia.com, acurrid@nvidia.com, apopple@nvidia.com, jhubbard@nvidia.com, danw@nvidia.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 12 Apr 2023 13:53:07 +0100, Jason Gunthorpe wrote: > > On Wed, Apr 12, 2023 at 01:28:08PM +0100, Marc Zyngier wrote: > > On Wed, 05 Apr 2023 19:01:28 +0100, > > wrote: > > > > > > From: Ankit Agrawal > > > > > > NVIDIA's upcoming Grace Hopper Superchip provides a PCI-like device > > > for the on-chip GPU that is the logical OS representation of the > > > internal propritary cache coherent interconnect. > > > > > > This representation has a number of limitations compared to a real PCI > > > device, in particular, it does not model the coherent GPU memory > > > aperture as a PCI config space BAR, and PCI doesn't know anything > > > about cacheable memory types. > > > > > > Provide a VFIO PCI variant driver that adapts the unique PCI > > > representation into a more standard PCI representation facing > > > userspace. The GPU memory aperture is obtained from ACPI, according to > > > the FW specification, and exported to userspace as the VFIO_REGION > > > that covers the first PCI BAR. qemu will naturally generate a PCI > > > device in the VM where the cacheable aperture is reported in BAR1. > > > > > > Since this memory region is actually cache coherent with the CPU, the > > > VFIO variant driver will mmap it into VMA using a cacheable mapping. > > > > > > As this is the first time an ARM environment has placed cacheable > > > non-struct page backed memory (eg from remap_pfn_range) into a KVM > > > page table, fix a bug in ARM KVM where it does not copy the cacheable > > > memory attributes from non-struct page backed PTEs to ensure the guest > > > also gets a cacheable mapping. > > > > This is not a bug, but a conscious design decision. As you pointed out > > above, nothing needed this until now, and a device mapping is the only > > safe thing to do as we know exactly *nothing* about the memory that > > gets mapped. > > IMHO, from the mm perspective, the bug is using pfn_is_map_memory() to > determine the cachability or device memory status of a PFN in a > VMA. That is not what that API is for. It is the right API for what KVM/arm64 has been designed for. RAM gets a normal memory mapping, and everything else gets device. That may not suit your *new* use case, but that doesn't make it broken. > > The cachability should be determined by the pgprot bits in the VMA. > > VM_IO is the flag that says the VMA maps memory with side-effects. > > I understand in ARM KVM it is not allowed for the VM and host to have > different cachability, so mis-detecting host cachable memory and > making it forced non-cachable in the VM is not a safe thing to do? Only if you insist on not losing coherency between the two aliases used at the same time (something that would seem pretty improbable). And said coherency can be restored by using CMOs, as documented in B2.8. M. -- Without deviation from the norm, progress is not possible.