Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp946939rdg; Fri, 13 Oct 2023 06:08:22 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEeZeYALsuvwAYfOfewyUz5jEsGUsrhwdczdVVspYsBzysI1Gjr4pWzBRCDivtAYkfJWl7k X-Received: by 2002:a05:6a20:3d8b:b0:13d:2f80:cf1c with SMTP id s11-20020a056a203d8b00b0013d2f80cf1cmr27781270pzi.17.1697202502173; Fri, 13 Oct 2023 06:08:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697202502; cv=none; d=google.com; s=arc-20160816; b=T7i7bObUnOTheuzSoxVeJ57aKtKmI3aO4+H0bJEVDFZlytH0mttL4GrDj4yaUMJx6W GYXxRvdYEl6X8m0XE8cengC0zX6vR4C3chOjgLvh99lbyN3KLrjg2VbwapwjHKiDjBKq cVuXx1fRPEmgq2ycZ1mIVtH/ILSkTZLQivX1ld4i7RMZMKVr+5xJwWM3p5PrIaLaY6Ln 2e3L9vqJdnMrm/+P/lKPdfwg/hfd1vcZnlwutBysgJ99Os2LY3tey2uXYovqgprsHbNh XdUssQVYBUOHhzb0iCmkQTo55epRcA2K0D/sdxtMJMOvPGIo3pUclLjZhxQIjcPlQ3Kb temg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=pJwP+6rtgfqYln0c3ADuhb82vtpVgP6dZnse//XMvcE=; fh=3jcJIL3+j/4vL3mdWb6qW4zMQlah4YMufGwp4BPpsqo=; b=ETcVF8vZKMu/gdCEsMqdvwHwBL3YrwNXkV8tNk17aeld1+RWGU6bqoia9RUH0bX8oH BH32TZhvkdJ6/4QJU5UrQGr6Ou1Skloc0EDLKcpa70QYSl7xqnu1t0jidvunxVC3wUas W4UIzsDZpsm71vxlLX0/hSCHgCyzgLxh8Luqus8WFIRAwBaQBxtFmmUtMT5CrWkyc73F hti+16OADYzEnfWS+5VyxDOm7e69MOB0cjXxHtZ9iAWEjoaFVXUWi2iY2K6Pc8pwAeT+ URexnlsTFgJ7KDNMCmg/WKf8p6iYLubOm6nWB2gOGPVsvBbnqdeuiA71Vay9K9UHx1Jp dPPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id rm13-20020a17090b3ecd00b002774df69ae4si48415pjb.92.2023.10.13.06.08.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Oct 2023 06:08:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 0CB408047063; Fri, 13 Oct 2023 06:08:21 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231822AbjJMNIT (ORCPT + 99 others); Fri, 13 Oct 2023 09:08:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44592 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231341AbjJMNIR (ORCPT ); Fri, 13 Oct 2023 09:08:17 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5104ABE for ; Fri, 13 Oct 2023 06:08:16 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C42C1C433C8; Fri, 13 Oct 2023 13:08:12 +0000 (UTC) Date: Fri, 13 Oct 2023 14:08:10 +0100 From: Catalin Marinas To: Will Deacon Cc: Lorenzo Pieralisi , Jason Gunthorpe , ankita@nvidia.com, maz@kernel.org, oliver.upton@linux.dev, aniketa@nvidia.com, cjia@nvidia.com, kwankhede@nvidia.com, targupta@nvidia.com, vsethi@nvidia.com, acurrid@nvidia.com, apopple@nvidia.com, jhubbard@nvidia.com, danw@nvidia.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [PATCH v1 2/2] KVM: arm64: allow the VM to select DEVICE_* and NORMAL_NC for IO memory Message-ID: References: <20231012123541.GB11824@willie-the-truck> <20231012144807.GA12374@willie-the-truck> <20231013092934.GA13524@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231013092934.GA13524@willie-the-truck> X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Fri, 13 Oct 2023 06:08:21 -0700 (PDT) On Fri, Oct 13, 2023 at 10:29:35AM +0100, Will Deacon wrote: > On Thu, Oct 12, 2023 at 06:26:01PM +0100, Catalin Marinas wrote: > > On Thu, Oct 12, 2023 at 03:48:08PM +0100, Will Deacon wrote: > > > Claiming back the device also seems strange if the guest has been using > > > non-cacheable accesses since I think you could get write merging and > > > reordering with subsequent device accesses trying to reset the device. > > > > True. Not sure we have a good story here (maybe reinvent the DWB barrier ;)). > > We do have a good story for this part: use Device-nGnRE! Don't we actually need Device-nGnRnE for this, coupled with a DSB for endpoint completion? Device-nGnRE may be sufficient as a read from that device would ensure that the previous write is observable (potentially with a DMB if accessing separate device regions) but I don't think we do this now either. Even this, isn't it device-specific? I don't know enough about PCIe, posted writes, reordering, maybe others can shed some light. For Normal NC, if the access doesn't have side-effects (or rather the endpoint is memory-like), I think we are fine. The Stage 2 unmapping + TLBI + DSB (DVM + DVMSync) should ensure that a pending write by the CPU was pushed sufficiently far as not to affect subsequent writes by other CPUs. For I/O accesses that change some state of the device, I'm not sure the TLBI+DSB is sufficient. But I don't think Device nGnRE is either, only nE + DSB as long as the PCIe device plays along nicely. > Could we change these patches so that the memory type of the stage-1 VMA > in the VMM is reflected in the stage-2? In other words, continue to use > Device mappings at stage-2 for I/O but relax to Normal-NC if that's > how the VMM has it mapped? We've been through this and it's not feasible. The VMM does not have detailed knowledge of the BARs of the PCIe device it is mapping (and the prefetchable BAR attribute is useless). It may end up with a Normal mapping of a BAR with read side-effects. It's only the guest driver that knows all the details. The safest is for the VMM to keep it as Device (I think vfio-pci goes for the strongest nGnRnE). Yes, we end up with mismatched aliases but they only matter if the VMM also accesses the I/O range via its own mapping. So far I haven't seen case that suggests this. > > Things can go wrong but that's not because Device does anything better. > > Given the RAS implementation, external aborts caused on Device memory > > (e.g. wrong size access) is uncontainable. For Normal NC it can be > > contained (I can dig out the reasoning behind this if you want, IIUC > > something to do with not being able to cancel an already issued Device > > access since such accesses don't allow speculation due to side-effects; > > for Normal NC, it's just about the software not getting the data). > > I really think these details belong in the commit message. I guess another task for Lorenzo ;). > > > Obviously, it's up to Marc and Oliver if they want to do this, but I'm > > > wary without an official statement from Arm to say that Normal-NC is > > > correct. There's mention of such a statement in the cover letter: > > > > > > > We hope ARM will publish information helping platform designers > > > > follow these guidelines. > > > > > > but imo we shouldn't merge this without either: > > > > > > (a) _Architectural_ guidance (as opposed to some random whitepaper or > > > half-baked certification scheme). > > > > Well, you know the story, the architects will probably make it a SoC or > > integration issue, PCIe etc., not something that can live in the Arm > > ARM. The best we could get is more recommendations in the RAS spec > > around containment but not for things that might happen outside the CPU, > > e.g. PCIe root complex. > > The Arm ARM _does_ mention PCI config space when talking about early write > acknowledgement, so there's some precedence for providing guidance around > which memory types to use. Ah, yes, it looks like it does, though mostly around the config space. We could ask them to add some notes but I don't think we have the problem well defined yet. Trying to restate what we aim: the guest driver knows what attributes it needs and would set the appropriate attributes: Device or Normal. KVM's role is not to fix bugs in the guest driver by constraining the attributes but rather to avoid potential security issues with malicious (or buggy) guests: 1) triggering uncontained errors 2) accessing memory that it shouldn't (like the MTE tag access) 3) causing delayed side-effects after the host reclaims the device ... anything else? For (1), Normal NC vs. Device doesn't make any difference, slightly better for the former. (2) so far is solved by not allowing Cacheable (or disabling MTE, enabling FEAT_MTE_PERM in the future). I'm now trying to understand (3), I think it needs more digging. > > > (b) A concrete justification based on the current architecture as to > > > why Normal-NC is the right thing to do for KVM. > > > > To put it differently, we don't have any strong arguments why Device is > > the right thing to do. We chose Device based on some understanding > > software people had about how the hardware behaves, which apparently > > wasn't entirely correct (and summarised by Lorenzo). > > I think we use Device because that's what the host uses in its stage-1 > and mismatched aliases are bad. They are "constrained" bad ;). -- Catalin