From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id BD376E77188 for ; Tue, 14 Jan 2025 13:18:24 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4D16E6B007B; Tue, 14 Jan 2025 08:18:24 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 45B156B0083; Tue, 14 Jan 2025 08:18:24 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2AD446B0085; Tue, 14 Jan 2025 08:18:24 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 0D6A56B007B for ; Tue, 14 Jan 2025 08:18:24 -0500 (EST) Received: from smtpin26.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 00D91160972 for ; Tue, 14 Jan 2025 13:18:03 +0000 (UTC) X-FDA: 83006110488.26.715E36E Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf13.hostedemail.com (Postfix) with ESMTP id 7197420007 for ; Tue, 14 Jan 2025 13:18:01 +0000 (UTC) Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=E1jNcuOy; spf=pass (imf13.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1736860681; a=rsa-sha256; cv=none; b=CDFmbpRC4l97KQwJv8UHsNN3jISJ0wkYzxrarysHf3Zbx+dZWNEqw3D5cQg/6ZIAGHThUb 8oP8B5ExRBdJlAdS5Z9az7fyOSM41sixQQRYnS4J+wM9AL/gu3m0y1Eedgh08VMUFFuakU YeUGxukM9TNGcbOEfmCC7YeWKZB8bnc= ARC-Authentication-Results: i=1; imf13.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=E1jNcuOy; spf=pass (imf13.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1736860681; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=mhAMVHxdZUTN8U+Y4DDah1/AE6s6tsqyWOrMv5JE84c=; b=QIixEA/3h0K7xUv2E5iXswsIZ72DYi/rJnDmnaqX+zz6+n7qjIoeyPlTENUhJh99fSDyou Pnqy9ZxEZVrQ1+6O3mft+HGi2vLOrb0Vc9oJgA9C8Woxmn9bMVeud1A30BBOzrmuTgg1gE osydsYi3VDkka0354EN9311M5xXMOw4= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1736860680; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=mhAMVHxdZUTN8U+Y4DDah1/AE6s6tsqyWOrMv5JE84c=; b=E1jNcuOyaZIEXDT/qq5YhqqLSHV3O2b7hlJKq1WU0DTpjQ0PiTrE6J9PiVFt5Pa8rY4SuJ Hd6Eg1fXIUamEqZ18Gh/ZxBMZvkm5bDmWDxmLUF8Jo8m9/08pDuye9R6Ld7F1BHYdf9m2l 0uSrmMQEpnqZZZPP1zecow1BHX+CZSY= Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-154-7heNBUngMzyz1PMqO0FhQQ-1; Tue, 14 Jan 2025 08:17:59 -0500 X-MC-Unique: 7heNBUngMzyz1PMqO0FhQQ-1 X-Mimecast-MFC-AGG-ID: 7heNBUngMzyz1PMqO0FhQQ Received: by mail-wm1-f71.google.com with SMTP id 5b1f17b1804b1-4359206e1e4so18245665e9.2 for ; Tue, 14 Jan 2025 05:17:59 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1736860678; x=1737465478; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=mhAMVHxdZUTN8U+Y4DDah1/AE6s6tsqyWOrMv5JE84c=; b=TXflIcGl0EcGFe3f0mTl3GXfX5pPpd9TdMdi2b8qCJ1EUEaB3Bgyhp0NBHmRyY8imh cv3xaU5K67UmTrUktQuAXe3hKBQRbhdiLw62jVPP/y0ePG+boINDwwWfV7OinNj13rtM Xtgun1DrFSJwYxwXrIXxPloUkXZZuDv24l33mzT9h4KMlrnacCnzaoo34/DioiqxTH5n 8Nu5anoCNrDSkJpUdV4OcR81j5/c7BJ5sL0koL5H2yhXPU0uPpWfr7IbLpbi09Nnlsmk Gbga2sX9btzZEGcFgLO0ulR+9Mot9kS6AvKllG2c+w3Q9PYUCT957TgR+j2e+z3Wz3QX 6CfQ== X-Forwarded-Encrypted: i=1; AJvYcCXiY/PQ11HQtZykLc9r78ERLIXwIDw3Pr1dpBVMIFjXw0zHFAFnRtCUTT0EmJ5PbFugBuMuFTHD8g==@kvack.org X-Gm-Message-State: AOJu0YyCXksLkoTv5DBQVfBCwecQOtv3gn4Knv7itWxkYKe8Xx3FLP/z zWMsEPZZWhL1hHz8/A+0FukPCDqosgy7w7a0V/ha4ojsCX9coHziqem9z55bV2NE9TYl40zRTaD k+0N4hsWndQ5sqrg7GIGcwWQl8qfciBtjosYMT3cqcfWntC2R X-Gm-Gg: ASbGncuB+jki6lJ88JiP0JcM1cb+U67OMKg/WEWxC9PJ4Az9FfjMem4SRsvOkF8I1tJ d+7rXA8R7yGE+2zIXMIwSiOpAfWnS6tZ6qmelfeRkcYemWuD8v8dzWZwESg3BbAggTOmlzG4nCK xpIxDGTEIaWjuM5EXQ37NOCxo4w6IOWnv3FxPt5NNAKtsxod50Rz535iJgCO7SzmjRj9h2r3oew kalEUM4lbkZjnV82MMxzLCUyHYT+i/xAhJPWO9fqjs8l/bop0BN0I+/msipDq78izI8PafEnMDQ Yont8mGl25R5N/f4l1loMOiaVLNG03ClbaxDSyOeFgNm3npjIt9lrco/XVj39CdMI6TdOuAVnHp qk2dsCcxy X-Received: by 2002:a05:600c:6b6f:b0:436:e86e:e4ab with SMTP id 5b1f17b1804b1-436e86ee529mr227298475e9.30.1736860678228; Tue, 14 Jan 2025 05:17:58 -0800 (PST) X-Google-Smtp-Source: AGHT+IEJcuq9n+Yk207upxq1V+5PlgSayjNukFuY/KeWuSfdqDik5LQA6RM07m1vw0jUwQHHwt55ZQ== X-Received: by 2002:a05:600c:6b6f:b0:436:e86e:e4ab with SMTP id 5b1f17b1804b1-436e86ee529mr227297075e9.30.1736860677005; Tue, 14 Jan 2025 05:17:57 -0800 (PST) Received: from ?IPV6:2003:cb:c738:3100:8133:26cf:7877:94aa? (p200300cbc7383100813326cf787794aa.dip0.t-ipconnect.de. [2003:cb:c738:3100:8133:26cf:7877:94aa]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-436e9dd1957sm173922065e9.16.2025.01.14.05.17.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 14 Jan 2025 05:17:52 -0800 (PST) Message-ID: <0743193c-80a0-4ef8-9cd7-cb732f3761ab@redhat.com> Date: Tue, 14 Jan 2025 14:17:50 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags To: Jason Gunthorpe , Ankit Agrawal Cc: "maz@kernel.org" , "oliver.upton@linux.dev" , "joey.gouly@arm.com" , "suzuki.poulose@arm.com" , "yuzenghui@huawei.com" , "catalin.marinas@arm.com" , "will@kernel.org" , "ryan.roberts@arm.com" , "shahuang@redhat.com" , "lpieralisi@kernel.org" , Aniket Agashe , Neo Jia , Kirti Wankhede , "Tarun Gupta (SW-GPU)" , Vikram Sethi , Andy Currid , Alistair Popple , John Hubbard , Dan Williams , Zhi Wang , Matt Ochs , Uday Dhoke , Dheeraj Nigam , "alex.williamson@redhat.com" , "sebastianene@google.com" , "coltonlewis@google.com" , "kevin.tian@intel.com" , "yi.l.liu@intel.com" , "ardb@kernel.org" , "akpm@linux-foundation.org" , "gshan@redhat.com" , "linux-mm@kvack.org" , "kvmarm@lists.linux.dev" , "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" References: <20241118131958.4609-1-ankita@nvidia.com> <20241118131958.4609-2-ankita@nvidia.com> <20250106165159.GJ5556@nvidia.com> <20250113162749.GN5556@nvidia.com> From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: <20250113162749.GN5556@nvidia.com> X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: Sytkw1Frczhc10DaQIjUzbmXSo9c0oo4MnmIY4hIk74_1736860678 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 7197420007 X-Stat-Signature: 5fud6qk5da5qxn7fiaed39eamb6w7cso X-Rspam-User: X-Rspamd-Server: rspam09 X-HE-Tag: 1736860681-425552 X-HE-Meta: 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 GL87hBRM XTzXXbkepX0RDJVsox6qSbuGWzdUmYT9XKcB+hcxGZS/rxl2rBDKo5E24au3kPVRuyNh3u1ZIMyLsDD85eu7I/toGvPXSm/4G9MbU3ZQqGotfsustD/V0SjIPQbpsjiBeqjTM/djMW6/3TRu9HVAq3GtAdfFNSKAYuj3TAbB0DjSCTi6FjWRINZx0KHdOrltv2h3sRASRBlIQ93jOZT8MW4ussIyyjw4KtUscbbhPyrnz6epg4LSGHhKBv7psSWrUS8p3XSjtH2JHRq5H359y1llygAILPS5ONB4gkaCNLVaNeZIMr39BDVt2QWnshAq5TFcUFnzvqpedGVRRimQAYjaBxgovno6lznSEn1BAFPemVPW7R04KEH3vYukRSgaD09MF1/tIcmnWDVABc7GQoryIoFmpCXd2XIP3rKajLttlyvMu6Jy+q6lhbO7tvSXO3DtpqfgWUo0NAYtqY1GlC7ImxA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 13.01.25 17:27, Jason Gunthorpe wrote: > On Fri, Jan 10, 2025 at 09:15:53PM +0000, Ankit Agrawal wrote: >>>>>> This patch solves the problems where it is possible for the kernel to >>>>>> have VMAs pointing at cachable memory without causing >>>>>> pfn_is_map_memory() to be true, eg DAX memremap cases and CXL/pre-CXL >>>>>> devices. This memory is now properly marked as cachable in KVM. >>>>> >>>>> Does this only imply in worse performance, or does this also affect >>>>> correctness? I suspect performance is the problem, correct? >>>> >>>> Correctness. Things like atomics don't work on non-cachable mappings. >>> >>> Hah! This needs to be highlighted in the patch description. And maybe >>> this even implies Fixes: etc? >> >> Understood. I'll put that in the patch description. >> >>>>> Likely you assume to never end up with COW VM_PFNMAP -- I think it's >>>>> possible when doing a MAP_PRIVATE /dev/mem mapping on systems that allow >>>>> for mapping /dev/mem. Maybe one could just reject such cases (if KVM PFN >>>>> lookup code not already rejects them, which might just be that case IIRC). >>>> >>>> At least VFIO enforces SHARED or it won't create the VMA. >>>> >>>> drivers/vfio/pci/vfio_pci_core.c:       if ((vma->vm_flags & VM_SHARED) == 0) >>> >>> That makes a lot of sense for VFIO. >> >> So, I suppose we don't need to check this? Specially if we only extend the >> changes to the following case: I would check if it is a VM_PFNMAP, and outright refuse any page if is_cow_mapping(vma->vm_flags) is true. >> - type is VM_PFNMAP && >> - user mapping is cacheable (MT_NORMAL or MT_NORMAL_TAGGED) && >> - The suggested VM_FORCE_CACHED is set. > > Do we really want another weirdly defined VMA flag? I'd really like to > avoid this.. Agreed. Can't we do a "this is a weird VM_PFNMAP thing, let's consult the VMA prot + whatever PFN information to find out if it is weird-device and how we could safely map it?" Ideally, we'd separate this logic from the "this is a normal VMA that doesn't need any such special casing", and even stop playing PFN games on these normal VMAs completely. How is the VFIO going to know any better if it should set > the flag when the questions seem to be around things like MTE that > have nothing to do with VFIO? I assume MTE does not apply at all to VM_PFNMAP, at least arch_calc_vm_flag_bits() tells me that VM_MTE_ALLOWED should never get set there. So for VFIO and friends with VM_PFNMAP mapping, we can completely ignore that maybe? -- Cheers, David / dhildenb