[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZQIFfqgR5zcidRR3@nvidia.com>
Date: Wed, 13 Sep 2023 15:54:54 -0300
From: Jason Gunthorpe <jgg@...dia.com>
To: Lorenzo Pieralisi <lpieralisi@...nel.org>
Cc: ankita@...dia.com, maz@...nel.org, oliver.upton@...ux.dev,
catalin.marinas@....com, will@...nel.org, aniketa@...dia.com,
cjia@...dia.com, kwankhede@...dia.com, targupta@...dia.com,
vsethi@...dia.com, acurrid@...dia.com, apopple@...dia.com,
jhubbard@...dia.com, danw@...dia.com,
linux-arm-kernel@...ts.infradead.org, kvmarm@...ts.linux.dev,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH v1 2/2] KVM: arm64: allow the VM to select DEVICE_* and
NORMAL_NC for IO memory
On Wed, Sep 13, 2023 at 05:26:01PM +0200, Lorenzo Pieralisi wrote:
> > > I understand that's the use case you are after but this change is
> > > targeting all VMs, it must be clear.
> > >
> > > Then WC and mapping to PCI TLPs, either you describe that in details
> > > (NormalNC vs device-nGnRE and resulting SystemBus<->PCI transactions) or
> > > you don't describe it at all, as it stands I don't know how to use
> > > this information.
> >
> > How about another pargraph:
> >
> > KVM prevents all VMs (including Linux) from accessing NORMAL_NC
> > mappings, which is how Linux implements pgprot_writecombine(). This
> > prevents using this performance optimization within VMs.
> >
> > I don't think we need to go into details how it works beyond that it
> > requires NORMAL_NC.
>
> I think it is worth summarizing the discussion that led to this change,
> I can write something up.
We tried here, in short the reason we all understood it was like this
today is because there was a belief that DEVICE_nGnRE allowed
fewer/none uncontained failures than NORMAL_NC.
AFIACT it turns out the specs are unclear and actual real world IP
from ARM does not behave this way. We learned that at best they are
equally unsafe, even perhaps NORMAL_NC is bit safer.
What makes it safe in real chips is not the unclear specification, or
the behavior of the ARM IP to generate uncontained failures, but
because the combination of all IP in the platform never triggers an
uncontained error anyhow.
For instance PCIe integration IP does not transform PCIe TLP failures
into uncontained errors. They generate all ones data on the bus
instead.
There is no spec that says this should happen, it is just what people
do - c&p from Intel.
On top of that we see that server focused designs built to run VMs
have put in the RAS work to ensure uncontained errors can't exist and
truely plug this hole.
Thus, at the end of the day the safety of KVM and VFIO is effectively
an unknowable platform specific property no matter what choice we make
in SW here. Thus let's make the choice that enables the broadest VM
functionality.
> > > > Fortunately real platforms do tend to implement this.
>
> Is it possible please to describe what "this" is in details ?
"prevent uncontained errors for DEVICE_* and NORMAL_NC access"
> What does "real platforms" mean ?
Actual real world deployments of VFIO and KVM in production that
expect to be safe from uncontained errors.
> Let's describe what HW/SW should be implemented to make this
> safe.
The platform must not generate uncontained errors :)
> I can write up the commit log and post it if I manage to summarize
> it any better - more important the review on the code (that was already
> provided), I will try to write something up asap.
Thank you!
Jason
Powered by blists - more mailing lists