From patchwork Thu Nov 16 14:29:19 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ryan Roberts X-Patchwork-Id: 13457963 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 81626C197A0 for ; Thu, 16 Nov 2023 14:30:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=LpSn9pqdjx53/WKaT+yl23gCmnktZvFNVfO2vHO8nbA=; b=juce/1KS0II3kW nSS4iktESjNUCCq5Z30NVrTHI0eaVzgc/1EVuQJElmHupTMaIZb5PjKGisiUARPH9t3B1MzmnJ6tr 4pVnd2Rb8yLOfFIbsDNO8zIsZltKOuZZmRWovhsc8xQJf6mveV+iZqOXX8K0cn/aTLZcfF+65zKij iN+Hmgn6+JqCMe5+uaX1Rv+44go7iziIgDbNtNOMwFWfmGunJoUf4f99wet0xH9bUlbblOtSHRo/A uDfuQuSqGRzH6oGEYof6gdzSDTCumwvOrdDZGEtdOtBo7/pDca5oXfmhsEAnrslXKioCW3LOWKAnn H+P42z0HbcB4kW7mn/mg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1r3dNY-003hBi-25; Thu, 16 Nov 2023 14:30:00 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1r3dNO-003h7E-1X for linux-arm-kernel@lists.infradead.org; Thu, 16 Nov 2023 14:29:53 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8AB011595; Thu, 16 Nov 2023 06:30:30 -0800 (PST) Received: from e125769.cambridge.arm.com (e125769.cambridge.arm.com [10.1.196.26]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E1C623F73F; Thu, 16 Nov 2023 06:29:42 -0800 (PST) From: Ryan Roberts To: Catalin Marinas , Will Deacon , Marc Zyngier , Oliver Upton , Suzuki K Poulose , James Morse , Zenghui Yu , Ard Biesheuvel , Anshuman Khandual Cc: Ryan Roberts , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev Subject: [PATCH v5 00/12] KVM: arm64: Support FEAT_LPA2 at hyp s1 and vm s2 Date: Thu, 16 Nov 2023 14:29:19 +0000 Message-Id: <20231116142931.1675485-1-ryan.roberts@arm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20231116_062950_609719_27A10D0C X-CRM114-Status: GOOD ( 24.96 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi All, This adds support for FEAT_LPA2 to KVM for both hypervisor stage 1 (for the nvhe/protected modes) and the vm stage 2 translation tables (for all modes). FEAT_LPA2 enables 52 bit PAs and VAs for 4KB and 16KB granules (note this is already supported for 64KB granules via the FEAT_LPA and FEAT_LVA extensions). The series does not include support for FEAT_LPA2 in the kernel stage 1. This support is provided separately by Ard Biesheuvel's series at [5]. The two series are independent. This latest revision incorporates Marc's feedback and rebases the series onto v6.7-rc1. NOTE: The first 3 patches rework the tlbi routines to work for LPA2. These patches are required by both my series and Ard's series; Ard is prefixing his series with these same patches. Marc previously suggested he would be willing to merge this for v6.8-rc1 if things continue to look ok. If that's still a possibility, I'd be happy to get this off my desk! :) Testing ======= Testing has been done exclusively on the FVP and covers my boot matrix tests and kvm selftests. I've expanded the boot matrix tests to include coverage of hvhe mode. This brings the number of configs to 300, 20 of which fail due to Ard's series not being present (which is expected). KVM selftests have been enhanced to support P52V48 4K and 16K guest modes, and all tests have been run against a P48V48_4K host and a P52V52_4K host (a run takes about 10 hours on FVP, sigh, but I can test a few more host configs if useful). All tests pass except "memslot_perf_test", which fails due to a timeout while syncing. This test fails in the same way for plain v6.6-rc1, so I'm confident this is not a regression caused by this series. (the issue is that alarm(2) is issued and the signal is received before alarm(0) is issued. I expect this is an FVP-time related problem, although I'm not sure how to fix robustly for the FVP without potentially hanging real systems for long periods of time). Additionally, when running page_fault_test, when run on FVP against v6.7-rc1 and newer, I'm seeing RCU stalls. I'm confident that this is not an issue introduced by this series because it reproduces without my patches. Changes since v4 [4] ==================== Various tidy-ups based on Marc's feedback: - rebased onto v6.7-rc1. - Changed cpus_have_const_cap() to cpus_have_final_cap(). - Reworked the tlbi patches to change the scale direction as first patch, then introduce LPA2 support in separate patch. - Added clarifying comments to tlbi routines. - Removed inline and simplified ifdefery for HAP_LPA2 capability. - Reverted kvm_get_mode() != KVM_MODE_NONE for HAS_LPA2 capability since the key is only used by KVM anyway - kernel can't use this because its too late in boot process. - Fixed some nits. Changes since v3 [3] ==================== - rebased onto v6.6-rc5. - has_lpa2() only requires consistency between s1 and s2 when kvm_get_mode() != KVM_MODE_NONE. - squashed 2 patches that enabled hyp s1 and vm s2 to use LPA2 pgtable format respectively, into 1 patch. There were shared accessors so the intermediate state was invalid. - use FIELD_PREP() to insert PS into TCR_EL2 instead of raw shift. Changes since v2 [2] ==================== - rebased onto v6.6-rc1 - removed small amount of dead code eroneously introduced by previous rebase - reworked range-based tlbi to work with LPA2 (KVM has started using range-based tlbi as of v6.6-rc1) Changes since v1 [1] ==================== - Create CPU feature for LPA2 (enabled if both S1 and S2 report LPA2 support). - Use the CPU feature (and therefore code patching) to globally decide whether or not to use LPA2 PTE format; no more per-pgtable flag to pass around. - Removed the range-based TLBI changes, which are not required by KVM; leaves only minor changes to the non-range-based invalidation code. - Removed patch to encode/decode VTCR_EL2.SL2, and replaced with a comment describing why we never need to touch SL2 (stage 2 always uses concatenated first level lookup). - Added support for LPA2 guests in KVM selftests (VM_MODE_P52V48_4K enabled and new VM_MODE_P52V48_16K added). - Rebased onto 6.3-rc1. [1] https://lore.kernel.org/kvmarm/20221206135930.3277585-1-ryan.roberts@arm.com/ [2] https://lore.kernel.org/kvmarm/20230306195438.1557851-1-ryan.roberts@arm.com/ [3] https://lore.kernel.org/kvmarm/20230918065740.3670662-1-ryan.roberts@arm.com/ [4] https://lore.kernel.org/kvmarm/20231009185008.3803879-1-ryan.roberts@arm.com/ [5] https://lore.kernel.org/linux-arm-kernel/20230912141549.278777-63-ardb@google.com/ Thanks, Ryan Anshuman Khandual (1): arm64/mm: Add FEAT_LPA2 specific ID_AA64MMFR0.TGRAN[2] Ryan Roberts (11): arm64/mm: Modify range-based tlbi to decrement scale arm64/mm: Add lpa2_is_enabled() kvm_lpa2_is_enabled() stubs arm64/mm: Update tlb invalidation routines for FEAT_LPA2 arm64: Add ARM64_HAS_LPA2 CPU capability KVM: arm64: Add new (V)TCR_EL2 field definitions for FEAT_LPA2 KVM: arm64: Use LPA2 page-tables for stage2 and hyp stage1 KVM: arm64: Convert translation level parameter to s8 KVM: arm64: Support up to 5 levels of translation in kvm_pgtable KVM: arm64: Allow guests with >48-bit IPA size on FEAT_LPA2 systems KVM: selftests: arm64: Determine max ipa size per-page size KVM: selftests: arm64: Support P52V48 4K and 16K guest_modes arch/arm64/include/asm/cpufeature.h | 5 + arch/arm64/include/asm/kvm_arm.h | 2 + arch/arm64/include/asm/kvm_emulate.h | 12 ++- arch/arm64/include/asm/kvm_mmu.h | 3 + arch/arm64/include/asm/kvm_pgtable.h | 78 +++++++++----- arch/arm64/include/asm/kvm_pkvm.h | 5 +- arch/arm64/include/asm/pgtable-prot.h | 2 + arch/arm64/include/asm/sysreg.h | 5 + arch/arm64/include/asm/tlb.h | 15 ++- arch/arm64/include/asm/tlbflush.h | 100 +++++++++++------- arch/arm64/kernel/cpufeature.c | 39 +++++++ arch/arm64/kvm/arm.c | 5 + arch/arm64/kvm/hyp/nvhe/hyp-init.S | 4 - arch/arm64/kvm/hyp/nvhe/mem_protect.c | 6 +- arch/arm64/kvm/hyp/nvhe/mm.c | 4 +- arch/arm64/kvm/hyp/nvhe/setup.c | 2 +- arch/arm64/kvm/hyp/pgtable.c | 90 ++++++++++------ arch/arm64/kvm/mmu.c | 16 +-- arch/arm64/kvm/reset.c | 9 +- arch/arm64/tools/cpucaps | 1 + .../selftests/kvm/include/aarch64/processor.h | 4 +- .../selftests/kvm/include/kvm_util_base.h | 1 + .../selftests/kvm/lib/aarch64/processor.c | 66 +++++++++--- tools/testing/selftests/kvm/lib/guest_modes.c | 42 ++++---- tools/testing/selftests/kvm/lib/kvm_util.c | 3 + 25 files changed, 354 insertions(+), 165 deletions(-) Reviewed-by: Oliver Upton --- 2.25.1