On Thu, Dec 15, 2022 at 06:12:14PM +0000, Oliver Upton wrote: > On Thu, Dec 15, 2022 at 09:33:17AM +0000, Ryan Roberts wrote: > > On 15/12/2022 00:52, Oliver Upton wrote: > > > On Tue, Dec 06, 2022 at 01:59:18PM +0000, Ryan Roberts wrote: > > >> (appologies, I'm resending this series as I managed to send the cover letter to > > >> all but the following patches only to myself on first attempt). > > >> > > >> This is my first upstream feature submission so please go easy ;-) > > > > > > Welcome :) > > > > > >> Support 52-bit Output Addresses: FEAT_LPA2 changes the format of the PTEs. The > > >> HW advertises support for LPA2 independently for stage 1 and stage 2, and > > >> therefore its possible to have it for one and not the other. I've assumed that > > >> there is a valid case for this if stage 1 is not supported but stage 2 is, KVM > > >> could still then use LPA2 at stage 2 to create a 52 bit IPA space (which could > > >> then be consumed by a 64KB page guest kernel with the help of FEAT_LPA). Because > > >> of this independence and the fact that the kvm pgtable library is used for both > > >> stage 1 and stage 2 tables, this means the library now has to remember the > > >> in-use format on a per-page-table basis. To do this, I had to rework some > > >> functions to take a `struct kvm_pgtable *` parameter, and as a result, there is > > >> a noisy patch to add this parameter. > > > > > > Mismatch between the translation stages is an interesting problem... > > > > > > Given that userspace is responsible for setting up the IPA space, I > > > can't really think of a strong use case for 52 bit IPAs with a 48 bit > > > VA. Sure, the VMM could construct a sparse IPA space or remap the same > > > HVA at multiple IPAs to artificially saturate the address space, but > > > neither seems terribly compelling. > > > > > > Nonetheless, AFAICT we already allow this sort of mismatch on LPA && > > > !LVA systems. A 48 bit userspace could construct a 52 bit IPA space for > > > its guest. > > > > I guess a simpler approach would be to only use LPA2 if its supported by both > > stage1 and stage2. Then the code could just use a static key in the few required > > places. > > Ah, you caught on quick to what I was thinking :-) Just wanted to revisit this... Ryan, you say that it is possible for hardware to support LPA2 for a single stage of translation. Are you basing that statement on something in the Arm ARM or the fact that there are two different enumerations for stage-1 and stage-2? In my cursory search I wasn't able to find anything that would suggest it is possible for only a single stage to implement the feature. The one possibility I can think of is the NV case, where the L0 hypervisor for some reason does not support LPA2 in its emulated stage-2 but still advertises support for LPA2 at stage-1. I'd say that's quite a stupid L0, but I should really hold my tongue until KVM actually does NV ;-) I want to make sure there is a strong sense of what LPA2 means in terms of the architecture to inform how we use it in KVM. -- Thanks, Oliver _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm