> On 19 feb. 2015, at 17:55, Andrew Jones <drjones@xxxxxxxxxx> wrote: > >> On Thu, Feb 19, 2015 at 05:19:35PM +0000, Ard Biesheuvel wrote: >>> On 19 February 2015 at 16:57, Andrew Jones <drjones@xxxxxxxxxx> wrote: >>>> On Thu, Feb 19, 2015 at 10:54:43AM +0000, Ard Biesheuvel wrote: >>>> This is a 0th order approximation of how we could potentially force the guest >>>> to avoid uncached mappings, at least from the moment the MMU is on. (Before >>>> that, all of memory is implicitly classified as Device-nGnRnE) >>>> >>>> The idea (patch #2) is to trap writes to MAIR_EL1, and replace uncached mappings >>>> with cached ones. This way, there is no need to mangle any guest page tables. >>>> >>>> The downside is that, to do this correctly, we need to always trap writes to >>>> the VM sysreg group, which includes registers that the guest may write to very >>>> often. To reduce the associated performance hit, patch #1 introduces a fast path >>>> for EL2 to perform trivial sysreg writes on behalf of the guest, without the >>>> need for a full world switch to the host and back. >>>> >>>> The main purpose of these patches is to quantify the performance hit, and >>>> verify whether the MAIR_EL1 handling works correctly. >>>> >>>> Ard Biesheuvel (3): >>>> arm64: KVM: handle some sysreg writes in EL2 >>>> arm64: KVM: mangle MAIR register to prevent uncached guest mappings >>>> arm64: KVM: keep trapping of VM sysreg writes enabled >>> >>> Hi Ard, >>> >>> I took this series for test drive. Unfortunately I have bad news and worse >>> news. First, a description of the test; simply boot a guest, once at login, >>> login, and then shutdown with 'poweroff'. The guest boots through AAVMF using >>> a build from Laszlo that enables PCI, but does *not* have the 'map pci mmio >>> as cached' kludge. This test allows us to check for corrupt vram on the >>> graphical console, plus it completes a boot/shutdown cycle allowing us to >>> count sysreg traps of the boot/shutdown cycle. >> >> Thanks a lot for giving this a spin right away! >> >>> So, the bad news >>> >>> Before this series we trapped 50 times on sysreg writes with the test >>> described above. With this series we trap 62873 times. But, less than >>> 20 required going to EL1. >> >> OK, this is very useful information. We still don't know what the >> penalty is of all those traps, but that's quite a big number indeed. >> >>> (I don't have an exact number for how many times it went to EL1 because >>> access_mair() doesn't have a trace point.) >>> (I got the 62873 number by testing a 3rd kernel build that only had patch >>> 3/3 applied to the base, and counting kvm_toggle_cache events.) >>> (The number 50 is the number of kvm_toggle_cache events *without* 3/3 >>> applied.) >>> >>> I consider this bad news because, even considering it only goes to EL2, >>> it goes a ton more than it used to. I realize patch 3/3 isn't the final >>> plan for enabling traps though. >>> >>> And, now the worse news >>> >>> The vram corruption persists with this patch series. >> >> OK, so the primary difference is that I am not substituting for write >> back mappings, as Laszlo is doing in his patch. >> If you have energy left, would you mind having another go but use 0xff >> (not 0xbb) for the MAIR values in patch #2? > > Yup, a bit energy left, and, yup, 0xff fixes it ok so that means we'd need to map as writeback cacheable by default, and restrict it as necessary at stage 2. thanks > Thanks, > drew > >> >>>> >>>> arch/arm/kvm/mmu.c | 2 +- >>>> arch/arm64/include/asm/kvm_arm.h | 2 +- >>>> arch/arm64/kvm/hyp.S | 101 +++++++++++++++++++++++++++++++++++++++ >>>> arch/arm64/kvm/sys_regs.c | 63 ++++++++++++++++++++---- >>>> 4 files changed, 156 insertions(+), 12 deletions(-) >>>> >>>> -- >>>> 1.8.3.2 >>>> >>>> _______________________________________________ >>>> kvmarm mailing list >>>> kvmarm@xxxxxxxxxxxxxxxxxxxxx >>>> https://lists.cs.columbia.edu/mailman/listinfo/kvmarm -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html