[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v3 03/20] xen/riscv: introduce VMID allocation and manegement
On 8/7/25 12:11 PM, Jan Beulich wrote:
+ unsigned long old; + + /* Figure-out number of VMID bits in HW */ + old = csr_read(CSR_HGATP); + + csr_write(CSR_HGATP, old | HGATP_VMID_MASK); + vmid_bits = csr_read(CSR_HGATP); + vmid_bits = MASK_EXTR(vmid_bits, HGATP_VMID_MASK);Nit: Stray blank.+ vmid_bits = flsl(vmid_bits); + csr_write(CSR_HGATP, old); + + /* + * We polluted local TLB so flush all guest TLB as + * a speculative access can happen at any time. + */ + local_hfence_gvma_all();There's no guest running. If you wrote hgat.MODE as zero, as per my understanding now new TLB entries could even purely theoretically appear.It could be an issue (or, at least, it is recommended) when hgatp.MODE is changed: If hgatp.MODE is changed for a given VMID, an HFENCE.GVMA with rs1=x0 (and rs2 set to either x0 or the VMID) must be executed to order subsequent guest translations with the MODE change—even if the old MODE or new MODE is Bare. On other hand it is guaranteed that, at least, on Reset (and so I assume for power on) that: If the hypervisor extension is implemented, the hgatp.MODE and vsatp.MODE fields are reset to 0. So it seems like if no guest is ran then there is no need even to write hgatp.MODE as zero, but it might be sense to do that explicitly just to be sure. I thought it was possible to have a running guest and perform a CPU hotplug.But that guest will run on another hart.In that case, I expect that during the hotplug,|vmidlen_detect()| will be called and return the|vmid_bits| value, which is used as the active VMID. At that moment, the local TLB could be speculatively polluted, I think. Likely, it makes sense to call vmidlen_detect() only once for each hart during initial bringup.That may bring you more problems than it solves. You'd need to stash away the value originally read somewhere. And that somewhere isn't per-CPU data.In fact, with no guest running (yet) I'm having a hard time seeing why you shouldn't be able to simply write the register with just HGATP_VMID_MASK, i.e. without OR-ing in "old". It's even questionable whether "old" needs restoring; writing plain zero afterwards ought to suffice. You're in charcge of the register, after all.It make sense (but I don't know if it is a possible case) to be sure that HGATP.MODE remains the same, so there is no need to have TLB flush. If HGATP.MODE is changed then it will be needed to do TLB flush as I mentioned above. If we agreed to keep local_hfence_gvma_all() then I think it isn't really any sense to restore 'old' or OR-ing it with HGATP_VMID_MASK. Generally if 'old' is guaranteed to be zero (and, probably, it makes sense to check that in vmidlen_detect() and panic if it isn't zero) and if vmidlen_detect() function will be called before any guest domain(s) will be ran then I could agree that we don't need local_hfence_gvma_all() here. As an option we can do local_hfence_gvma_all() only if 'old' value wasn't set to zero. Does it make sense?Well - I'd like the pre-conditions to be understood better. For example, can a hart really speculate into guest mode, when the hart is only in the process of being brought up?I couldn't explicit words that a hart can't speculate into guest mode either on bring up or during its work. But there are some moments in the spec which tells: Implementations with virtual memory are permitted to perform address translations speculatively and earlier than required by an explicit memory access, and are permitted to cache them in address translation cache structures—including possibly caching the identity mappings from effective address to physical address used in Bare translation modes and M-mode. And here: Implementations may also execute the address-translation algorithm speculatively at any time, for any virtual address, as long as satp is active (as defined in Section 10.1.11). Such speculative executions have the effect of pre-populating the address-translation cache.That's satp though, not hgatp.Where it is explicitly mentioned that speculation can happen in *any time*. And at the same time: Speculative executions of the address-translation algorithm behave as non-speculative executions of the algorithm do, except that they must not set the dirty bit for a PTE, they must not trigger an exception, and they must not create address-translation cache entries if those entries would have been invalidated by any SFENCE.VMA instruction executed by the hart since the speculative execution of the algorithm began. What I read as if TLB was empty before it will stay empty. Also, despite of the fact here it is mentioned that when V=0 two-stage address translation is inactivated: The current virtualization mode, denoted V, indicates whether the hart is currently executing in a guest. When V=1, the hart is either in virtual S-mode (VS-mode), or in virtual U-mode (VU-mode) atop a guest OS running in VS-mode. When V=0, the hart is either in M-mode, in HS-mode, or in U-mode atop an OS running in HS-mode. The virtualization mode also indicates whether two-stage address translation is active (V=1) or inactive (V=0). But on the same side, writing to hgatp register activates it: The hgatp register is considered active for the purposes of the address-translation algorithm unless the effective privilege mode is U and hstatus.HU=0. And if so + considering that speculation could happen at any time, and we are in HS-mode, not it U mode then I would say that it could really speculate into guest mode.Hmm, that leaves some things to be desired. What I'm particularly puzzled by is that there's nothing said either way towards speculation through SRET. That's the important aspect here aiui, because without that the hart can't speculate into guest mode. But yes, in the absence of any clear indication to the contrary, I think you want to keep the local_hfence_gvma_all() (with a suitable comment). Interesting that for VS-stage translation is explicitly mention that it is possible to stop speculation: No mechanism is provided to atomically change vsatp and hgatp together. Hence, to prevent speculative execution causing one guest’s VS-stage translations to be cached under another guest’s VMID, world-switch code should zero vsatp, then swap hgatp, then finally write the new vsatp value. Similarly, if henvcfg.PBMTE need be world-switched, it should be switched after zeroing vsatp but before writing the new vsatp value, obviating the need to execute an HFENCE.VVMA instruction. So if VSATP is 0 then there is no speculation as there is no need to execute HFENCE.VVMA. + data->max_vmid = BIT(vmid_len, U) - 1; + data->disabled = !opt_vmid_enabled || (vmid_len <= 1);Actually, what exactly does it mean that "VMIDs are disabled"? There's no enable bit that I could find anywhere. Isn't it rather that in this case you need to arrange to flush always on VM entry (or always after a P2M change, depending how the TLB is split between guest and host use)?"VMIDs are disabled" here means that TLB flush will happen each time p2m is changed.That's better described as "VMIDs aren't used" then?It sounds a little bit just like an opposite to "disabled" (i.e. means basically the same), but I am okay to use "used" instead.If you want to stick to using "disabled", then how about "VMID use is disabled"? (You probably meanwhile understood that what I'm after is it becoming clear that this is a software decision, not something you can enforce in hardware.) "VMID use is disabled" really sounds more clear. Thanks. ~ Oleksii
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |