Received: by 10.223.176.5 with SMTP id f5csp756730wra; Tue, 6 Feb 2018 06:56:04 -0800 (PST) X-Google-Smtp-Source: AH8x225V5lP4Sm9I5LdBmgnV9mI8ePUMcidtWT1nXjFGrkbp9iITo6EEhFynw07iNaaV3oCxhu30 X-Received: by 10.98.201.69 with SMTP id k66mr2708550pfg.105.1517928964773; Tue, 06 Feb 2018 06:56:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517928964; cv=none; d=google.com; s=arc-20160816; b=0U/035iEOZpVR6GcWQt0EJa6eWF9LbLbEme6qrOA5xn7hfUqMFyrqVm0MNSdU0HboF qi60J+BYlqCV1sbR0xv2oYfR6mVPPRa4gsZzmivsozMTp66SFG+ccYR4G59XeVL8FcKJ xUyUyURr269fJrtvWb1ZNaeO9JGT42iLT7Yo+8CUIo4/2I63f0uE4qJvVnRdf2YAc24p +taG5u+NI/Gvp6hQcWp90cHtPApYoHO1kePdHssxfLogunHn1kxTdvQuAhaoU4jr9SNS uK3V+Nmm8V8fmImlOh/2IXWxXxwp2hVB5vD0rRZ0IId7NRHKEsm1FsITjlOm9GMV6MUm oSQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=UKSFE9ID/XgXUZITrUWgujRvEiKRoNJRU4M6mEjatoc=; b=Bs8iGTysCIdodg776haoOa4q0zAcvvP7UT3LrEkVU6Ht1H8l4lX+vpwJyKeD6pWOM3 ZxstfZdsZmbUGcq1hj6cxUAwTOIICI5x0GmWMnvf2sreI+PxklHVR3hgli+Oa/zaP7tp FY2allABJFQJwL3b4jvopQgfzjOKHXuCwApqzDP9kB/nDDoBBcmYP7j9kF8UO7W4yCbr 4nZXhwCsvMHKEvgx8/hWX5zBHKrH10P5x5GnEbQ48eJE6Dt4lixshdtj86kwdlssJf0g /IyEUJnCDo/kAjZs3gkeC2UNfLyeaWHRPSdZ/i9mKga1QKxIeYpEScUYfr8uauYjbNhA vHNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=FUa42Csv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n78si1079537pfj.337.2018.02.06.06.55.50; Tue, 06 Feb 2018 06:56:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=FUa42Csv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752575AbeBFOzX (ORCPT + 99 others); Tue, 6 Feb 2018 09:55:23 -0500 Received: from mail-wm0-f67.google.com ([74.125.82.67]:52642 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751424AbeBFOzL (ORCPT ); Tue, 6 Feb 2018 09:55:11 -0500 Received: by mail-wm0-f67.google.com with SMTP id g1so4278970wmg.2 for ; Tue, 06 Feb 2018 06:55:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=UKSFE9ID/XgXUZITrUWgujRvEiKRoNJRU4M6mEjatoc=; b=FUa42Csv2qgs3DM0GJqhcMYUQDIgXThBT9esFQwDJQ0fSFtWPowMp8UMDn2GGUONWr oKoI3M1uopCzMfyWfi2fWFQ77aKGPW4hhEMznpyXR2d2B9IHbhNbifPZxPOWUoSKLoHD cgj6vqDzWl/WTgnTkdzcwQDaoaxC7wK1DAVYI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=UKSFE9ID/XgXUZITrUWgujRvEiKRoNJRU4M6mEjatoc=; b=LmkHZl1HFtx7tqZiUGrt0vz5usguaT4sfayPBUuA7k/b/fzBl646UUtUnLT4tSGGw3 UISJpqVTI3HnVFNdKooke+fFT4VASysZOx89KxwooTY+/u9rH+Zv0hWUJQ5D7BnOfAzR +Nh3JNwEZtW6JwWrQhh4605kxn9cpJV0RoGRaF9pFC6IjwJ7CLuA0TiLiy6iDSj/bs5U P/j9Ea+odiyglq3/B2+B4pnmaIT6j7OXuYPlmvW6jFrdDWOEj1SsCE3xBjgCL41RmKsa uwpWIXzgM0TyKPFG6XRhQih+ZxlqH3h8diHaZfXbGdhYubLEGQgxeGGvA+zANG+bJBND ajzQ== X-Gm-Message-State: APf1xPDFf48WtWZxKFku4H36zvjsBI8bBiTcVeTwRaB87HsX0o4df2sT wVGvAz3k6XIk/LJDHaY6FZhZQg== X-Received: by 10.80.144.132 with SMTP id c4mr4110080eda.13.1517928910265; Tue, 06 Feb 2018 06:55:10 -0800 (PST) Received: from localhost (x50d2404e.cust.hiper.dk. [80.210.64.78]) by smtp.gmail.com with ESMTPSA id w17sm8910817eda.96.2018.02.06.06.55.09 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 06 Feb 2018 06:55:09 -0800 (PST) Date: Tue, 6 Feb 2018 15:55:08 +0100 From: Christoffer Dall To: Punit Agrawal Cc: kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suzuki.poulose@arm.com, Marc Zyngier Subject: Re: [RFC 2/4] KVM: arm64: Support dirty page tracking for PUD hugepages Message-ID: <20180206145508.GC23160@cbox> References: <20180110190729.18383-1-punit.agrawal@arm.com> <20180110190729.18383-3-punit.agrawal@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180110190729.18383-3-punit.agrawal@arm.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 10, 2018 at 07:07:27PM +0000, Punit Agrawal wrote: > In preparation for creating PUD hugepages at stage 2, add support for > write protecting PUD hugepages when they are encountered. Write > protecting guest tables is used to track dirty pages when migrating VMs. > > Also, provide trivial implementations of required kvm_s2pud_* helpers to > allow code to compile on arm32. > > Signed-off-by: Punit Agrawal > Cc: Christoffer Dall > Cc: Marc Zyngier > --- > arch/arm/include/asm/kvm_mmu.h | 9 +++++++++ > arch/arm64/include/asm/kvm_mmu.h | 10 ++++++++++ > virt/kvm/arm/mmu.c | 9 ++++++--- > 3 files changed, 25 insertions(+), 3 deletions(-) > > diff --git a/arch/arm/include/asm/kvm_mmu.h b/arch/arm/include/asm/kvm_mmu.h > index fa6f2174276b..3fbe919b9181 100644 > --- a/arch/arm/include/asm/kvm_mmu.h > +++ b/arch/arm/include/asm/kvm_mmu.h > @@ -103,6 +103,15 @@ static inline bool kvm_s2pmd_readonly(pmd_t *pmd) > return (pmd_val(*pmd) & L_PMD_S2_RDWR) == L_PMD_S2_RDONLY; > } > > +static inline void kvm_set_s2pud_readonly(pud_t *pud) > +{ > +} > + > +static inline bool kvm_s2pud_readonly(pud_t *pud) > +{ > + return true; why true? Shouldn't this return the pgd's readonly value, strictly speaking, or if we rely on this never being called, have VM_BUG_ON() ? In any case, a comment explaining why we unconditionally return true would be nice. > +} > + > static inline bool kvm_page_empty(void *ptr) > { > struct page *ptr_page = virt_to_page(ptr); > diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h > index 672c8684d5c2..dbfd18e08cfb 100644 > --- a/arch/arm64/include/asm/kvm_mmu.h > +++ b/arch/arm64/include/asm/kvm_mmu.h > @@ -201,6 +201,16 @@ static inline bool kvm_s2pmd_readonly(pmd_t *pmd) > return kvm_s2pte_readonly((pte_t *)pmd); > } > > +static inline void kvm_set_s2pud_readonly(pud_t *pud) > +{ > + kvm_set_s2pte_readonly((pte_t *)pud); > +} > + > +static inline bool kvm_s2pud_readonly(pud_t *pud) > +{ > + return kvm_s2pte_readonly((pte_t *)pud); > +} > + > static inline bool kvm_page_empty(void *ptr) > { > struct page *ptr_page = virt_to_page(ptr); > diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c > index 9dea96380339..02eefda5d71e 100644 > --- a/virt/kvm/arm/mmu.c > +++ b/virt/kvm/arm/mmu.c > @@ -1155,9 +1155,12 @@ static void stage2_wp_puds(pgd_t *pgd, phys_addr_t addr, phys_addr_t end) > do { > next = stage2_pud_addr_end(addr, end); > if (!stage2_pud_none(*pud)) { > - /* TODO:PUD not supported, revisit later if supported */ > - BUG_ON(stage2_pud_huge(*pud)); > - stage2_wp_pmds(pud, addr, next); > + if (stage2_pud_huge(*pud)) { > + if (!kvm_s2pud_readonly(pud)) > + kvm_set_s2pud_readonly(pud); > + } else { > + stage2_wp_pmds(pud, addr, next); > + } > } > } while (pud++, addr = next, addr != end); > } > -- > 2.15.1 > Otherwise: Reviewed-by: Christoffer Dall