Received: by 10.192.165.148 with SMTP id m20csp4765696imm; Tue, 1 May 2018 03:29:30 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpxBeWI5sI6ZJfkN0dY+xVq/Slyr2SD5d9Z99h4up3moEHilYuzV6omFRX+vYbH5BotoeVA X-Received: by 10.98.17.220 with SMTP id 89mr15200412pfr.18.1525170570424; Tue, 01 May 2018 03:29:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525170570; cv=none; d=google.com; s=arc-20160816; b=eKyFiOTBek8nx/UGMIdDXxa6J6tgLOu9EE/DRVhq2jTfnFxjYnYPxvWzz862NEXvxK U2SvXEJurrrEGztDSaLre82JRr7ISj/I1y7wSVO3hkAi0w7Eu4RhvomupBC6CQ0GJCTO oI68+0pPDHe2uUgJsqp0XNTWXmNXHhk0zKYNV3uZ0SWUz1a6VjjUD876F4OZI4f+qLO9 GM8xpPH3ADHqr7PO+QdwKFznfrt/JQ7O0SEMKqrr9nOOvfG989bboC5TtvkvwtLVqFY4 U5tjTuurIltuCIianZsmhLjFF2GJlUxctAfvltlIQElFpmZgSK8yJbP8v5PmmIQnICdA mb/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=r/DCBc9urC7xuftpiSv4+YoxRdDFaufr1saXxCGNsF4=; b=du39vuHT18KXSogzxCS9GYguq8ubVDC3QdiaGeRSdaGAGsVWuFD07y6iKw0J+8rVgp CjyRAoiviBF3sJzLzQOEydOmQdCFcwuuPl4D3DeElZ1lff9wl5YpIGme4k3YCe2DVdZ0 DMlQomeiqwpCKG2G0yOe57DeRonZoTIxoMeh85K4fWjnPbc8KTUPK7Qk4nZ/xkEPf1Wr RUTvCYNrm8yUI4bMwXHTNahfpQRzHH0nk/XseynYoYwEhnJS7bSEWttZkECmE3azjzLu QXh897Q+XUyUVQgEzXeARKFkzGCHzXXPiUw+NmpXA1o2SzJd4Rg62Vc5rnwfxCWqKdhs CbLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f13-v6si7471804pgp.666.2018.05.01.03.29.16; Tue, 01 May 2018 03:29:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754819AbeEAK1t (ORCPT + 99 others); Tue, 1 May 2018 06:27:49 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:45226 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751658AbeEAK1s (ORCPT ); Tue, 1 May 2018 06:27:48 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 260E915BF; Tue, 1 May 2018 03:27:48 -0700 (PDT) Received: from localhost (e105922-lin.cambridge.arm.com [10.1.207.29]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9ADA93F5A0; Tue, 1 May 2018 03:27:47 -0700 (PDT) From: Punit Agrawal To: kvmarm@lists.cs.columbia.edu Cc: Punit Agrawal , linux-arm-kernel@lists.infradead.org, marc.zyngier@arm.com, christoffer.dall@arm.com, linux-kernel@vger.kernel.org, suzuki.poulose@arm.com, Russell King , Catalin Marinas , Will Deacon Subject: [PATCH v2 3/4] KVM: arm64: Support dirty page tracking for PUD hugepages Date: Tue, 1 May 2018 11:26:58 +0100 Message-Id: <20180501102659.13188-4-punit.agrawal@arm.com> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180501102659.13188-1-punit.agrawal@arm.com> References: <20180501102659.13188-1-punit.agrawal@arm.com> X-ARM-No-Footer: FoSSMail Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for creating PUD hugepages at stage 2, add support for write protecting PUD hugepages when they are encountered. Write protecting guest tables is used to track dirty pages when migrating VMs. Also, provide trivial implementations of required kvm_s2pud_* helpers to allow sharing of code with arm32. Signed-off-by: Punit Agrawal Reviewed-by: Christoffer Dall Cc: Marc Zyngier Cc: Russell King Cc: Catalin Marinas Cc: Will Deacon --- arch/arm/include/asm/kvm_mmu.h | 16 ++++++++++++++++ arch/arm64/include/asm/kvm_mmu.h | 10 ++++++++++ virt/kvm/arm/mmu.c | 9 ++++++--- 3 files changed, 32 insertions(+), 3 deletions(-) diff --git a/arch/arm/include/asm/kvm_mmu.h b/arch/arm/include/asm/kvm_mmu.h index 5907a81ad5c1..224c22c0a69c 100644 --- a/arch/arm/include/asm/kvm_mmu.h +++ b/arch/arm/include/asm/kvm_mmu.h @@ -80,6 +80,22 @@ void kvm_clear_hyp_idmap(void); #define kvm_pmd_mkhuge(pmd) pmd_mkhuge(pmd) +/* + * The following kvm_*pud*() functionas are provided strictly to allow + * sharing code with arm64. They should never be called in practice. + */ +static inline void kvm_set_s2pud_readonly(pud_t *pud) +{ + BUG(); +} + +static inline bool kvm_s2pud_readonly(pud_t *pud) +{ + BUG(); + return false; +} + + static inline void kvm_set_pmd(pmd_t *pmd, pmd_t new_pmd) { *pmd = new_pmd; diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h index d962508ce4b3..f440cf216a23 100644 --- a/arch/arm64/include/asm/kvm_mmu.h +++ b/arch/arm64/include/asm/kvm_mmu.h @@ -240,6 +240,16 @@ static inline bool kvm_s2pmd_exec(pmd_t *pmdp) return !(READ_ONCE(pmd_val(*pmdp)) & PMD_S2_XN); } +static inline void kvm_set_s2pud_readonly(pud_t *pudp) +{ + kvm_set_s2pte_readonly((pte_t *)pudp); +} + +static inline bool kvm_s2pud_readonly(pud_t *pudp) +{ + return kvm_s2pte_readonly((pte_t *)pudp); +} + static inline bool kvm_page_empty(void *ptr) { struct page *ptr_page = virt_to_page(ptr); diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c index 74750236f445..3afbf693e045 100644 --- a/virt/kvm/arm/mmu.c +++ b/virt/kvm/arm/mmu.c @@ -1286,9 +1286,12 @@ static void stage2_wp_puds(pgd_t *pgd, phys_addr_t addr, phys_addr_t end) do { next = stage2_pud_addr_end(addr, end); if (!stage2_pud_none(*pud)) { - /* TODO:PUD not supported, revisit later if supported */ - BUG_ON(stage2_pud_huge(*pud)); - stage2_wp_pmds(pud, addr, next); + if (stage2_pud_huge(*pud)) { + if (!kvm_s2pud_readonly(pud)) + kvm_set_s2pud_readonly(pud); + } else { + stage2_wp_pmds(pud, addr, next); + } } } while (pud++, addr = next, addr != end); } -- 2.17.0