Received: by 10.192.165.148 with SMTP id m20csp669559imm; Fri, 4 May 2018 04:38:45 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpGWYp1t9iisCBaY+jS71oLfrB8dD9oPiEwXieCV65udFhmIERuRjNnLdcfpFUNaELn0Sv0 X-Received: by 2002:a63:714d:: with SMTP id b13-v6mr14890675pgn.271.1525433925826; Fri, 04 May 2018 04:38:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525433925; cv=none; d=google.com; s=arc-20160816; b=NceBfdqC2vX0q40rKG7x5/q+iGY2w1uU3A+8BtBnNBXRmMpPohAps+Y+fR+ANoJ0kf CMJGEfAdueMxuguoF6aa6dBePI6C7/Yr5MfjHTY1O0AVcYir9jRVnnVqNGMES8bGb4iR lzf7P7vNiI/WwM/2DWbnfgX9NA1m9xsen1RiZOWSs/kCL3KqaKhrYGbiujj7oIqwS2Di PBWliVmlaa8eQxEprNyPO7yhOgfGZBW9JwbRMa2yc175WGKJAoYDAfQBNsZA81VmbfoK GTijSOWNKt7wSsiTnINPr9ffKTF4/NCDn90HWfC9BdvBJwHJW7NSsNGi5QwoJONbyHQ4 VSPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=PWVOOkA2fx03L6SEGuLulgYpV+Iri2YFxKJ/CiK4m34=; b=n9S+qk3kPm+T5/UxaV2ukUSBosku102SASDulK63WiiPkcAp0wHj/cZDiOQf7zfbLn daGhU+9NfLcwibR3E49zwzc/7sK2WDUIZy5xVF9Zg395oRUqzilNgXcFs3PuDwU3X7L/ bdmUyYh2Vw93HrDCPyQzxPeR+pSuOpAq4vdWlQMjT101zBoc7KlHWtNLmvZ8F4Z5jwjE pHofJgyWUITBSV8DkKW8EfmKJnZn4vdVAgoPhkYPOscl8aqsRBlNaG90xDYNAnwSWARr vgG7VGDYyWE1hLCtWHjpV8jMXw8AY3VtJ1qDoFO5I0GsGdn15jeAMeIKwoKpOodc54Oj Z9bw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 87si16390670pfo.137.2018.05.04.04.38.31; Fri, 04 May 2018 04:38:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751350AbeEDLiT (ORCPT + 99 others); Fri, 4 May 2018 07:38:19 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:52498 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751001AbeEDLiS (ORCPT ); Fri, 4 May 2018 07:38:18 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3B45B1529; Fri, 4 May 2018 04:38:16 -0700 (PDT) Received: from localhost (unknown [10.37.8.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8D03B3F25D; Fri, 4 May 2018 04:38:15 -0700 (PDT) Date: Fri, 4 May 2018 13:38:13 +0200 From: Christoffer Dall To: Punit Agrawal Cc: kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, marc.zyngier@arm.com, linux-kernel@vger.kernel.org, suzuki.poulose@arm.com Subject: Re: [PATCH v2 1/4] KVM: arm/arm64: Share common code in user_mem_abort() Message-ID: <20180504113813.GD10191@C02W217FHV2R.local> References: <20180501102659.13188-1-punit.agrawal@arm.com> <20180501102659.13188-2-punit.agrawal@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180501102659.13188-2-punit.agrawal@arm.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 01, 2018 at 11:26:56AM +0100, Punit Agrawal wrote: > The code for operations such as marking the pfn as dirty, and > dcache/icache maintenance during stage 2 fault handling is duplicated > between normal pages and PMD hugepages. > > Instead of creating another copy of the operations when we introduce > PUD hugepages, let's share them across the different pagesizes. > > Signed-off-by: Punit Agrawal > Reviewed-by: Christoffer Dall > Cc: Marc Zyngier > --- > virt/kvm/arm/mmu.c | 66 +++++++++++++++++++++++++++------------------- > 1 file changed, 39 insertions(+), 27 deletions(-) > > diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c > index 7f6a944db23d..686fc6a4b866 100644 > --- a/virt/kvm/arm/mmu.c > +++ b/virt/kvm/arm/mmu.c > @@ -1396,6 +1396,21 @@ static void invalidate_icache_guest_page(kvm_pfn_t pfn, unsigned long size) > __invalidate_icache_guest_page(pfn, size); > } > > +static bool stage2_should_exec(struct kvm *kvm, phys_addr_t addr, > + bool exec_fault, unsigned long fault_status) > +{ > + /* > + * If we took an execution fault we will have made the > + * icache/dcache coherent and should now let the s2 mapping be > + * executable. > + * > + * Write faults (!exec_fault && FSC_PERM) are orthogonal to > + * execute permissions, and we preserve whatever we have. > + */ > + return exec_fault || > + (fault_status == FSC_PERM && stage2_is_exec(kvm, addr)); > +} > + > static void kvm_send_hwpoison_signal(unsigned long address, > struct vm_area_struct *vma) > { > @@ -1428,7 +1443,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, > kvm_pfn_t pfn; > pgprot_t mem_type = PAGE_S2; > bool logging_active = memslot_is_logging(memslot); > - unsigned long flags = 0; > + unsigned long vma_pagesize, flags = 0; > > write_fault = kvm_is_write_fault(vcpu); > exec_fault = kvm_vcpu_trap_is_iabt(vcpu); > @@ -1448,7 +1463,8 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, > return -EFAULT; > } > > - if (vma_kernel_pagesize(vma) == PMD_SIZE && !logging_active) { > + vma_pagesize = vma_kernel_pagesize(vma); > + if (vma_pagesize == PMD_SIZE && !logging_active) { > hugetlb = true; > gfn = (fault_ipa & PMD_MASK) >> PAGE_SHIFT; > } else { > @@ -1517,28 +1533,34 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, > if (mmu_notifier_retry(kvm, mmu_seq)) > goto out_unlock; > > - if (!hugetlb && !force_pte) > + if (!hugetlb && !force_pte) { > hugetlb = transparent_hugepage_adjust(&pfn, &fault_ipa); > + /* > + * Only PMD_SIZE transparent hugepages(THP) are > + * currently supported. This code will need to be > + * updated to support other THP sizes. > + */ > + if (hugetlb) > + vma_pagesize = PMD_SIZE; nit: this is a bit of a trap waiting to happen, as the suggested semantics of hugetlb is now hugetlbfs and not THP. It may be slightly nicer to do do: if (transparent_hugepage_adjust(&pfn, &fault_ipa)) vma_pagesize = PMD_SIZE; > + } > + > + if (writable) > + kvm_set_pfn_dirty(pfn); > + > + if (fault_status != FSC_PERM) > + clean_dcache_guest_page(pfn, vma_pagesize); > + > + if (exec_fault) > + invalidate_icache_guest_page(pfn, vma_pagesize); > > if (hugetlb) { > pmd_t new_pmd = pfn_pmd(pfn, mem_type); > new_pmd = pmd_mkhuge(new_pmd); > - if (writable) { > + if (writable) > new_pmd = kvm_s2pmd_mkwrite(new_pmd); > - kvm_set_pfn_dirty(pfn); > - } > > - if (fault_status != FSC_PERM) > - clean_dcache_guest_page(pfn, PMD_SIZE); > - > - if (exec_fault) { > + if (stage2_should_exec(kvm, fault_ipa, exec_fault, fault_status)) > new_pmd = kvm_s2pmd_mkexec(new_pmd); > - invalidate_icache_guest_page(pfn, PMD_SIZE); > - } else if (fault_status == FSC_PERM) { > - /* Preserve execute if XN was already cleared */ > - if (stage2_is_exec(kvm, fault_ipa)) > - new_pmd = kvm_s2pmd_mkexec(new_pmd); > - } > > ret = stage2_set_pmd_huge(kvm, memcache, fault_ipa, &new_pmd); > } else { > @@ -1546,21 +1568,11 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, > > if (writable) { > new_pte = kvm_s2pte_mkwrite(new_pte); > - kvm_set_pfn_dirty(pfn); > mark_page_dirty(kvm, gfn); > } > > - if (fault_status != FSC_PERM) > - clean_dcache_guest_page(pfn, PAGE_SIZE); > - > - if (exec_fault) { > + if (stage2_should_exec(kvm, fault_ipa, exec_fault, fault_status)) > new_pte = kvm_s2pte_mkexec(new_pte); > - invalidate_icache_guest_page(pfn, PAGE_SIZE); > - } else if (fault_status == FSC_PERM) { > - /* Preserve execute if XN was already cleared */ > - if (stage2_is_exec(kvm, fault_ipa)) > - new_pte = kvm_s2pte_mkexec(new_pte); > - } > > ret = stage2_set_pte(kvm, memcache, fault_ipa, &new_pte, flags); > } > -- > 2.17.0 > Otherwise looks good. Thanks, -Christoffer