Received: by 2002:ac0:a591:0:0:0:0:0 with SMTP id m17-v6csp851804imm; Thu, 5 Jul 2018 10:00:31 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfgg2rsjMjh/tZqvgloJr/NSTLbJdspHFp5fIdqUZ4X5vyIDURrCWr16AEZbPbzTH0K/dQT X-Received: by 2002:a62:4dc5:: with SMTP id a188-v6mr7268654pfb.217.1530810031025; Thu, 05 Jul 2018 10:00:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530810031; cv=none; d=google.com; s=arc-20160816; b=iro9jKAnITP8p0HRSG/keW1QXKE7yK8v7Kf+P2onbOJMBnxycZhA7BYLi3Uw471k7H sYAR8UrVCL0cJ58f1iX3sthdqhCn8HKwiWXSvbcoo6Jn1mMy5kJhmzScy2PnQo1eHqRv YsuSyEnxz9nxcWx4Ruk1Qc2jPDcmlCqiYILyQVPfINd3QiTzIcZQkrq4uWGqrDKV0got RqN78T4Gl3JTRKdgjHXzqXK7Dn9DLUgXty84ozo6nJzmfmmSj04y4oR7tAaLtUhvlAjz tr8wWLnG6a2TV7LzhpUM0ep4ts6Kc9cBQh0Pfajb715zzkfoLggjVwaZqFfRGbktef9Y CJpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from :arc-authentication-results; bh=C8j5JEPKZ2MuxNB2cv3eT5IoZLNa0DRXbFdbGhPatG0=; b=F/Dj0UPFjotCHM45w3U4IuIx4kPXl9gXJiJfZRtbeucuT9LPcvP72exKwz9TYUo6na KjBpo9Cc+JQHfUYh2tszHNLIjAs5L+cWVPrAsgpdyXzmYECtcthI6tVeuxarocE+JG/I mXA3N/yFvD1UdOR0gpCJliV6w8FJ9DBqXFrQwp4EZJU57edbZdKvc6mHgaIU6K0AYtFs Vw+fAini9YgyqZkviuS6QeW9YFKYNC8ZeX8ft5GtooNy7QVT5Mpd1Kv9YU0QufkyCsEh XB9aS4seXo4uqLRVeK8ZCk6d77hUJ7HIdxkXTim0B7H8ItYj0R0Y9pPJsp67LZ4f0yn7 WzVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z3-v6si6265510plk.48.2018.07.05.09.59.53; Thu, 05 Jul 2018 10:00:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754107AbeGEQ5f (ORCPT + 99 others); Thu, 5 Jul 2018 12:57:35 -0400 Received: from foss.arm.com ([217.140.101.70]:54050 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753657AbeGEQ5c (ORCPT ); Thu, 5 Jul 2018 12:57:32 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 749F57A9; Thu, 5 Jul 2018 09:57:32 -0700 (PDT) Received: from localhost (e105922-lin.cambridge.arm.com [10.1.206.33]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E963B3F5BA; Thu, 5 Jul 2018 09:57:31 -0700 (PDT) From: Punit Agrawal To: Marc Zyngier Cc: , , , , Subject: Re: [PATCH v4 1/7] KVM: arm/arm64: Share common code in user_mem_abort() References: <20180705140850.5801-1-punit.agrawal@arm.com> <20180705140850.5801-2-punit.agrawal@arm.com> Date: Thu, 05 Jul 2018 17:57:30 +0100 In-Reply-To: (Marc Zyngier's message of "Thu, 5 Jul 2018 17:24:14 +0100") Message-ID: <87sh4xr56t.fsf@e105922-lin.cambridge.arm.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Marc Zyngier writes: > Hi Punit, > > On 05/07/18 15:08, Punit Agrawal wrote: >> The code for operations such as marking the pfn as dirty, and >> dcache/icache maintenance during stage 2 fault handling is duplicated >> between normal pages and PMD hugepages. >> >> Instead of creating another copy of the operations when we introduce >> PUD hugepages, let's share them across the different pagesizes. >> >> Signed-off-by: Punit Agrawal >> Cc: Christoffer Dall >> Cc: Marc Zyngier >> --- >> virt/kvm/arm/mmu.c | 68 +++++++++++++++++++++++++++------------------- >> 1 file changed, 40 insertions(+), 28 deletions(-) >> >> diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c >> index 1d90d79706bd..dd14cc36c51c 100644 >> --- a/virt/kvm/arm/mmu.c >> +++ b/virt/kvm/arm/mmu.c >> @@ -1398,6 +1398,21 @@ static void invalidate_icache_guest_page(kvm_pfn_t pfn, unsigned long size) >> __invalidate_icache_guest_page(pfn, size); >> } >> >> +static bool stage2_should_exec(struct kvm *kvm, phys_addr_t addr, >> + bool exec_fault, unsigned long fault_status) > > I find this "should exec" very confusing. > >> +{ >> + /* >> + * If we took an execution fault we will have made the >> + * icache/dcache coherent and should now let the s2 mapping be >> + * executable. >> + * >> + * Write faults (!exec_fault && FSC_PERM) are orthogonal to >> + * execute permissions, and we preserve whatever we have. >> + */ >> + return exec_fault || >> + (fault_status == FSC_PERM && stage2_is_exec(kvm, addr)); >> +} >> + >> static void kvm_send_hwpoison_signal(unsigned long address, >> struct vm_area_struct *vma) >> { >> @@ -1431,7 +1446,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, >> kvm_pfn_t pfn; >> pgprot_t mem_type = PAGE_S2; >> bool logging_active = memslot_is_logging(memslot); >> - unsigned long flags = 0; >> + unsigned long vma_pagesize, flags = 0; >> >> write_fault = kvm_is_write_fault(vcpu); >> exec_fault = kvm_vcpu_trap_is_iabt(vcpu); >> @@ -1451,7 +1466,8 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, >> return -EFAULT; >> } >> >> - if (vma_kernel_pagesize(vma) == PMD_SIZE && !logging_active) { >> + vma_pagesize = vma_kernel_pagesize(vma); >> + if (vma_pagesize == PMD_SIZE && !logging_active) { >> hugetlb = true; >> gfn = (fault_ipa & PMD_MASK) >> PAGE_SHIFT; >> } else { >> @@ -1520,28 +1536,34 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, >> if (mmu_notifier_retry(kvm, mmu_seq)) >> goto out_unlock; >> >> - if (!hugetlb && !force_pte) >> + if (!hugetlb && !force_pte) { >> + /* >> + * Only PMD_SIZE transparent hugepages(THP) are >> + * currently supported. This code will need to be >> + * updated to support other THP sizes. >> + */ >> hugetlb = transparent_hugepage_adjust(&pfn, &fault_ipa); >> + if (hugetlb) >> + vma_pagesize = PMD_SIZE; >> + } >> + >> + if (writable) >> + kvm_set_pfn_dirty(pfn); >> >> - if (hugetlb) { >> + if (fault_status != FSC_PERM) >> + clean_dcache_guest_page(pfn, vma_pagesize); >> + >> + if (exec_fault) >> + invalidate_icache_guest_page(pfn, vma_pagesize); >> + >> + if (hugetlb && vma_pagesize == PMD_SIZE) { >> pmd_t new_pmd = pfn_pmd(pfn, mem_type); >> new_pmd = pmd_mkhuge(new_pmd); >> - if (writable) { >> + if (writable) >> new_pmd = kvm_s2pmd_mkwrite(new_pmd); >> - kvm_set_pfn_dirty(pfn); >> - } >> >> - if (fault_status != FSC_PERM) >> - clean_dcache_guest_page(pfn, PMD_SIZE); >> - >> - if (exec_fault) { >> + if (stage2_should_exec(kvm, fault_ipa, exec_fault, fault_status)) >> new_pmd = kvm_s2pmd_mkexec(new_pmd); > > OK, I find this absolutely horrid... ;-) > > The rest of the function deals with discrete flags, and all of a sudden > we have a function call with a bunch of seemingly unrelated parameters. > And you are repeating it for each vma_pagesize... > > How about something like: > > bool needs_exec; > > [...] > > needs_exec = exec_fault || (fault_status == FSC_PERM && > stage2_is_exec(kvm, fault_ipa); > > And then you just check needs_exec to update the pte/pmd. And you drop > this helper. That does look a lot better. I'll roll the change into the next version. Thanks, Punit [...]