Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp6392857imd; Wed, 31 Oct 2018 10:59:29 -0700 (PDT) X-Google-Smtp-Source: AJdET5fnomG0cCi6gaKJd/fsAPU7fhcm7xJlAMHhbxaYc7hs1MSBOb0DrnLWs7qtLs+YyGBH4imb X-Received: by 2002:a65:4049:: with SMTP id h9mr4070163pgp.304.1541008769650; Wed, 31 Oct 2018 10:59:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541008769; cv=none; d=google.com; s=arc-20160816; b=cEpiX+2xM3sA0j6SWSG2aHub64wcV/57h6wsAxXvWmeuGfbcr2ZlayJMV1dM30r2wD HkFd1mTjsf+nE/iyqf23DyYR3s8LbwLxxN0ervYo/1HlaCABNYyzWCda3UPF8v+Gf3NS Gf2l7sfzgSnHLnoHFXp9elB9Yaooq3D3pS7O7NEtw9F7W9vvthMALN+x/aSYyTDnv5HS fgL5TuvMBGe8TaCkMK4tZJa41ATWAxEVPbxK9vQIzsb/Fmm/w3CQmGL+jr+3wk5UW3V6 S+6S+AxjEYqjlGLeeBrvcjXd5ykAjhEO6IsA5mox0zXh1ksE5MELBn9WcbxNDzMO6eVa YcqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=ao8tRTjHRXGmzyeEC03dO8tfWRD8iln/6XuVglX57Jg=; b=KxhIzWR50y9KsqVY4Hhc/qMDsVm/y9+HPDVSCjaBQrPxRHN481mRkChgwiryGHYAf9 PcXNqTVh4DgCqmT5/Rlo2HRTU7ei7wsHVbnsFNHLggIOYbUGaNnXk6i2inlPS73NVtLY jZumkz+cTbtqmOgOSh9f8aRB/AUH4Sx7I9OFqg/PVcYk8n+OMotCzjKsWFhYxZCo8U/g AjW5Q/e6/68pcsjfbKbHNu0w9VSljBg1F5qmwdfGAtJFekuB8czH16yRgfmlR4riEHBt j/Wv5VfNQmVMDABGpJqwaAse3htDCnJKsV3IFVmoNACaZNIFkQiFiH9yeG2pLdjJ5ssJ bXKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k3-v6si19294009pgm.517.2018.10.31.10.59.14; Wed, 31 Oct 2018 10:59:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730080AbeKAC5h (ORCPT + 99 others); Wed, 31 Oct 2018 22:57:37 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:44830 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730070AbeKAC5h (ORCPT ); Wed, 31 Oct 2018 22:57:37 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DE72C15AB; Wed, 31 Oct 2018 10:58:33 -0700 (PDT) Received: from localhost (e105922-lin.cambridge.arm.com [10.1.197.25]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5ED563F6A8; Wed, 31 Oct 2018 10:58:33 -0700 (PDT) From: Punit Agrawal To: kvmarm@lists.cs.columbia.edu Cc: Punit Agrawal , marc.zyngier@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, suzuki.poulose@arm.com, punitagrawal@gmail.com, Russell King , Catalin Marinas Subject: [PATCH v9 4/8] KVM: arm64: Support dirty page tracking for PUD hugepages Date: Wed, 31 Oct 2018 17:57:41 +0000 Message-Id: <20181031175745.18650-5-punit.agrawal@arm.com> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181031175745.18650-1-punit.agrawal@arm.com> References: <20181031175745.18650-1-punit.agrawal@arm.com> MIME-Version: 1.0 X-ARM-No-Footer: FoSSMail Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for creating PUD hugepages at stage 2, add support for write protecting PUD hugepages when they are encountered. Write protecting guest tables is used to track dirty pages when migrating VMs. Also, provide trivial implementations of required kvm_s2pud_* helpers to allow sharing of code with arm32. Signed-off-by: Punit Agrawal Reviewed-by: Christoffer Dall Reviewed-by: Suzuki K Poulose Cc: Marc Zyngier Cc: Russell King Cc: Catalin Marinas Cc: Will Deacon --- arch/arm/include/asm/kvm_mmu.h | 15 +++++++++++++++ arch/arm64/include/asm/kvm_mmu.h | 10 ++++++++++ virt/kvm/arm/mmu.c | 11 +++++++---- 3 files changed, 32 insertions(+), 4 deletions(-) diff --git a/arch/arm/include/asm/kvm_mmu.h b/arch/arm/include/asm/kvm_mmu.h index e6eff8bf5d7f..37bf85d39607 100644 --- a/arch/arm/include/asm/kvm_mmu.h +++ b/arch/arm/include/asm/kvm_mmu.h @@ -87,6 +87,21 @@ void kvm_clear_hyp_idmap(void); #define kvm_pmd_mkhuge(pmd) pmd_mkhuge(pmd) +/* + * The following kvm_*pud*() functions are provided strictly to allow + * sharing code with arm64. They should never be called in practice. + */ +static inline void kvm_set_s2pud_readonly(pud_t *pud) +{ + BUG(); +} + +static inline bool kvm_s2pud_readonly(pud_t *pud) +{ + BUG(); + return false; +} + static inline pte_t kvm_s2pte_mkwrite(pte_t pte) { pte_val(pte) |= L_PTE_S2_RDWR; diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h index 13d482710292..8da6d1b2a196 100644 --- a/arch/arm64/include/asm/kvm_mmu.h +++ b/arch/arm64/include/asm/kvm_mmu.h @@ -251,6 +251,16 @@ static inline bool kvm_s2pmd_exec(pmd_t *pmdp) return !(READ_ONCE(pmd_val(*pmdp)) & PMD_S2_XN); } +static inline void kvm_set_s2pud_readonly(pud_t *pudp) +{ + kvm_set_s2pte_readonly((pte_t *)pudp); +} + +static inline bool kvm_s2pud_readonly(pud_t *pudp) +{ + return kvm_s2pte_readonly((pte_t *)pudp); +} + #define hyp_pte_table_empty(ptep) kvm_page_empty(ptep) #ifdef __PAGETABLE_PMD_FOLDED diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c index fb5325f7a1ac..1c669c3c1208 100644 --- a/virt/kvm/arm/mmu.c +++ b/virt/kvm/arm/mmu.c @@ -1347,9 +1347,12 @@ static void stage2_wp_puds(struct kvm *kvm, pgd_t *pgd, do { next = stage2_pud_addr_end(kvm, addr, end); if (!stage2_pud_none(kvm, *pud)) { - /* TODO:PUD not supported, revisit later if supported */ - BUG_ON(stage2_pud_huge(kvm, *pud)); - stage2_wp_pmds(kvm, pud, addr, next); + if (stage2_pud_huge(kvm, *pud)) { + if (!kvm_s2pud_readonly(pud)) + kvm_set_s2pud_readonly(pud); + } else { + stage2_wp_pmds(kvm, pud, addr, next); + } } } while (pud++, addr = next, addr != end); } @@ -1392,7 +1395,7 @@ static void stage2_wp_range(struct kvm *kvm, phys_addr_t addr, phys_addr_t end) * * Called to start logging dirty pages after memory region * KVM_MEM_LOG_DIRTY_PAGES operation is called. After this function returns - * all present PMD and PTEs are write protected in the memory region. + * all present PUD, PMD and PTEs are write protected in the memory region. * Afterwards read of dirty page log can be called. * * Acquires kvm_mmu_lock. Called with kvm->slots_lock mutex acquired, -- 2.19.1