Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp9315246imu; Wed, 5 Dec 2018 02:48:05 -0800 (PST) X-Google-Smtp-Source: AFSGD/UpB6uSQrBZWePyL4W+uc8czRxyBLkRRgj9VDd1yVYjBQR5etnV2CYsocvXW3rEeAwh/s2H X-Received: by 2002:a63:4c6:: with SMTP id 189mr20189753pge.391.1544006884941; Wed, 05 Dec 2018 02:48:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544006884; cv=none; d=google.com; s=arc-20160816; b=qlhvxg8RNJ5nDWr5ouE+uwDOXh+WeIEpQ0Q2oMFGnZtEH8JOer4OVJDH0Rt2gBO3hh gYTsyeDTAk6hrTj25Z6IBnIITrMi/47eOBl5Apu/4d0ChqNF8tk0fssUC+g4PQQVi4QI Mlalq4bB6VtO1Epzsxzdr8VdDudlIuPY6CnWpb8AmaCaaJtSp0+Gb/GAVFohnpedqPtm bAcjIV1xYpFiuX4ub8vXu0jND7ZtWOfj3mObvzFJMwoT1ekT3adnOtViq/MsJCwWYcLD 0hN0C4D/QE2uHNULS1psXAD4uGOySB8W3fnxe/pP6krtmoGi4Y3bFuZ7Q8cPLZO5rJqy 0+LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=ShW214leb7lHR0SvNmjBAZlq7EwGINPu7axaCPAXKiY=; b=afWPHrjhhbD9P7tA7O0bMZKoQ0EJCgCi1MGQxBNQoez8MOGQlNQXoaW0AvV9tVRn93 jriZhfkr4JEwG/m0wMcVSGQKcCXefVnqwXeiV+GnQou9/Q61tgzElDhl3o1Qf/mJeQbn evLwdtgJRWKwjmc4geeQ6uoQyxFCTGafxx5qAhlvtxA5oFf5RWcy0UMM3sWPRoD8gZyv J8rdLr1Uo69OZ2q/6JyyDwNjlbvIfFrbmQvnMzBWU4FOlb7Ebhe7E5TzzEMb4Y81IFY7 Nh2jp3jju7JSvKr7bz/t8y0zFdZJuv113pFWCig6jeRI4aAU8j+76/9UTJu1edcYgYxy zK4Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9si21071478pfq.129.2018.12.05.02.47.49; Wed, 05 Dec 2018 02:48:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727173AbeLEKrO (ORCPT + 99 others); Wed, 5 Dec 2018 05:47:14 -0500 Received: from foss.arm.com ([217.140.101.70]:51610 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726944AbeLEKrO (ORCPT ); Wed, 5 Dec 2018 05:47:14 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9D9BE80D; Wed, 5 Dec 2018 02:47:13 -0800 (PST) Received: from [10.1.196.93] (en101.cambridge.arm.com [10.1.196.93]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 20FFC3F575; Wed, 5 Dec 2018 02:47:11 -0800 (PST) Subject: Re: [PATCH v9 2/8] KVM: arm/arm64: Re-factor setting the Stage 2 entry to exec on fault To: Anshuman Khandual , Punit Agrawal , kvmarm@lists.cs.columbia.edu Cc: marc.zyngier@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, Christoffer Dall , punitagrawal@gmail.com, linux-arm-kernel@lists.infradead.org References: <20181031175745.18650-1-punit.agrawal@arm.com> <20181031175745.18650-3-punit.agrawal@arm.com> <12212830-ffc6-a0e0-5de6-3e6a15ed7141@arm.com> From: Suzuki K Poulose Message-ID: Date: Wed, 5 Dec 2018 10:47:10 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: <12212830-ffc6-a0e0-5de6-3e6a15ed7141@arm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/12/2018 13:32, Anshuman Khandual wrote: > > > On 10/31/2018 11:27 PM, Punit Agrawal wrote: >> Stage 2 fault handler marks a page as executable if it is handling an >> execution fault or if it was a permission fault in which case the >> executable bit needs to be preserved. >> >> The logic to decide if the page should be marked executable is >> duplicated for PMD and PTE entries. To avoid creating another copy >> when support for PUD hugepages is introduced refactor the code to >> share the checks needed to mark a page table entry as executable. >> >> Signed-off-by: Punit Agrawal >> Reviewed-by: Suzuki K Poulose >> Cc: Christoffer Dall >> Cc: Marc Zyngier >> --- >> virt/kvm/arm/mmu.c | 28 +++++++++++++++------------- >> 1 file changed, 15 insertions(+), 13 deletions(-) >> >> diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c >> index 59595207c5e1..6912529946fb 100644 >> --- a/virt/kvm/arm/mmu.c >> +++ b/virt/kvm/arm/mmu.c >> @@ -1475,7 +1475,8 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, >> unsigned long fault_status) >> { >> int ret; >> - bool write_fault, exec_fault, writable, force_pte = false; >> + bool write_fault, writable, force_pte = false; >> + bool exec_fault, needs_exec; > > New line not required, still within 80 characters. > >> unsigned long mmu_seq; >> gfn_t gfn = fault_ipa >> PAGE_SHIFT; >> struct kvm *kvm = vcpu->kvm; >> @@ -1598,19 +1599,25 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, >> if (exec_fault) >> invalidate_icache_guest_page(pfn, vma_pagesize); >> >> + /* >> + * If we took an execution fault we have made the >> + * icache/dcache coherent above and should now let the s2 > > Coherent or invalidated with invalidate_icache_guest_page ? We also do clean_dcache above if needed. So that makes sure the data is coherent. Am I missing something here ? > >> + * mapping be executable. >> + * >> + * Write faults (!exec_fault && FSC_PERM) are orthogonal to >> + * execute permissions, and we preserve whatever we have. >> + */ > > Otherwise looks good. > Suzuki