Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1395154pxk; Fri, 25 Sep 2020 13:40:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyAMemF3fkxHAx/3yKl9xLorCedUNLKd90F9rx56XezYRsfGMa6d69O+mef02ZxzPX+eDIP X-Received: by 2002:a17:906:15c4:: with SMTP id l4mr4479377ejd.78.1601066455907; Fri, 25 Sep 2020 13:40:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601066455; cv=none; d=google.com; s=arc-20160816; b=yKnQ7+fK2B2Mu0+X2RwKpk7t/hOOOS995RFMP5n528I1ueCf0/xTpBiQmEpehASNDz 6utmU7WbP7yRFnHIzfbbpwRJUdyXK1gUUlcJx9VTNVw67hPcyASkSkkOmSnk8Xs6OebZ C6iMWlbhkMlPHYz/g11B2C2k0Ma8m38dvjktnD00/RbCnZHZ0SUCcJ4dSc/ZZD2NFIyz JcoRnpNwMtntkEvblK8fCtHVPDeifQ3ICIC3zKPVK5eINDDhGwJ+XSF5bBdtR1e4F6CZ KlZmlJcKzhD1WLwLDVebbZoUq3OkOQThNm/VjsWts8KKU+3Ja/QF9mEgVKMHhudYxxGb OzdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=uWeiJx3sxuFTq2/3Kl2souS6jLFXPZ/6WseamNe8sdQ=; b=UW6Evun0YVxg/KqmO4thscOcpFMUBMgLWrYKwSqhBbVJp4QKPz9h/Iz+cIPKbMaYcB sb5Z9XdEM4R5L8xeU2cUlwoJz+Kda44v6NT3CGPC62LV4Okyidu8AbcmpTeOlHhUD4a/ eiTKa8Wh1LY1wKxqP3z4M41RUAJSaSQEJs4pHy4fqQKlCfPrJSE++7tcnyIqWVXJ3uxu JK18Bx5yICHfoWuiKyM8b7CYkg2mN27BbgRHOQFfsBiRmr2+XF0QyxyhD6YPBblF4VWO VSS5s+6hs+aYdKJW/qXXPZWClWYuFb4ucRtYefyARpQMAYFcxtsnwXvlcH7ffd57dji3 NcaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=CupCVPOZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s12si2520372ejd.718.2020.09.25.13.40.33; Fri, 25 Sep 2020 13:40:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=CupCVPOZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728199AbgIYUiP (ORCPT + 99 others); Fri, 25 Sep 2020 16:38:15 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:56074 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727276AbgIYUiI (ORCPT ); Fri, 25 Sep 2020 16:38:08 -0400 Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1601066287; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=uWeiJx3sxuFTq2/3Kl2souS6jLFXPZ/6WseamNe8sdQ=; b=CupCVPOZxiUhLnJ87xIU7N4KgOffybyI5gOTQ5EFrnZoBoFIQcuIQY/GgeA/uk/Bk0KIP9 haM4eo+eXBXVOw8dI+tPEjitymU9RkAeIepWebjBfaWCHcZyMblolioWE6xX+9i9B+1OOg NUqZ4X5FnwrbUu8/KAd8y6OxQsdRATU= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-218-X9Nz5B16NDaofrt8lzDYZg-1; Fri, 25 Sep 2020 16:38:05 -0400 X-MC-Unique: X9Nz5B16NDaofrt8lzDYZg-1 Received: by mail-wm1-f69.google.com with SMTP id c200so73916wmd.5 for ; Fri, 25 Sep 2020 13:38:05 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=uWeiJx3sxuFTq2/3Kl2souS6jLFXPZ/6WseamNe8sdQ=; b=eWOtTx6lTqkaXOdDXLlzZOaA5ECbSmOq688I77NYqUcQv2AETC9WXUArTPNmvOgLOQ wpSkY0SNktCgYUaerqufz2lORdhhTPtTLhQOgsZR3CW2lt0/fl0IaIjMcTfZGkwhFwSf FNH+xzcyTIt1yU8o7FkHMYgjJlosN1Mo+52EwdCyLJbXbtJ6xvYsxmA0IGPx5P14fT4j 2TpSE4Z4uXs80BCXtednfVAlQtOaTLrADSARrb8ojgfToq3f2j/IeoX+L5deP+Op6Kr/ 2E9TpkYWur/z3qJWthcU7MS3JXPwh0790GhriWl3Z/HorXtwAEACzrnlJiX6Rt5ZoSGC yd8Q== X-Gm-Message-State: AOAM530Auz26wJqc+0nvZ1Z3hw6r/DHH5zNUxcP3w2qckWhn9+AToteh ZUsSGBPnevHU5zqZviJyrqD8g0b790j6+kb4jFgN8aOHRH/ksUvLb5BH4EKBu0HLoLpHDjC6Smr rukzkCwR0hlRlWsOvbjvjW73R X-Received: by 2002:adf:ec47:: with SMTP id w7mr6747277wrn.175.1601066284106; Fri, 25 Sep 2020 13:38:04 -0700 (PDT) X-Received: by 2002:adf:ec47:: with SMTP id w7mr6747260wrn.175.1601066283908; Fri, 25 Sep 2020 13:38:03 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:ec9b:111a:97e3:4baf? ([2001:b07:6468:f312:ec9b:111a:97e3:4baf]) by smtp.gmail.com with ESMTPSA id l8sm4083404wrx.22.2020.09.25.13.38.03 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 25 Sep 2020 13:38:03 -0700 (PDT) Subject: Re: [PATCH 0/4] KVM: x86/mmu: Page fault handling cleanups To: Sean Christopherson Cc: Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Kai Huang References: <20200923220425.18402-1-sean.j.christopherson@intel.com> From: Paolo Bonzini Message-ID: Date: Fri, 25 Sep 2020 22:38:02 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <20200923220425.18402-1-sean.j.christopherson@intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24/09/20 00:04, Sean Christopherson wrote: > Cleanups for page fault handling that were encountered during early TDX > enabling, but are worthwhile on their own. Specifically, patch 4 fixes an > issue where KVM doesn't detect a spurious page fault (due to the fault > being fixed by a different pCPU+vCPU) and does the full gamut of writing > the SPTE, updating stats, and prefetching SPTEs. > > Sean Christopherson (4): > KVM: x86/mmu: Return -EIO if page fault returns RET_PF_INVALID > KVM: x86/mmu: Invert RET_PF_* check when falling through to emulation > KVM: x86/mmu: Return unique RET_PF_* values if the fault was fixed > KVM: x86/mmu: Bail early from final #PF handling on spurious faults > > arch/x86/kvm/mmu/mmu.c | 70 +++++++++++++++++++++------------- > arch/x86/kvm/mmu/mmutrace.h | 13 +++---- > arch/x86/kvm/mmu/paging_tmpl.h | 3 ++ > 3 files changed, 52 insertions(+), 34 deletions(-) > Queued, thanks. Looking at the KVM_BUG_ON now since patch 1 is somewhat related. Paolo