Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp459337pxb; Wed, 13 Jan 2021 07:46:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJxRu5gvGD2MvxGGXJN3j1lAy9au8DiGhjdvSbv1rY5f5Fei0ho/h32ebbZmn1mTirZOoCfm X-Received: by 2002:a17:906:adce:: with SMTP id lb14mr1989422ejb.502.1610552800282; Wed, 13 Jan 2021 07:46:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610552800; cv=none; d=google.com; s=arc-20160816; b=Xq+is++EK8C5ZBsak9RX0VQmxoJi9fq5i3dYTVUjzNKOdCCQ1o1DP0JG1fzX8b3HVV I1zIDqHCg6LeKU9KTsqaurYNIyAEDOOc2Rvnrht6T6LpN+Zzdocozr2t8f4fwP1rVBU6 fmuOTH0XCV1VgiPRbCaUvJ433kuPRnUmUrR12mOAgqKnNoErFlo6gDN6+gXp0eRgxMCX HwUsrTe47LuW5KK8tt+bkME7gc412s+g1DKuQgvU35Yp/zRZX113kIWSyeW2dPpoDBor TCFFmpe0NNuAxmzRRD/ENYCf4s4EsSHGsapSBcTL8qLVhDHFoZajwHlV4uHMherthhjA SyxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=qvLNGsDGYHZK4S9USV41fKN6sZn6qSul+E5zUKHg1mc=; b=lkhmzgxbascb6IBVvq+0I7TEwFLql+dfHNbUJJ6QUeNBvbst7mSRvWp2DUt0ROYP8O u60mOd6qQlOj8Z003RLYjX6D7xk5VmpNaSuFI6/8ZzWIMV03GfIKbAC5Eacdbk17oV4p OT7r807aT2r25zJpIuRYVUxUJKX+x+RdiOrkDBbaVwh65NC/oWthkQzv7DPSps3Phi1Y P4Ot2FQq8IyZkxAXlh7cCXAMkNCEv53+7Jd7e0cQZy+HfDmO2IaLQpAc86dueP/pRlNl EGO8hX3LKd2aRzgi44DIFphhhCGspV1zR8jLUQdTIAOZI8EanJcWl4KVQhIKbXydULgq VvCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=K8P+Ll0p; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r6si379006eji.619.2021.01.13.07.46.15; Wed, 13 Jan 2021 07:46:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=K8P+Ll0p; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726289AbhAMPpD (ORCPT + 99 others); Wed, 13 Jan 2021 10:45:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:36186 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725977AbhAMPpC (ORCPT ); Wed, 13 Jan 2021 10:45:02 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id D01FA208BA; Wed, 13 Jan 2021 15:44:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1610552661; bh=+rZ1G0MM72WaqgZtoKvVZ0XdQ+wClUuZnuEWYmqhNAg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=K8P+Ll0pkHS0co8mduKu2x4XQGzTmwp/re9ivY0Rm6Y1SaRk8tCzdlCMgVW/Qqs3q cSRjWLsbk8Knxh7HzOYiZK2NwryIfOEO8iSHNGCdtVI6yZvrs4tEJy3hj8uQa07WEr eWw+IQ2YYMOTevQ/oEeUGlVWF7fofd0qjyVxJVFS9PigiDSr+AHPBtpomjpgV8cQN/ AOG/1qqHCNkggeEipinOedyNFqdzAJg5OTfwuaUFad32FMACRtwbwOasrGCpMQRqTR DDprXhjv2lobyQFXua7wUfZZKJN1o+14+R8r2G4ZNJltSNFsY5qyvrQAN9guO2DgUD PpEL+qjJ3Hbww== Date: Wed, 13 Jan 2021 15:44:15 +0000 From: Will Deacon To: Yanan Wang Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Marc Zyngier , Catalin Marinas , James Morse , Julien Thierry , Suzuki K Poulose , Gavin Shan , Quentin Perret , wanghaibin.wang@huawei.com, yezengruan@huawei.com, zhukeqian1@huawei.com, yuzenghui@huawei.com Subject: Re: [PATCH v2 2/3] KVM: arm64: Add prejudgement for relaxing permissions only case in stage2 translation fault handler Message-ID: <20210113154414.GA11892@willie-the-truck> References: <20201216122844.25092-1-wangyanan55@huawei.com> <20201216122844.25092-3-wangyanan55@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201216122844.25092-3-wangyanan55@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 16, 2020 at 08:28:43PM +0800, Yanan Wang wrote: > In dirty-logging, or dirty-logging-stopped time, even normal running > time of a guest configed with huge mappings and numbers of vCPUs, > translation faults by different vCPUs on the same GPA could occur > successively almost at the same time. There are two reasons for it. > > (1) If there are some vCPUs accessing the same GPA at the same time and > the leaf PTE is not set yet, then they will all cause translation faults > and the first vCPU holding mmu_lock will set valid leaf PTE, and the > others will later update the old PTE with a new one if they are different. > > (2) When changing a leaf entry or a table entry with break-before-make, > if there are some vCPUs accessing the same GPA just catch the moment when > the target PTE is set invalid in a BBM procedure coincidentally, they will > all cause translation faults and will later update the old PTE with a new > one if they are different. > > The worst case can be like this: vCPU A causes a translation fault with RW > prot and sets the leaf PTE with RW permissions, and then the next vCPU B > with RO prot updates the PTE back to RO permissions with break-before-make. > And the BBM-invalid moment may trigger more unnecessary translation faults, > then some useless small loops might occur which could lead to vCPU stuck. > > To avoid unnecessary update and small loops, add prejudgement in the > translation fault handler: Skip updating the PTE with break-before-make > if we are trying to recreate the exact same mapping or only change the > access permissions. Actually, change of permissions will be handled > through the relax_perms path next time if necessary. > > Signed-off-by: Yanan Wang > --- > arch/arm64/kvm/hyp/pgtable.c | 28 +++++++++++++++++++--------- > 1 file changed, 19 insertions(+), 9 deletions(-) > > diff --git a/arch/arm64/kvm/hyp/pgtable.c b/arch/arm64/kvm/hyp/pgtable.c > index 350f9f810930..8225ced49bad 100644 > --- a/arch/arm64/kvm/hyp/pgtable.c > +++ b/arch/arm64/kvm/hyp/pgtable.c > @@ -45,6 +45,10 @@ > > #define KVM_PTE_LEAF_ATTR_HI_S2_XN BIT(54) > > +#define KVM_PTE_LEAF_ATTR_S2_PERMS (KVM_PTE_LEAF_ATTR_LO_S2_S2AP_R | \ > + KVM_PTE_LEAF_ATTR_LO_S2_S2AP_W | \ > + KVM_PTE_LEAF_ATTR_HI_S2_XN) > + > struct kvm_pgtable_walk_data { > struct kvm_pgtable *pgt; > struct kvm_pgtable_walker *walker; > @@ -460,7 +464,7 @@ static int stage2_map_set_prot_attr(enum kvm_pgtable_prot prot, > return 0; > } > > -static bool stage2_map_walker_try_leaf(u64 addr, u64 end, u32 level, > +static int stage2_map_walker_try_leaf(u64 addr, u64 end, u32 level, > kvm_pte_t *ptep, > struct stage2_map_data *data) > { > @@ -469,13 +473,18 @@ static bool stage2_map_walker_try_leaf(u64 addr, u64 end, u32 level, > struct page *page = virt_to_page(ptep); > > if (!kvm_block_mapping_supported(addr, end, phys, level)) > - return false; > + return 1; It would probably be cleaner to return another error code here, as we have failed to install a mapping (e.g. E2BIG or perhaps more perversely, ENOTBLK). Then the caller can decide to install a trable. Will