Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1010790rwb; Thu, 1 Dec 2022 11:06:03 -0800 (PST) X-Google-Smtp-Source: AA0mqf6CH4PgempUzKwY1ZmQNpIE2vLJEaXUrHzu3ZPNUo6hr6BIl9/t2VUyiyhF+uRn1HTpGUN0 X-Received: by 2002:a17:907:c016:b0:7a4:98cc:7c8e with SMTP id ss22-20020a170907c01600b007a498cc7c8emr47279668ejc.48.1669921562829; Thu, 01 Dec 2022 11:06:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669921562; cv=none; d=google.com; s=arc-20160816; b=iwcmPYar8AF4dmL6jdQDs6Y79qSp6FpMvoTb0hfBC4+zEDnE0V7aLZRW9tgOv9wqnR KG9Aamkr4VQhrflbgg2WaOgvtf7aTQLxKHXTTqoof9CJmyMwBK9wH4vIdY3J80G08HfS 9e3PdIoVV8OhQWK1/bMyC3bh2vchSq23x4k3Pzg+m/ozaM9ApgQVGUhhlG+4qa5N93CA gzxQTavqcWtsyaSOZNwx7h/YVsbEjlwBb5q+adDgvMFwafu6AJ/QEbD7vmcW5BdXKCk7 /o0dbjwL7no98ApSvO9G+Zz+iNP31LIVWe7cAl3szTshjjwMANg9lFTlwR25zayq6Oqp CldA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=4JBjaAd/sK5erbyfV7CKIA0s/Z0KBM5k0rK3mkoOeJc=; b=QdVIIshyZSHNXBQUaQRKr8C8QXnOesOOzy54kVV0DMHOFd/3I9ULnz5UpGN42ay/Lx 1jQYLdP6m7JOKn1v7ziexXyxa0rRX3YyjlK82Qpb6ptGAjwGmJEfWFIGkvKOGHtAiHVB JutKE2asvCQEf0bfQ0OQhTNC4nW/fJ7urFl6HvoXdH4W9vbWP8HBcbbZxUgHX3iAsG7C 33y0HCAwrxGPwEAW/eCp/Uva+/WXXoUptyjbnT0yd/KhFIeWwFyjTEI5zMuY6x1wH2DS wGgpHBhVg7Lp4niYLXCpyBBJoqDGekcdLlnRhgFtvL9+MqwQwVOK4o5cQQieApgb4+eN k0JA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gn20-20020a1709070d1400b00791a3dd01b1si1142051ejc.865.2022.12.01.11.05.42; Thu, 01 Dec 2022 11:06:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229913AbiLASRd (ORCPT + 82 others); Thu, 1 Dec 2022 13:17:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43380 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230379AbiLASRT (ORCPT ); Thu, 1 Dec 2022 13:17:19 -0500 X-Greylist: delayed 338 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 01 Dec 2022 10:17:17 PST Received: from out-93.mta0.migadu.com (out-93.mta0.migadu.com [IPv6:2001:41d0:1004:224b::5d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E1F761A07E for ; Thu, 1 Dec 2022 10:17:17 -0800 (PST) Date: Thu, 1 Dec 2022 18:11:33 +0000 X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Oliver Upton To: Ricardo Koller Cc: Marc Zyngier , James Morse , Alexandru Elisei , Suzuki K Poulose , Catalin Marinas , Will Deacon , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/4] KVM: arm64: Don't serialize if the access flag isn't set Message-ID: References: <20221129191946.1735662-1-oliver.upton@linux.dev> <20221129191946.1735662-3-oliver.upton@linux.dev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 29, 2022 at 09:15:21PM +0000, Oliver Upton wrote: > Hi Ricardo, > > Thanks for having a look. > > On Tue, Nov 29, 2022 at 12:52:12PM -0800, Ricardo Koller wrote: > > On Tue, Nov 29, 2022 at 07:19:44PM +0000, Oliver Upton wrote: > > [...] > > > > + ret = stage2_update_leaf_attrs(pgt, addr, 1, KVM_PTE_LEAF_ATTR_LO_S2_AF, 0, > > > + &pte, NULL, 0); > > > + if (!ret) > > > + dsb(ishst); > > > > At the moment, the only reason for stage2_update_leaf_attrs() to not > > update the PTE is if it's not valid: > > > > if (!kvm_pte_valid(pte)) > > return 0; > > > > I guess you could check that as well: > > > > + if (!ret || kvm_pte_valid(pte)) > > + dsb(ishst); > > Thanks for catching this. > > Instead of pivoting on the returned PTE value, how about we return > -EAGAIN from the early return in stage2_attr_walker()? It would better > match the pattern used elsewhere in the pgtable code. Bugh... Returning EAGAIN has some unfortunate consequences that I've missed until now... The stage2 attr walker is used to handle faults as well as range-based operations. In the former case, EAGAIN is sane as we retry execution but the latter is not. I stupidly got hung up on write protection not working as intended for some time. I think that callers into the page table walker should indicate whether or not the walk is to address a fault. If it is not, __kvm_pgtable_visit() and __kvm_pgtable_walk() should chug along instead of bailing for EAGAIN. Let me mess around with this and figure out what is least ugly. -- Thanks, Oliver