Received: by 2002:a05:7412:1e0b:b0:fc:a2b0:25d7 with SMTP id kr11csp385818rdb; Thu, 15 Feb 2024 03:20:31 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXnzulNevjaPw7WIGvQyfFDLnmoQBYxR6PYNU7fg/DSE9zqNONW86WpMHMhDbxbgj3M+zRZ+3a7KAL6mwB+A1xIKk/IqTlbEMiXm8NlJA== X-Google-Smtp-Source: AGHT+IEVkoZ1T6esf7xphyiwyoqtP4GqqGGSq8+Vv2k8Qkk2+2s2mU95HWTJsOrni8SKbmxu3Co9 X-Received: by 2002:a17:906:c791:b0:a3d:20ec:7d1a with SMTP id cw17-20020a170906c79100b00a3d20ec7d1amr4487445ejb.11.1707996030940; Thu, 15 Feb 2024 03:20:30 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707996030; cv=pass; d=google.com; s=arc-20160816; b=KSbV04c+eoY3Jyg2eI3sANa7HQg4fMnYXB0nKh9U/owQD5SZICcPMF98bTa7UpgAUQ MD9XP6qYApVqXBtsl/SME8UFGABjxJrKuXntNZdWx9JhazqSFaufcIgamPTH5C1zbKTI Ip95UWfUyZGfMHBSMrvqJU0+ecPFDzDmrAZEt6HDPwRjSkoYqx3P4ECksUUTZBgxxNXv QELVOhFhT7fDRruNGl08oB1ApzCGqmlUmQhiIQvQy75z4thit6l1AFBHgKnFWGUKE0kH uZkPxUuFJKGWkm5UpmF2E1tVr0Neo7z+8Q3co/i+PJUN8/DX10q5fGNTJPx01FBpcgbF vhEg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=toehE11OK7qp1iCR7GEOCYjJ7pV4MsK8sV/Pxg0cUqI=; fh=L1spsrv307lYRQgjy/3hwbvQ7NVbJ0u3hqQHYo6XNQg=; b=HqZ29V3cCM/wcbNF6JjTMC1Kb9Hg3CqtwU8qusDEps4jJ0PAxzs5i5lcCy2XA6prRq pDa56+zeEXqro2BVFN9TZ+G5sVNVwV+PsLhrqV4FTRwU5xgRCgDmUcu03r6Ld9eiqpzD w08Yyuuqw2Yk4EVCQhUuVaLaUcgXpwSw8xJJ5URZStmKWk4dtSJwLqg3DbJ2bhzHbMCp ZDzoOT62NqVTUwga1NCw/fmn2ZT1Z6KCBJjOkxv8Apt9vOAZh3blqNa8b8a+BGPmvn7g /DdsenWs9ymMiJXaJQM68NM+kQQNSucgRB4VCYW4xpYW+7rYX8lAj4XlcoFqJTRdI0u5 14AQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-66773-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-66773-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id k15-20020a170906680f00b00a3d6ea28ca2si549798ejr.843.2024.02.15.03.20.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 15 Feb 2024 03:20:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-66773-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-66773-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-66773-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 80B861F2214B for ; Thu, 15 Feb 2024 11:20:30 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 24CF412AACF; Thu, 15 Feb 2024 11:19:38 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F04E153369 for ; Thu, 15 Feb 2024 11:19:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707995977; cv=none; b=Yq4Jc1PR/fsLy0b3oyRWsU6qJLd2y3ymSX0RkpxqE4BR5I929CvGfQRcVaeMIo+aAb2vkwDXjaZiDu2YikkGdU6itQehzgYRvI7WeS0Iyqf5LBaV+a+Z4wCVPYOp+p96g72yVRz2hTs0YwzCDwGLZwmOSMozJlJOYZUkkMejq7w= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707995977; c=relaxed/simple; bh=eEf9js+WZ0UrUzAEAyzke9PjwTbP06T93HIiXP0dyew=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=sWhtqlq5CrRdYWCvNYWHd6OSusAgK6dACc28TDCIVSavHGJOMhPrx0s2VutfdsqWG3kC7RDL3OgbRFXYrDlmv+JCJVhindeHoRFtXBxHsr+Lx88ZabzUuVMsGoYKtOk/q1BTuxZrEKEoAznpE8F6dVJ+GV57naSusuc9iEH3OgM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 400A814BF; Thu, 15 Feb 2024 03:20:16 -0800 (PST) Received: from FVFF77S0Q05N (unknown [10.57.68.11]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BF8B73F7B4; Thu, 15 Feb 2024 03:19:31 -0800 (PST) Date: Thu, 15 Feb 2024 11:19:28 +0000 From: Mark Rutland To: Ryan Roberts Cc: Catalin Marinas , Will Deacon , Ard Biesheuvel , Marc Zyngier , James Morse , Andrey Ryabinin , Andrew Morton , Matthew Wilcox , David Hildenbrand , Kefeng Wang , John Hubbard , Zi Yan , Barry Song <21cnbao@gmail.com>, Alistair Popple , Yang Shi , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , linux-arm-kernel@lists.infradead.org, x86@kernel.org, linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 08/18] arm64/mm: Convert set_pte_at() to set_ptes(..., 1) Message-ID: References: <20240215103205.2607016-1-ryan.roberts@arm.com> <20240215103205.2607016-9-ryan.roberts@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240215103205.2607016-9-ryan.roberts@arm.com> On Thu, Feb 15, 2024 at 10:31:55AM +0000, Ryan Roberts wrote: > Since set_ptes() was introduced, set_pte_at() has been implemented as a > generic macro around set_ptes(..., 1). So this change should continue to > generate the same code. However, making this change prepares us for the > transparent contpte support. It means we can reroute set_ptes() to > __set_ptes(). Since set_pte_at() is a generic macro, there will be no > equivalent __set_pte_at() to reroute to. > > Note that a couple of calls to set_pte_at() remain in the arch code. > This is intentional, since those call sites are acting on behalf of > core-mm and should continue to call into the public set_ptes() rather > than the arch-private __set_ptes(). > > Tested-by: John Hubbard > Signed-off-by: Ryan Roberts Acked-by: Mark Rutland Mark. > --- > arch/arm64/include/asm/pgtable.h | 2 +- > arch/arm64/kernel/mte.c | 2 +- > arch/arm64/kvm/guest.c | 2 +- > arch/arm64/mm/fault.c | 2 +- > arch/arm64/mm/hugetlbpage.c | 10 +++++----- > 5 files changed, 9 insertions(+), 9 deletions(-) > > diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h > index de034ca40bad..9a2df85eb493 100644 > --- a/arch/arm64/include/asm/pgtable.h > +++ b/arch/arm64/include/asm/pgtable.h > @@ -1084,7 +1084,7 @@ static inline void arch_swap_restore(swp_entry_t entry, struct folio *folio) > #endif /* CONFIG_ARM64_MTE */ > > /* > - * On AArch64, the cache coherency is handled via the set_pte_at() function. > + * On AArch64, the cache coherency is handled via the set_ptes() function. > */ > static inline void update_mmu_cache_range(struct vm_fault *vmf, > struct vm_area_struct *vma, unsigned long addr, pte_t *ptep, > diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c > index a41ef3213e1e..59bfe2e96f8f 100644 > --- a/arch/arm64/kernel/mte.c > +++ b/arch/arm64/kernel/mte.c > @@ -67,7 +67,7 @@ int memcmp_pages(struct page *page1, struct page *page2) > /* > * If the page content is identical but at least one of the pages is > * tagged, return non-zero to avoid KSM merging. If only one of the > - * pages is tagged, set_pte_at() may zero or change the tags of the > + * pages is tagged, set_ptes() may zero or change the tags of the > * other page via mte_sync_tags(). > */ > if (page_mte_tagged(page1) || page_mte_tagged(page2)) > diff --git a/arch/arm64/kvm/guest.c b/arch/arm64/kvm/guest.c > index aaf1d4939739..6e0df623c8e9 100644 > --- a/arch/arm64/kvm/guest.c > +++ b/arch/arm64/kvm/guest.c > @@ -1072,7 +1072,7 @@ int kvm_vm_ioctl_mte_copy_tags(struct kvm *kvm, > } else { > /* > * Only locking to serialise with a concurrent > - * set_pte_at() in the VMM but still overriding the > + * set_ptes() in the VMM but still overriding the > * tags, hence ignoring the return value. > */ > try_page_mte_tagging(page); > diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c > index a254761fa1bd..3235e23309ec 100644 > --- a/arch/arm64/mm/fault.c > +++ b/arch/arm64/mm/fault.c > @@ -205,7 +205,7 @@ static void show_pte(unsigned long addr) > * > * It needs to cope with hardware update of the accessed/dirty state by other > * agents in the system and can safely skip the __sync_icache_dcache() call as, > - * like set_pte_at(), the PTE is never changed from no-exec to exec here. > + * like set_ptes(), the PTE is never changed from no-exec to exec here. > * > * Returns whether or not the PTE actually changed. > */ > diff --git a/arch/arm64/mm/hugetlbpage.c b/arch/arm64/mm/hugetlbpage.c > index 2892f925ed66..27f6160890d1 100644 > --- a/arch/arm64/mm/hugetlbpage.c > +++ b/arch/arm64/mm/hugetlbpage.c > @@ -247,12 +247,12 @@ void set_huge_pte_at(struct mm_struct *mm, unsigned long addr, > > if (!pte_present(pte)) { > for (i = 0; i < ncontig; i++, ptep++, addr += pgsize) > - set_pte_at(mm, addr, ptep, pte); > + set_ptes(mm, addr, ptep, pte, 1); > return; > } > > if (!pte_cont(pte)) { > - set_pte_at(mm, addr, ptep, pte); > + set_ptes(mm, addr, ptep, pte, 1); > return; > } > > @@ -263,7 +263,7 @@ void set_huge_pte_at(struct mm_struct *mm, unsigned long addr, > clear_flush(mm, addr, ptep, pgsize, ncontig); > > for (i = 0; i < ncontig; i++, ptep++, addr += pgsize, pfn += dpfn) > - set_pte_at(mm, addr, ptep, pfn_pte(pfn, hugeprot)); > + set_ptes(mm, addr, ptep, pfn_pte(pfn, hugeprot), 1); > } > > pte_t *huge_pte_alloc(struct mm_struct *mm, struct vm_area_struct *vma, > @@ -471,7 +471,7 @@ int huge_ptep_set_access_flags(struct vm_area_struct *vma, > > hugeprot = pte_pgprot(pte); > for (i = 0; i < ncontig; i++, ptep++, addr += pgsize, pfn += dpfn) > - set_pte_at(mm, addr, ptep, pfn_pte(pfn, hugeprot)); > + set_ptes(mm, addr, ptep, pfn_pte(pfn, hugeprot), 1); > > return 1; > } > @@ -500,7 +500,7 @@ void huge_ptep_set_wrprotect(struct mm_struct *mm, > pfn = pte_pfn(pte); > > for (i = 0; i < ncontig; i++, ptep++, addr += pgsize, pfn += dpfn) > - set_pte_at(mm, addr, ptep, pfn_pte(pfn, hugeprot)); > + set_ptes(mm, addr, ptep, pfn_pte(pfn, hugeprot), 1); > } > > pte_t huge_ptep_clear_flush(struct vm_area_struct *vma, > -- > 2.25.1 >