Re: [PATCH 2/2] ARM: KVM: user_mem_abort: support stage 2 MMIO page mapping

2014-06-24 Thread Will Deacon
On Wed, May 07, 2014 at 03:55:57PM +0100, Christoffer Dall wrote:
 On Wed, May 07, 2014 at 10:00:21AM +0100, Marc Zyngier wrote:
  On Tue, May 06 2014 at  7:04:48 pm BST, Christoffer Dall 
  christoffer.d...@linaro.org wrote:
   On Tue, Mar 25, 2014 at 05:08:14PM -0500, Kim Phillips wrote:
   Use the correct memory type for device MMIO mappings: PAGE_S2_DEVICE.
   
   Signed-off-by: Kim Phillips kim.phill...@linaro.org
   ---
arch/arm/kvm/mmu.c | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)

[...]

   I think this looks reasonable.
  
   Acked-by: Christoffer Dall christoffer.d...@linaro.org
  
  I feel like I'm missing some context here, and the commit message is way
  too terse for me to make sense of it.
  
  So far, we can only get into user_mem_abort on a Stage-2 fault
  (translation or permission) for memory. How can we suddenly get here for
  a *device* fault? Do we get a special kind of memslot?
  
  I'm not saying the patch does anything wrong, but I'd like to understand
  the rationale behind it. On its own, it doesn't make much sense.
  
 Think device passthrough.  There's nothing preventing user space from
 setting up a memory region to point to device memory (through VFIO or
 /dev/mem).  If that's done, we should enforce device memory properties
 so writes don't linger around in the cache to be written some time later
 when that device memory potentially doesn't belong to the VM anymore.
 
 This is just one tiny piece of all of them to make device passthrough
 work, and we could hold off with this patch until we have something more
 complete.  On the other hand, we need to start somewhere, and this is
 hardly intrusive and is functionally correct even though you don't have
 a full device passthrough setup.

Please can you queue this patch up? I need it for my VFIO work, where I'm
registering the PCI BARs using KVM_SET_USER_MEMORY_REGION.

Without this, I'd have to trap all accesses and do pread/pwrite from
kvmtool instead of mmaping the regions straight through.

Cheers,

Will
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 2/2] ARM: KVM: user_mem_abort: support stage 2 MMIO page mapping

2014-06-24 Thread Marc Zyngier
On 24/06/14 11:23, Will Deacon wrote:
 On Wed, May 07, 2014 at 03:55:57PM +0100, Christoffer Dall wrote:
 On Wed, May 07, 2014 at 10:00:21AM +0100, Marc Zyngier wrote:
 On Tue, May 06 2014 at  7:04:48 pm BST, Christoffer Dall 
 christoffer.d...@linaro.org wrote:
 On Tue, Mar 25, 2014 at 05:08:14PM -0500, Kim Phillips wrote:
 Use the correct memory type for device MMIO mappings: PAGE_S2_DEVICE.

 Signed-off-by: Kim Phillips kim.phill...@linaro.org
 ---
  arch/arm/kvm/mmu.c | 11 ---
  1 file changed, 8 insertions(+), 3 deletions(-)
 
 [...]
 
 I think this looks reasonable.

 Acked-by: Christoffer Dall christoffer.d...@linaro.org

 I feel like I'm missing some context here, and the commit message is way
 too terse for me to make sense of it.

 So far, we can only get into user_mem_abort on a Stage-2 fault
 (translation or permission) for memory. How can we suddenly get here for
 a *device* fault? Do we get a special kind of memslot?

 I'm not saying the patch does anything wrong, but I'd like to understand
 the rationale behind it. On its own, it doesn't make much sense.

 Think device passthrough.  There's nothing preventing user space from
 setting up a memory region to point to device memory (through VFIO or
 /dev/mem).  If that's done, we should enforce device memory properties
 so writes don't linger around in the cache to be written some time later
 when that device memory potentially doesn't belong to the VM anymore.

 This is just one tiny piece of all of them to make device passthrough
 work, and we could hold off with this patch until we have something more
 complete.  On the other hand, we need to start somewhere, and this is
 hardly intrusive and is functionally correct even though you don't have
 a full device passthrough setup.
 
 Please can you queue this patch up? I need it for my VFIO work, where I'm
 registering the PCI BARs using KVM_SET_USER_MEMORY_REGION.
 
 Without this, I'd have to trap all accesses and do pread/pwrite from
 kvmtool instead of mmaping the regions straight through.

I'm afraid there as been quite a bit of churn in this department, and
the patch doesn't apply any more.

Kim, any chance you could respin this patch on top of mainline?

Thanks,

M.
-- 
Jazz is not dead. It just smells funny...
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 2/2] ARM: KVM: user_mem_abort: support stage 2 MMIO page mapping

2014-05-07 Thread Marc Zyngier
Kim, Christoffer,

On Tue, May 06 2014 at  7:04:48 pm BST, Christoffer Dall 
christoffer.d...@linaro.org wrote:
 On Tue, Mar 25, 2014 at 05:08:14PM -0500, Kim Phillips wrote:
 Use the correct memory type for device MMIO mappings: PAGE_S2_DEVICE.
 
 Signed-off-by: Kim Phillips kim.phill...@linaro.org
 ---
  arch/arm/kvm/mmu.c | 11 ---
  1 file changed, 8 insertions(+), 3 deletions(-)
 
 diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
 index 7789857..a354610 100644
 --- a/arch/arm/kvm/mmu.c
 +++ b/arch/arm/kvm/mmu.c
 @@ -652,6 +652,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
  struct kvm_mmu_memory_cache *memcache = vcpu-arch.mmu_page_cache;
  struct vm_area_struct *vma;
  pfn_t pfn;
 +pgprot_t mem_type = PAGE_S2;
  
  write_fault = kvm_is_write_fault(kvm_vcpu_get_hsr(vcpu));
  if (fault_status == FSC_PERM  !write_fault) {
 @@ -702,6 +703,9 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
  if (is_error_pfn(pfn))
  return -EFAULT;
  
 +if (kvm_is_mmio_pfn(pfn))
 +mem_type = PAGE_S2_DEVICE;
 +
  spin_lock(kvm-mmu_lock);
  if (mmu_notifier_retry(kvm, mmu_seq))
  goto out_unlock;
 @@ -709,7 +713,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
  hugetlb = transparent_hugepage_adjust(pfn, fault_ipa);
  
  if (hugetlb) {
 -pmd_t new_pmd = pfn_pmd(pfn, PAGE_S2);
 +pmd_t new_pmd = pfn_pmd(pfn, mem_type);
  new_pmd = pmd_mkhuge(new_pmd);
  if (writable) {
  kvm_set_s2pmd_writable(new_pmd);
 @@ -718,13 +722,14 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
  coherent_icache_guest_page(kvm, hva  PMD_MASK, PMD_SIZE);
  ret = stage2_set_pmd_huge(kvm, memcache, fault_ipa, new_pmd);
  } else {
 -pte_t new_pte = pfn_pte(pfn, PAGE_S2);
 +pte_t new_pte = pfn_pte(pfn, mem_type);
  if (writable) {
  kvm_set_s2pte_writable(new_pte);
  kvm_set_pfn_dirty(pfn);
  }
  coherent_icache_guest_page(kvm, hva, PAGE_SIZE);
 -ret = stage2_set_pte(kvm, memcache, fault_ipa, new_pte, false);
 +ret = stage2_set_pte(kvm, memcache, fault_ipa, new_pte,
 + mem_type == PAGE_S2_DEVICE);
  }
  
  
 -- 
 1.9.1
 

 I think this looks reasonable.

 Acked-by: Christoffer Dall christoffer.d...@linaro.org

I feel like I'm missing some context here, and the commit message is way
too terse for me to make sense of it.

So far, we can only get into user_mem_abort on a Stage-2 fault
(translation or permission) for memory. How can we suddenly get here for
a *device* fault? Do we get a special kind of memslot?

I'm not saying the patch does anything wrong, but I'd like to understand
the rationale behind it. On its own, it doesn't make much sense.

Thanks,

M.
-- 
Jazz is not dead. It just smells funny.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 2/2] ARM: KVM: user_mem_abort: support stage 2 MMIO page mapping

2014-05-07 Thread Christoffer Dall
On Wed, May 07, 2014 at 10:00:21AM +0100, Marc Zyngier wrote:
 Kim, Christoffer,
 
 On Tue, May 06 2014 at  7:04:48 pm BST, Christoffer Dall 
 christoffer.d...@linaro.org wrote:
  On Tue, Mar 25, 2014 at 05:08:14PM -0500, Kim Phillips wrote:
  Use the correct memory type for device MMIO mappings: PAGE_S2_DEVICE.
  
  Signed-off-by: Kim Phillips kim.phill...@linaro.org
  ---
   arch/arm/kvm/mmu.c | 11 ---
   1 file changed, 8 insertions(+), 3 deletions(-)
  
  diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
  index 7789857..a354610 100644
  --- a/arch/arm/kvm/mmu.c
  +++ b/arch/arm/kvm/mmu.c
  @@ -652,6 +652,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
  phys_addr_t fault_ipa,
 struct kvm_mmu_memory_cache *memcache = vcpu-arch.mmu_page_cache;
 struct vm_area_struct *vma;
 pfn_t pfn;
  +  pgprot_t mem_type = PAGE_S2;
   
 write_fault = kvm_is_write_fault(kvm_vcpu_get_hsr(vcpu));
 if (fault_status == FSC_PERM  !write_fault) {
  @@ -702,6 +703,9 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
  phys_addr_t fault_ipa,
 if (is_error_pfn(pfn))
 return -EFAULT;
   
  +  if (kvm_is_mmio_pfn(pfn))
  +  mem_type = PAGE_S2_DEVICE;
  +
 spin_lock(kvm-mmu_lock);
 if (mmu_notifier_retry(kvm, mmu_seq))
 goto out_unlock;
  @@ -709,7 +713,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
  phys_addr_t fault_ipa,
 hugetlb = transparent_hugepage_adjust(pfn, fault_ipa);
   
 if (hugetlb) {
  -  pmd_t new_pmd = pfn_pmd(pfn, PAGE_S2);
  +  pmd_t new_pmd = pfn_pmd(pfn, mem_type);
 new_pmd = pmd_mkhuge(new_pmd);
 if (writable) {
 kvm_set_s2pmd_writable(new_pmd);
  @@ -718,13 +722,14 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
  phys_addr_t fault_ipa,
 coherent_icache_guest_page(kvm, hva  PMD_MASK, PMD_SIZE);
 ret = stage2_set_pmd_huge(kvm, memcache, fault_ipa, new_pmd);
 } else {
  -  pte_t new_pte = pfn_pte(pfn, PAGE_S2);
  +  pte_t new_pte = pfn_pte(pfn, mem_type);
 if (writable) {
 kvm_set_s2pte_writable(new_pte);
 kvm_set_pfn_dirty(pfn);
 }
 coherent_icache_guest_page(kvm, hva, PAGE_SIZE);
  -  ret = stage2_set_pte(kvm, memcache, fault_ipa, new_pte, false);
  +  ret = stage2_set_pte(kvm, memcache, fault_ipa, new_pte,
  +   mem_type == PAGE_S2_DEVICE);
 }
   
   
  -- 
  1.9.1
  
 
  I think this looks reasonable.
 
  Acked-by: Christoffer Dall christoffer.d...@linaro.org
 
 I feel like I'm missing some context here, and the commit message is way
 too terse for me to make sense of it.
 
 So far, we can only get into user_mem_abort on a Stage-2 fault
 (translation or permission) for memory. How can we suddenly get here for
 a *device* fault? Do we get a special kind of memslot?
 
 I'm not saying the patch does anything wrong, but I'd like to understand
 the rationale behind it. On its own, it doesn't make much sense.
 
Think device passthrough.  There's nothing preventing user space from
setting up a memory region to point to device memory (through VFIO or
/dev/mem).  If that's done, we should enforce device memory properties
so writes don't linger around in the cache to be written some time later
when that device memory potentially doesn't belong to the VM anymore.

This is just one tiny piece of all of them to make device passthrough
work, and we could hold off with this patch until we have something more
complete.  On the other hand, we need to start somewhere, and this is
hardly intrusive and is functionally correct even though you don't have
a full device passthrough setup.

-Christoffer
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 2/2] ARM: KVM: user_mem_abort: support stage 2 MMIO page mapping

2014-05-06 Thread Christoffer Dall
On Tue, Mar 25, 2014 at 05:08:14PM -0500, Kim Phillips wrote:
 Use the correct memory type for device MMIO mappings: PAGE_S2_DEVICE.
 
 Signed-off-by: Kim Phillips kim.phill...@linaro.org
 ---
  arch/arm/kvm/mmu.c | 11 ---
  1 file changed, 8 insertions(+), 3 deletions(-)
 
 diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
 index 7789857..a354610 100644
 --- a/arch/arm/kvm/mmu.c
 +++ b/arch/arm/kvm/mmu.c
 @@ -652,6 +652,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
   struct kvm_mmu_memory_cache *memcache = vcpu-arch.mmu_page_cache;
   struct vm_area_struct *vma;
   pfn_t pfn;
 + pgprot_t mem_type = PAGE_S2;
  
   write_fault = kvm_is_write_fault(kvm_vcpu_get_hsr(vcpu));
   if (fault_status == FSC_PERM  !write_fault) {
 @@ -702,6 +703,9 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
   if (is_error_pfn(pfn))
   return -EFAULT;
  
 + if (kvm_is_mmio_pfn(pfn))
 + mem_type = PAGE_S2_DEVICE;
 +
   spin_lock(kvm-mmu_lock);
   if (mmu_notifier_retry(kvm, mmu_seq))
   goto out_unlock;
 @@ -709,7 +713,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
   hugetlb = transparent_hugepage_adjust(pfn, fault_ipa);
  
   if (hugetlb) {
 - pmd_t new_pmd = pfn_pmd(pfn, PAGE_S2);
 + pmd_t new_pmd = pfn_pmd(pfn, mem_type);
   new_pmd = pmd_mkhuge(new_pmd);
   if (writable) {
   kvm_set_s2pmd_writable(new_pmd);
 @@ -718,13 +722,14 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
 phys_addr_t fault_ipa,
   coherent_icache_guest_page(kvm, hva  PMD_MASK, PMD_SIZE);
   ret = stage2_set_pmd_huge(kvm, memcache, fault_ipa, new_pmd);
   } else {
 - pte_t new_pte = pfn_pte(pfn, PAGE_S2);
 + pte_t new_pte = pfn_pte(pfn, mem_type);
   if (writable) {
   kvm_set_s2pte_writable(new_pte);
   kvm_set_pfn_dirty(pfn);
   }
   coherent_icache_guest_page(kvm, hva, PAGE_SIZE);
 - ret = stage2_set_pte(kvm, memcache, fault_ipa, new_pte, false);
 + ret = stage2_set_pte(kvm, memcache, fault_ipa, new_pte,
 +  mem_type == PAGE_S2_DEVICE);
   }
  
  
 -- 
 1.9.1
 

I think this looks reasonable.

Acked-by: Christoffer Dall christoffer.d...@linaro.org
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html