All of lore.kernel.org
 help / color / mirror / Atom feed
From: Christoffer Dall <christoffer.dall@linaro.org>
To: kvm-ia64@vger.kernel.org
Subject: Re: [PATCH v14 6/7] KVM: arm: dirty logging write protect support
Date: Sat, 22 Nov 2014 19:40:59 +0000	[thread overview]
Message-ID: <20141122194059.GO3401@cbox> (raw)
In-Reply-To: <1415930268-7674-7-git-send-email-m.smarduch@samsung.com>

On Thu, Nov 13, 2014 at 05:57:47PM -0800, Mario Smarduch wrote:
> Add support to track dirty pages between user space KVM_GET_DIRTY_LOG ioctl
> calls. We call kvm_get_dirty_log_protect() function to do most of the work.
> 
> Reviewed-by: Marc Zyngier <marc.zyngier@arm.com>
> Signed-off-by: Mario Smarduch <m.smarduch@samsung.com>
> ---
>  arch/arm/kvm/Kconfig |    1 +
>  arch/arm/kvm/arm.c   |   46 ++++++++++++++++++++++++++++++++++++++++++++++
>  arch/arm/kvm/mmu.c   |   22 ++++++++++++++++++++++
>  3 files changed, 69 insertions(+)
> 
> diff --git a/arch/arm/kvm/Kconfig b/arch/arm/kvm/Kconfig
> index f27f336..a8d1ace 100644
> --- a/arch/arm/kvm/Kconfig
> +++ b/arch/arm/kvm/Kconfig
> @@ -24,6 +24,7 @@ config KVM
>  	select HAVE_KVM_ARCH_TLB_FLUSH_ALL
>  	select KVM_MMIO
>  	select KVM_ARM_HOST
> +	select KVM_GENERIC_DIRTYLOG_READ_PROTECT
>  	depends on ARM_VIRT_EXT && ARM_LPAE
>  	---help---
>  	  Support hosting virtualized guest machines. You will also
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index a99e0cd..040c0f3 100644
> --- a/arch/arm/kvm/arm.c
> +++ b/arch/arm/kvm/arm.c
> @@ -737,9 +737,55 @@ long kvm_arch_vcpu_ioctl(struct file *filp,
>  	}
>  }
>  
> +/**
> + * kvm_vm_ioctl_get_dirty_log - get and clear the log of dirty pages in a slot
> + * @kvm:	kvm instance
> + * @log:	slot id and address to which we copy the log
> + *
> + * We need to keep it in mind that VCPU threads can write to the bitmap
> + * concurrently.  So, to avoid losing data, we keep the following order for
> + * each bit:
> + *
> + *   1. Take a snapshot of the bit and clear it if needed.
> + *   2. Write protect the corresponding page.
> + *   3. Copy the snapshot to the userspace.
> + *   4. Flush TLB's if needed.
> + *
> + * Steps 1,2,3 are handled by kvm_get_dirty_log_protect().
> + * Between 2 and 4, the guest may write to the page using the remaining TLB
> + * entry.  This is not a problem because the page is reported dirty using
> + * the snapshot taken before and step 4 ensures that writes done after
> + * exiting to userspace will be logged for the next call.
> + */
>  int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
>  {
> +#ifdef CONFIG_ARM
> +	int r;
> +	bool is_dirty = false;
> +
> +	mutex_lock(&kvm->slots_lock);
> +
> +	r = kvm_get_dirty_log_protect(kvm, log, &is_dirty);
> +	if (r)
> +		goto out;
> +
> +	/*
> +	 * kvm_get_dirty_log_protect() may fail and we may skip TLB flush
> +	 * leaving few stale spte TLB entries which is harmless, given we're
> +	 * just write protecting spte's, so few stale TLB's will be left in
> +	 * original R/W state. And since the bitmap is corrupt userspace will
> +	 * error out anyway (i.e. during migration or dirty page loging for

s/loging/logging/

Hmmm, where is this behavior specified in the ABI?  If you call
KVM_GET_DIRTY_LOG subsequently, you will now potentially have unreported
dirty pages, which can be completely avoided by removing the
if-statement and the goto above.  Why not simply do that and get rid of
this comment?

> +	 * other reasons) terminating dirty page logging.
> +	 */
> +	if (is_dirty)
> +		kvm_flush_remote_tlbs(kvm);
> +out:
> +	mutex_unlock(&kvm->slots_lock);
> +
> +	return r;
> +#else /* ARM64 */
>  	return -EINVAL;
> +#endif
>  }
>  
>  static int kvm_vm_ioctl_set_device_addr(struct kvm *kvm,
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 1e8b6a9..8137455 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -870,6 +870,28 @@ void kvm_mmu_wp_memory_region(struct kvm *kvm, int slot)
>  	spin_unlock(&kvm->mmu_lock);
>  	kvm_flush_remote_tlbs(kvm);
>  }
> +
> +/**
> + * kvm_arch_mmu_write_protect_pt_masked() - write protect dirty pages
> + * @kvm:	The KVM pointer
> + * @slot:	The memory slot associated with mask
> + * @gfn_offset:	The gfn offset in memory slot
> + * @mask:	The mask of dirty pages at offset 'gfn_offset' in this memory
> + *              slot to be write protected
> + *
> + * Walks bits set in mask write protects the associated pte's. Caller must
> + * acquire kvm_mmu_lock.
> + */
> +void kvm_arch_mmu_write_protect_pt_masked(struct kvm *kvm,
> +		struct kvm_memory_slot *slot,
> +		gfn_t gfn_offset, unsigned long mask)
> +{
> +	phys_addr_t base_gfn = slot->base_gfn + gfn_offset;
> +	phys_addr_t start = (base_gfn +  __ffs(mask)) << PAGE_SHIFT;
> +	phys_addr_t end = (base_gfn + __fls(mask) + 1) << PAGE_SHIFT;
> +
> +	stage2_wp_range(kvm, start, end);
> +}
>  #endif
>  
>  static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa,
> -- 
> 1.7.9.5
> 

WARNING: multiple messages have this Message-ID (diff)
From: Christoffer Dall <christoffer.dall@linaro.org>
To: Mario Smarduch <m.smarduch@samsung.com>
Cc: pbonzini@redhat.com, james.hogan@imgtec.com, agraf@suse.de,
	marc.zyngier@arm.com, cornelia.huck@de.ibm.com,
	borntraeger@de.ibm.com, catalin.marinas@arm.com,
	kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org,
	kvm-ppc@vger.kernel.org, kvm-ia64@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org, steve.capper@arm.com,
	peter.maydell@linaro.org
Subject: Re: [PATCH v14 6/7] KVM: arm: dirty logging write protect support
Date: Sat, 22 Nov 2014 19:40:59 +0000	[thread overview]
Message-ID: <20141122194059.GO3401@cbox> (raw)
In-Reply-To: <1415930268-7674-7-git-send-email-m.smarduch@samsung.com>

On Thu, Nov 13, 2014 at 05:57:47PM -0800, Mario Smarduch wrote:
> Add support to track dirty pages between user space KVM_GET_DIRTY_LOG ioctl
> calls. We call kvm_get_dirty_log_protect() function to do most of the work.
> 
> Reviewed-by: Marc Zyngier <marc.zyngier@arm.com>
> Signed-off-by: Mario Smarduch <m.smarduch@samsung.com>
> ---
>  arch/arm/kvm/Kconfig |    1 +
>  arch/arm/kvm/arm.c   |   46 ++++++++++++++++++++++++++++++++++++++++++++++
>  arch/arm/kvm/mmu.c   |   22 ++++++++++++++++++++++
>  3 files changed, 69 insertions(+)
> 
> diff --git a/arch/arm/kvm/Kconfig b/arch/arm/kvm/Kconfig
> index f27f336..a8d1ace 100644
> --- a/arch/arm/kvm/Kconfig
> +++ b/arch/arm/kvm/Kconfig
> @@ -24,6 +24,7 @@ config KVM
>  	select HAVE_KVM_ARCH_TLB_FLUSH_ALL
>  	select KVM_MMIO
>  	select KVM_ARM_HOST
> +	select KVM_GENERIC_DIRTYLOG_READ_PROTECT
>  	depends on ARM_VIRT_EXT && ARM_LPAE
>  	---help---
>  	  Support hosting virtualized guest machines. You will also
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index a99e0cd..040c0f3 100644
> --- a/arch/arm/kvm/arm.c
> +++ b/arch/arm/kvm/arm.c
> @@ -737,9 +737,55 @@ long kvm_arch_vcpu_ioctl(struct file *filp,
>  	}
>  }
>  
> +/**
> + * kvm_vm_ioctl_get_dirty_log - get and clear the log of dirty pages in a slot
> + * @kvm:	kvm instance
> + * @log:	slot id and address to which we copy the log
> + *
> + * We need to keep it in mind that VCPU threads can write to the bitmap
> + * concurrently.  So, to avoid losing data, we keep the following order for
> + * each bit:
> + *
> + *   1. Take a snapshot of the bit and clear it if needed.
> + *   2. Write protect the corresponding page.
> + *   3. Copy the snapshot to the userspace.
> + *   4. Flush TLB's if needed.
> + *
> + * Steps 1,2,3 are handled by kvm_get_dirty_log_protect().
> + * Between 2 and 4, the guest may write to the page using the remaining TLB
> + * entry.  This is not a problem because the page is reported dirty using
> + * the snapshot taken before and step 4 ensures that writes done after
> + * exiting to userspace will be logged for the next call.
> + */
>  int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
>  {
> +#ifdef CONFIG_ARM
> +	int r;
> +	bool is_dirty = false;
> +
> +	mutex_lock(&kvm->slots_lock);
> +
> +	r = kvm_get_dirty_log_protect(kvm, log, &is_dirty);
> +	if (r)
> +		goto out;
> +
> +	/*
> +	 * kvm_get_dirty_log_protect() may fail and we may skip TLB flush
> +	 * leaving few stale spte TLB entries which is harmless, given we're
> +	 * just write protecting spte's, so few stale TLB's will be left in
> +	 * original R/W state. And since the bitmap is corrupt userspace will
> +	 * error out anyway (i.e. during migration or dirty page loging for

s/loging/logging/

Hmmm, where is this behavior specified in the ABI?  If you call
KVM_GET_DIRTY_LOG subsequently, you will now potentially have unreported
dirty pages, which can be completely avoided by removing the
if-statement and the goto above.  Why not simply do that and get rid of
this comment?

> +	 * other reasons) terminating dirty page logging.
> +	 */
> +	if (is_dirty)
> +		kvm_flush_remote_tlbs(kvm);
> +out:
> +	mutex_unlock(&kvm->slots_lock);
> +
> +	return r;
> +#else /* ARM64 */
>  	return -EINVAL;
> +#endif
>  }
>  
>  static int kvm_vm_ioctl_set_device_addr(struct kvm *kvm,
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 1e8b6a9..8137455 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -870,6 +870,28 @@ void kvm_mmu_wp_memory_region(struct kvm *kvm, int slot)
>  	spin_unlock(&kvm->mmu_lock);
>  	kvm_flush_remote_tlbs(kvm);
>  }
> +
> +/**
> + * kvm_arch_mmu_write_protect_pt_masked() - write protect dirty pages
> + * @kvm:	The KVM pointer
> + * @slot:	The memory slot associated with mask
> + * @gfn_offset:	The gfn offset in memory slot
> + * @mask:	The mask of dirty pages at offset 'gfn_offset' in this memory
> + *              slot to be write protected
> + *
> + * Walks bits set in mask write protects the associated pte's. Caller must
> + * acquire kvm_mmu_lock.
> + */
> +void kvm_arch_mmu_write_protect_pt_masked(struct kvm *kvm,
> +		struct kvm_memory_slot *slot,
> +		gfn_t gfn_offset, unsigned long mask)
> +{
> +	phys_addr_t base_gfn = slot->base_gfn + gfn_offset;
> +	phys_addr_t start = (base_gfn +  __ffs(mask)) << PAGE_SHIFT;
> +	phys_addr_t end = (base_gfn + __fls(mask) + 1) << PAGE_SHIFT;
> +
> +	stage2_wp_range(kvm, start, end);
> +}
>  #endif
>  
>  static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa,
> -- 
> 1.7.9.5
> 

WARNING: multiple messages have this Message-ID (diff)
From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v14 6/7] KVM: arm: dirty logging write protect support
Date: Sat, 22 Nov 2014 20:40:59 +0100	[thread overview]
Message-ID: <20141122194059.GO3401@cbox> (raw)
In-Reply-To: <1415930268-7674-7-git-send-email-m.smarduch@samsung.com>

On Thu, Nov 13, 2014 at 05:57:47PM -0800, Mario Smarduch wrote:
> Add support to track dirty pages between user space KVM_GET_DIRTY_LOG ioctl
> calls. We call kvm_get_dirty_log_protect() function to do most of the work.
> 
> Reviewed-by: Marc Zyngier <marc.zyngier@arm.com>
> Signed-off-by: Mario Smarduch <m.smarduch@samsung.com>
> ---
>  arch/arm/kvm/Kconfig |    1 +
>  arch/arm/kvm/arm.c   |   46 ++++++++++++++++++++++++++++++++++++++++++++++
>  arch/arm/kvm/mmu.c   |   22 ++++++++++++++++++++++
>  3 files changed, 69 insertions(+)
> 
> diff --git a/arch/arm/kvm/Kconfig b/arch/arm/kvm/Kconfig
> index f27f336..a8d1ace 100644
> --- a/arch/arm/kvm/Kconfig
> +++ b/arch/arm/kvm/Kconfig
> @@ -24,6 +24,7 @@ config KVM
>  	select HAVE_KVM_ARCH_TLB_FLUSH_ALL
>  	select KVM_MMIO
>  	select KVM_ARM_HOST
> +	select KVM_GENERIC_DIRTYLOG_READ_PROTECT
>  	depends on ARM_VIRT_EXT && ARM_LPAE
>  	---help---
>  	  Support hosting virtualized guest machines. You will also
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index a99e0cd..040c0f3 100644
> --- a/arch/arm/kvm/arm.c
> +++ b/arch/arm/kvm/arm.c
> @@ -737,9 +737,55 @@ long kvm_arch_vcpu_ioctl(struct file *filp,
>  	}
>  }
>  
> +/**
> + * kvm_vm_ioctl_get_dirty_log - get and clear the log of dirty pages in a slot
> + * @kvm:	kvm instance
> + * @log:	slot id and address to which we copy the log
> + *
> + * We need to keep it in mind that VCPU threads can write to the bitmap
> + * concurrently.  So, to avoid losing data, we keep the following order for
> + * each bit:
> + *
> + *   1. Take a snapshot of the bit and clear it if needed.
> + *   2. Write protect the corresponding page.
> + *   3. Copy the snapshot to the userspace.
> + *   4. Flush TLB's if needed.
> + *
> + * Steps 1,2,3 are handled by kvm_get_dirty_log_protect().
> + * Between 2 and 4, the guest may write to the page using the remaining TLB
> + * entry.  This is not a problem because the page is reported dirty using
> + * the snapshot taken before and step 4 ensures that writes done after
> + * exiting to userspace will be logged for the next call.
> + */
>  int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
>  {
> +#ifdef CONFIG_ARM
> +	int r;
> +	bool is_dirty = false;
> +
> +	mutex_lock(&kvm->slots_lock);
> +
> +	r = kvm_get_dirty_log_protect(kvm, log, &is_dirty);
> +	if (r)
> +		goto out;
> +
> +	/*
> +	 * kvm_get_dirty_log_protect() may fail and we may skip TLB flush
> +	 * leaving few stale spte TLB entries which is harmless, given we're
> +	 * just write protecting spte's, so few stale TLB's will be left in
> +	 * original R/W state. And since the bitmap is corrupt userspace will
> +	 * error out anyway (i.e. during migration or dirty page loging for

s/loging/logging/

Hmmm, where is this behavior specified in the ABI?  If you call
KVM_GET_DIRTY_LOG subsequently, you will now potentially have unreported
dirty pages, which can be completely avoided by removing the
if-statement and the goto above.  Why not simply do that and get rid of
this comment?

> +	 * other reasons) terminating dirty page logging.
> +	 */
> +	if (is_dirty)
> +		kvm_flush_remote_tlbs(kvm);
> +out:
> +	mutex_unlock(&kvm->slots_lock);
> +
> +	return r;
> +#else /* ARM64 */
>  	return -EINVAL;
> +#endif
>  }
>  
>  static int kvm_vm_ioctl_set_device_addr(struct kvm *kvm,
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 1e8b6a9..8137455 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -870,6 +870,28 @@ void kvm_mmu_wp_memory_region(struct kvm *kvm, int slot)
>  	spin_unlock(&kvm->mmu_lock);
>  	kvm_flush_remote_tlbs(kvm);
>  }
> +
> +/**
> + * kvm_arch_mmu_write_protect_pt_masked() - write protect dirty pages
> + * @kvm:	The KVM pointer
> + * @slot:	The memory slot associated with mask
> + * @gfn_offset:	The gfn offset in memory slot
> + * @mask:	The mask of dirty pages at offset 'gfn_offset' in this memory
> + *              slot to be write protected
> + *
> + * Walks bits set in mask write protects the associated pte's. Caller must
> + * acquire kvm_mmu_lock.
> + */
> +void kvm_arch_mmu_write_protect_pt_masked(struct kvm *kvm,
> +		struct kvm_memory_slot *slot,
> +		gfn_t gfn_offset, unsigned long mask)
> +{
> +	phys_addr_t base_gfn = slot->base_gfn + gfn_offset;
> +	phys_addr_t start = (base_gfn +  __ffs(mask)) << PAGE_SHIFT;
> +	phys_addr_t end = (base_gfn + __fls(mask) + 1) << PAGE_SHIFT;
> +
> +	stage2_wp_range(kvm, start, end);
> +}
>  #endif
>  
>  static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa,
> -- 
> 1.7.9.5
> 

WARNING: multiple messages have this Message-ID (diff)
From: Christoffer Dall <christoffer.dall@linaro.org>
To: Mario Smarduch <m.smarduch@samsung.com>
Cc: pbonzini@redhat.com, james.hogan@imgtec.com, agraf@suse.de,
	marc.zyngier@arm.com, cornelia.huck@de.ibm.com,
	borntraeger@de.ibm.com, catalin.marinas@arm.com,
	kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org,
	kvm-ppc@vger.kernel.org, kvm-ia64@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org, steve.capper@arm.com,
	peter.maydell@linaro.org
Subject: Re: [PATCH v14 6/7] KVM: arm: dirty logging write protect support
Date: Sat, 22 Nov 2014 20:40:59 +0100	[thread overview]
Message-ID: <20141122194059.GO3401@cbox> (raw)
In-Reply-To: <1415930268-7674-7-git-send-email-m.smarduch@samsung.com>

On Thu, Nov 13, 2014 at 05:57:47PM -0800, Mario Smarduch wrote:
> Add support to track dirty pages between user space KVM_GET_DIRTY_LOG ioctl
> calls. We call kvm_get_dirty_log_protect() function to do most of the work.
> 
> Reviewed-by: Marc Zyngier <marc.zyngier@arm.com>
> Signed-off-by: Mario Smarduch <m.smarduch@samsung.com>
> ---
>  arch/arm/kvm/Kconfig |    1 +
>  arch/arm/kvm/arm.c   |   46 ++++++++++++++++++++++++++++++++++++++++++++++
>  arch/arm/kvm/mmu.c   |   22 ++++++++++++++++++++++
>  3 files changed, 69 insertions(+)
> 
> diff --git a/arch/arm/kvm/Kconfig b/arch/arm/kvm/Kconfig
> index f27f336..a8d1ace 100644
> --- a/arch/arm/kvm/Kconfig
> +++ b/arch/arm/kvm/Kconfig
> @@ -24,6 +24,7 @@ config KVM
>  	select HAVE_KVM_ARCH_TLB_FLUSH_ALL
>  	select KVM_MMIO
>  	select KVM_ARM_HOST
> +	select KVM_GENERIC_DIRTYLOG_READ_PROTECT
>  	depends on ARM_VIRT_EXT && ARM_LPAE
>  	---help---
>  	  Support hosting virtualized guest machines. You will also
> diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c
> index a99e0cd..040c0f3 100644
> --- a/arch/arm/kvm/arm.c
> +++ b/arch/arm/kvm/arm.c
> @@ -737,9 +737,55 @@ long kvm_arch_vcpu_ioctl(struct file *filp,
>  	}
>  }
>  
> +/**
> + * kvm_vm_ioctl_get_dirty_log - get and clear the log of dirty pages in a slot
> + * @kvm:	kvm instance
> + * @log:	slot id and address to which we copy the log
> + *
> + * We need to keep it in mind that VCPU threads can write to the bitmap
> + * concurrently.  So, to avoid losing data, we keep the following order for
> + * each bit:
> + *
> + *   1. Take a snapshot of the bit and clear it if needed.
> + *   2. Write protect the corresponding page.
> + *   3. Copy the snapshot to the userspace.
> + *   4. Flush TLB's if needed.
> + *
> + * Steps 1,2,3 are handled by kvm_get_dirty_log_protect().
> + * Between 2 and 4, the guest may write to the page using the remaining TLB
> + * entry.  This is not a problem because the page is reported dirty using
> + * the snapshot taken before and step 4 ensures that writes done after
> + * exiting to userspace will be logged for the next call.
> + */
>  int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
>  {
> +#ifdef CONFIG_ARM
> +	int r;
> +	bool is_dirty = false;
> +
> +	mutex_lock(&kvm->slots_lock);
> +
> +	r = kvm_get_dirty_log_protect(kvm, log, &is_dirty);
> +	if (r)
> +		goto out;
> +
> +	/*
> +	 * kvm_get_dirty_log_protect() may fail and we may skip TLB flush
> +	 * leaving few stale spte TLB entries which is harmless, given we're
> +	 * just write protecting spte's, so few stale TLB's will be left in
> +	 * original R/W state. And since the bitmap is corrupt userspace will
> +	 * error out anyway (i.e. during migration or dirty page loging for

s/loging/logging/

Hmmm, where is this behavior specified in the ABI?  If you call
KVM_GET_DIRTY_LOG subsequently, you will now potentially have unreported
dirty pages, which can be completely avoided by removing the
if-statement and the goto above.  Why not simply do that and get rid of
this comment?

> +	 * other reasons) terminating dirty page logging.
> +	 */
> +	if (is_dirty)
> +		kvm_flush_remote_tlbs(kvm);
> +out:
> +	mutex_unlock(&kvm->slots_lock);
> +
> +	return r;
> +#else /* ARM64 */
>  	return -EINVAL;
> +#endif
>  }
>  
>  static int kvm_vm_ioctl_set_device_addr(struct kvm *kvm,
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 1e8b6a9..8137455 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -870,6 +870,28 @@ void kvm_mmu_wp_memory_region(struct kvm *kvm, int slot)
>  	spin_unlock(&kvm->mmu_lock);
>  	kvm_flush_remote_tlbs(kvm);
>  }
> +
> +/**
> + * kvm_arch_mmu_write_protect_pt_masked() - write protect dirty pages
> + * @kvm:	The KVM pointer
> + * @slot:	The memory slot associated with mask
> + * @gfn_offset:	The gfn offset in memory slot
> + * @mask:	The mask of dirty pages at offset 'gfn_offset' in this memory
> + *              slot to be write protected
> + *
> + * Walks bits set in mask write protects the associated pte's. Caller must
> + * acquire kvm_mmu_lock.
> + */
> +void kvm_arch_mmu_write_protect_pt_masked(struct kvm *kvm,
> +		struct kvm_memory_slot *slot,
> +		gfn_t gfn_offset, unsigned long mask)
> +{
> +	phys_addr_t base_gfn = slot->base_gfn + gfn_offset;
> +	phys_addr_t start = (base_gfn +  __ffs(mask)) << PAGE_SHIFT;
> +	phys_addr_t end = (base_gfn + __fls(mask) + 1) << PAGE_SHIFT;
> +
> +	stage2_wp_range(kvm, start, end);
> +}
>  #endif
>  
>  static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa,
> -- 
> 1.7.9.5
> 

  reply	other threads:[~2014-11-22 19:40 UTC|newest]

Thread overview: 104+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-11-14  1:57 [PATCH v14 6/7] KVM: arm: dirty logging write protect support Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-22 19:40 ` Christoffer Dall [this message]
2014-11-22 19:40   ` Christoffer Dall
2014-11-22 19:40   ` Christoffer Dall
2014-11-22 19:40   ` Christoffer Dall
2014-11-24 18:47 ` Mario Smarduch
2014-11-24 18:47   ` Mario Smarduch
2014-11-24 18:47   ` Mario Smarduch
2014-11-24 18:47   ` Mario Smarduch
  -- strict thread matches above, loose matches on Subject: below --
2014-11-14  1:57 [PATCH v14 7/7] KVM: arm: page logging 2nd stage fault handling Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14 16:45 ` Marc Zyngier
2014-11-14 16:45   ` Marc Zyngier
2014-11-14 16:45   ` Marc Zyngier
2014-11-14 16:45   ` Marc Zyngier
2014-11-14 18:53 ` Mario Smarduch
2014-11-14 18:53   ` Mario Smarduch
2014-11-14 18:53   ` Mario Smarduch
2014-11-14 18:53   ` Mario Smarduch
2014-11-14  1:57 [PATCH v14 5/7] KVM: arm: Add initial dirty page locking support Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-22 19:33 ` Christoffer Dall
2014-11-22 19:33   ` Christoffer Dall
2014-11-22 19:33   ` Christoffer Dall
2014-11-22 19:33   ` Christoffer Dall
2014-11-24 18:44 ` Mario Smarduch
2014-11-24 18:44   ` Mario Smarduch
2014-11-24 18:44   ` Mario Smarduch
2014-11-24 18:44   ` Mario Smarduch
2014-11-14  1:57 [PATCH v14 4/7] KVM: arm: Add ARMv7 API to flush TLBs Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 [PATCH v14 3/7] KVM: x86: switch to kvm_get_dirty_log_protect Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  2:06 ` Mario Smarduch
2014-11-14  2:06   ` Mario Smarduch
2014-11-14  2:06   ` Mario Smarduch
2014-11-14  2:06   ` Mario Smarduch
2014-11-14 10:03 ` Paolo Bonzini
2014-11-14 10:03   ` Paolo Bonzini
2014-11-14 10:03   ` Paolo Bonzini
2014-11-14 10:03   ` Paolo Bonzini
2014-11-22 19:19 ` Christoffer Dall
2014-11-22 19:19   ` Christoffer Dall
2014-11-22 19:19   ` Christoffer Dall
2014-11-22 19:19   ` Christoffer Dall
2014-11-24 18:35 ` Mario Smarduch
2014-11-24 18:35   ` Mario Smarduch
2014-11-24 18:35   ` Mario Smarduch
2014-11-24 18:35   ` Mario Smarduch
2014-12-08 23:12 ` Mario Smarduch
2014-12-08 23:12   ` Mario Smarduch
2014-12-08 23:12   ` Mario Smarduch
2014-12-08 23:12   ` Mario Smarduch
2014-12-09 19:42 ` Paolo Bonzini
2014-12-09 19:42   ` Paolo Bonzini
2014-12-09 19:42   ` Paolo Bonzini
2014-12-09 19:42   ` Paolo Bonzini
2014-11-14  1:57 [PATCH v14 2/7] KVM: Add generic support for dirty page logging Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-22 19:13 ` Christoffer Dall
2014-11-22 19:13   ` Christoffer Dall
2014-11-22 19:13   ` Christoffer Dall
2014-11-22 19:13   ` Christoffer Dall
2014-11-14  1:57 [PATCH v14 1/7] KVM: Add architecture-defined TLB flush support Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-22 17:08 ` Christoffer Dall
2014-11-22 17:08   ` Christoffer Dall
2014-11-22 17:08   ` Christoffer Dall
2014-11-22 17:08   ` Christoffer Dall
2014-11-14  1:57 [PATCH v14 0/7] KVM/arm/x86: dirty page logging for ARMv7 (3.17.0-rc1) Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  1:57 ` Mario Smarduch
2014-11-14  8:06 ` Cornelia Huck
2014-11-14  8:06   ` Cornelia Huck
2014-11-14  8:06   ` Cornelia Huck
2014-11-14  8:06   ` Cornelia Huck
2014-11-14 18:57 ` Mario Smarduch
2014-11-14 18:57   ` Mario Smarduch
2014-11-14 18:57   ` Mario Smarduch
2014-11-14 18:57   ` Mario Smarduch
2014-11-25 10:22 ` Christoffer Dall
2014-11-25 10:22   ` Christoffer Dall
2014-11-25 10:22   ` Christoffer Dall
2014-11-25 10:22   ` Christoffer Dall
2014-11-25 21:57 ` Mario Smarduch
2014-11-25 21:57   ` Mario Smarduch
2014-11-25 21:57   ` Mario Smarduch
2014-11-25 21:57   ` Mario Smarduch

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20141122194059.GO3401@cbox \
    --to=christoffer.dall@linaro.org \
    --cc=kvm-ia64@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.