linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: Mark Brown <broonie@kernel.org>
To: Marc Zyngier <maz@kernel.org>
Cc: Oliver Upton <oliver.upton@linux.dev>,
	James Morse <james.morse@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	Zenghui Yu <yuzenghui@huawei.com>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Shuah Khan <shuah@kernel.org>,
	linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev,
	kvm@vger.kernel.org, linux-kselftest@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH] KVM: selftests: Add coverage of MTE system registers
Date: Sun, 12 Mar 2023 19:35:53 +0000	[thread overview]
Message-ID: <ZA4pmVALRVr0NuIU@sirena.org.uk> (raw)
In-Reply-To: <87v8j63rr0.wl-maz@kernel.org>


[-- Attachment #1.1: Type: text/plain, Size: 3069 bytes --]

On Sun, Mar 12, 2023 at 03:37:39PM +0000, Marc Zyngier wrote:
> Mark Brown <broonie@kernel.org> wrote:
> > On Sun, Mar 12, 2023 at 10:29:11AM +0000, Marc Zyngier wrote:
> > > Mark Brown <broonie@kernel.org> wrote:

> > combination just for the sake of it.  It's one of those areas
> > where it's hard to determine if there's an intent behind the
> > implementation choices made or if they're just whatever someone
> > happened to write and not particularly important or desired.

> It *is* desired. We've had cases of flags being reset at the wrong
> time and leading to issues that would be detected by this test. The
> PMU stuff is indeed one example, but similar things could happen
> between SVE+MTE, for example.

I take it you mean that the current situation where it's only
covering X and X+PMU cases is not desired and wasn't intentional?

> > > A good first step would be to be able to build these combinations
> > > dynamically, and only then add new sublists to the mix.

> > That would certainly be a good idea, if we were heading in that
> > direction I'd also expect negative tests checking that for
> > example pointer authentication registers don't appear when that's
> > not enabled.  I'm not sure that it's worth blocking all new
> > coverage for that though, there is still value in having a bit of
> > basic coverage even if not all the combinations are covered yet.

> Then where is the incentive to get it fixed? People will just keep
> piling stuff, and the coverage will increasingly become worse.

It's always possible someone will be interested and keep plugging
away at improving things over the longer term even without having
other work blocked.  Sometimes someone will come along explicitly
trying to improve whatever the thing is, or someone other than
the person submitting a given patch might see the idea being
mentioned and be inspired to implement it (that process is how we
ended up with the ALSA pcm-test program).

The flip side of this approach is that it's encouraging people to
do the minimum possible in order to reduce the chances that out
of scope cleanup work gets added on to whatever they were
originally trying to do, and to avoid doing smaller cleanups if
they notice anything else that could be improved (especially if
those things might resuling in something that'd tie up something
more urgent).  It's not a big deal if it's a small bit of extra
work, but the more work it is than the original thing the more of
an impact it can have.

It's a balancing thing - sometimes things do need some push to
get things done, but on the other hand if it's the only approach
taken then it can become a bit of a self fulfilling prophecy.

> We have to do it as some point, and now is as good a time as any.

Well, I was just doing a drive by patch here because I noticed
that MTE wasn't covered, it's not like I'm even looking at MTE.
Realistically I'm not sure how long it'll be before I have the
bandwidth for reworking this.  There is some other work where I'd
get blocked on it, but it's not going to be this release cycle.

[-- Attachment #1.2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

[-- Attachment #2: Type: text/plain, Size: 176 bytes --]

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

      reply	other threads:[~2023-03-12 19:37 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-08 17:12 [PATCH] KVM: selftests: Add coverage of MTE system registers Mark Brown
2023-03-09  9:07 ` Cornelia Huck
2023-03-12 10:29 ` Marc Zyngier
2023-03-12 14:35   ` Mark Brown
2023-03-12 15:37     ` Marc Zyngier
2023-03-12 19:35       ` Mark Brown [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ZA4pmVALRVr0NuIU@sirena.org.uk \
    --to=broonie@kernel.org \
    --cc=james.morse@arm.com \
    --cc=kvm@vger.kernel.org \
    --cc=kvmarm@lists.linux.dev \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-kselftest@vger.kernel.org \
    --cc=maz@kernel.org \
    --cc=oliver.upton@linux.dev \
    --cc=pbonzini@redhat.com \
    --cc=shuah@kernel.org \
    --cc=suzuki.poulose@arm.com \
    --cc=yuzenghui@huawei.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).