From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6ECE3ECAAA1 for ; Tue, 6 Sep 2022 10:25:15 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 055C280275; Tue, 6 Sep 2022 06:25:15 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 0051380224; Tue, 6 Sep 2022 06:25:14 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E0E7C80275; Tue, 6 Sep 2022 06:25:14 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id D224580224 for ; Tue, 6 Sep 2022 06:25:14 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id A3F691A144F for ; Tue, 6 Sep 2022 10:25:14 +0000 (UTC) X-FDA: 79881278148.07.36F3077 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf29.hostedemail.com (Postfix) with ESMTP id 05C881200A9 for ; Tue, 6 Sep 2022 10:25:13 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 155F2B816E9; Tue, 6 Sep 2022 10:25:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 475E7C433D6; Tue, 6 Sep 2022 10:25:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662459910; bh=fwdWXxkOf6zObdpX0HJXuD+AM10SlVrcgsu8arlimOY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=I4vqn6fRvpLmiK+9XggeElm/6brM7RrBg3cG40WM+1bkNPPcmJfhVUAb49TkfniC0 XPzBWsHGEiciIt7g+d28/sqf5bVQ2095mLIy4OxV+Q+1oQCpcwiyvfuhJORifZrGHk QSHUhJsmFGoQkukjOeDA77hAuz2UbnXWTAaY6c0OIk+ja24XqYmi2fuWb7t3Rz47wy DqbaWdTioguMGY4a+uJt/EuGsCkYiOA7+33IKVxqzZUL7dMsCRagbbswpjyONxz/MA zS+97k8SHoaLObL7HkjBbB3ogxOAQhiHPXET4r0h4OvwCWiwpH4CQTRRZZAZS0/Hli 6lNOSxYpCQHgg== Date: Tue, 6 Sep 2022 13:25:06 +0300 From: Jarkko Sakkinen To: Borislav Petkov Cc: Ashish Kalra , x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, michael.roth@amd.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, dgilbert@redhat.com Subject: Re: [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address Message-ID: References: <0ecb0a4781be933fcadeb56a85070818ef3566e7.1655761627.git.ashish.kalra@amd.com> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="R9s2JRGVgaAiidpN" Content-Disposition: inline In-Reply-To: ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1662459914; a=rsa-sha256; cv=none; b=v2HAxkadq+nZDtJH0HRKWfyChA6Gv5YEhJR+lN7Iby35vrIy3zPc/S7p/GfI10FUSgrsau FK6DifKfOiyQleVhp2Hkj+r/xKTIOqKcSWuuTuqVBsvyHd8qzW4eWYR7kAVWuxSuLSvFxK XCLEAwpejHa7Fv8afMoeQUZVUIrXLsc= ARC-Authentication-Results: i=1; imf29.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=I4vqn6fR; spf=pass (imf29.hostedemail.com: domain of jarkko@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=jarkko@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1662459914; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=JY6atBrHyz9VLLI3cmearLAEdKUC0y5JchJEbEUzPmY=; b=2gRCKVZc4U8FP4NcePpmAgpKPzBtwPkViQEnaaGYd79SsU9ACgzkYuRObtxNwOXpyzCUk/ c+eOVylFe+zDm/T4B78YhMkf2oBl+W+JdeDAbAmwZU9QKuAbrdgeK4IzjEAmdLhrWP0wgy 8FYEjQS0sAjjsoYuiLjFOCVlQpzvzlI= X-Stat-Signature: rmk6asi3xhmen418fahfhfuj5jk16dsz X-Rspamd-Queue-Id: 05C881200A9 Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=I4vqn6fR; spf=pass (imf29.hostedemail.com: domain of jarkko@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=jarkko@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-Rspamd-Server: rspam11 X-Rspam-User: X-HE-Tag: 1662459913-909122 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: --R9s2JRGVgaAiidpN Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Tue, Aug 09, 2022 at 06:55:43PM +0200, Borislav Petkov wrote: > On Mon, Jun 20, 2022 at 11:03:43PM +0000, Ashish Kalra wrote: > > + pfn = pte_pfn(*pte); > > + > > + /* If its large page then calculte the fault pfn */ > > + if (level > PG_LEVEL_4K) { > > + unsigned long mask; > > + > > + mask = pages_per_hpage(level) - pages_per_hpage(level - 1); > > + pfn |= (address >> PAGE_SHIFT) & mask; > > Oh boy, this is unnecessarily complicated. Isn't this > > pfn |= pud_index(address); > > or > pfn |= pmd_index(address); I played with this a bit and ended up with pfn = pte_pfn(*pte) | PFN_DOWN(address & page_level_mask(level - 1)); Unless I got something terribly wrong, this should do the same (see the attached patch) as the existing calculations. BR, Jarkko --R9s2JRGVgaAiidpN Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="0001-x86-fault-Simplify-PFN-calculation-in-handle_user_rm.patch" >From c92522f6199055cd609ddd785dc9d8e85153e3b4 Mon Sep 17 00:00:00 2001 From: Jarkko Sakkinen Date: Tue, 6 Sep 2022 09:51:59 +0300 Subject: [PATCH] x86/fault: Simplify PFN calculation in handle_user_rmp_fault() Use functions in asm/pgtable.h to calculate the PFN for the address inside PTE's page directory. PG_LEVEL_4K PTE's obviously do not have a page directory but it is not an issue as: page_level_mask(PG_LEVEL_4K - 1) == page_level_mask(PG_LEVEL_NONE) == 0 Signed-off-by: Jarkko Sakkinen --- arch/x86/mm/fault.c | 16 ++-------------- 1 file changed, 2 insertions(+), 14 deletions(-) diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index 6404ef73eb56..28b3f80611a3 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -1219,11 +1219,6 @@ do_kern_addr_fault(struct pt_regs *regs, unsigned long hw_error_code, } NOKPROBE_SYMBOL(do_kern_addr_fault); -static inline size_t pages_per_hpage(int level) -{ - return page_level_size(level) / PAGE_SIZE; -} - /* * Return 1 if the caller need to retry, 0 if it the address need to be split * in order to resolve the fault. @@ -1248,15 +1243,8 @@ static int handle_user_rmp_page_fault(struct pt_regs *regs, unsigned long error_ if (!pte || !pte_present(*pte)) return 1; - pfn = pte_pfn(*pte); - - /* If its large page then calculte the fault pfn */ - if (level > PG_LEVEL_4K) { - unsigned long mask; - - mask = pages_per_hpage(level) - pages_per_hpage(level - 1); - pfn |= (address >> PAGE_SHIFT) & mask; - } + /* Calculate PFN inside the page directory: */ + pfn = pte_pfn(*pte) | PFN_DOWN(address & page_level_mask(level - 1)); /* * If its a guest private page, then the fault cannot be resolved. -- 2.37.2 --R9s2JRGVgaAiidpN--