Message ID | 20220906180930.230218-1-ricarkol@google.com (mailing list archive) |
---|---|
Headers | show |
Series | KVM: selftests: Add aarch64/page_fault_test | expand |
On Tue, 6 Sep 2022 18:09:17 +0000, Ricardo Koller wrote: > This series adds a new aarch64 selftest for testing stage 2 fault handling for > various combinations of guest accesses (e.g., write, S1PTW), backing sources > (e.g., anon), and types of faults (e.g., read on hugetlbfs with a hole, write > on a readonly memslot). Each test tries a different combination and then checks > that the access results in the right behavior (e.g., uffd faults with the right > address and write/read flag). Some interesting combinations are: > > [...] Given how long this has been around, I've picked this series up, applying Oliver's fixes in the process. Any additional fixes will be added on top. Applied to next, thanks! [01/13] KVM: selftests: Add a userfaultfd library commit: b9e9f0060d69ace412846b3dda318189e74d80ea [02/13] KVM: selftests: aarch64: Add virt_get_pte_hva() library function commit: b3e02786e384d83637fc29dca2af9604a6314e62 [03/13] KVM: selftests: Add missing close and munmap in __vm_mem_region_delete() commit: 77c071a5376c9fdc0c510138d081af5e6ead754d [04/13] KVM: selftests: aarch64: Construct DEFAULT_MAIR_EL1 using sysreg.h macros commit: a68c2b6545af95729eb57fe39f173557d1f22649 [05/13] tools: Copy bitfield.h from the kernel sources commit: 8998ed5834af0a9cc3de8d5bd485576c654620fc [06/13] KVM: selftests: Stash backing_src_type in struct userspace_mem_region commit: 20a8d07c0828592d72c756c98f2708e905bfabd3 [07/13] KVM: selftests: Change ____vm_create() to take struct kvm_vm_mem_params commit: cb7f9c457b94b2ad71eaf9621a9e7f3e9c3832db [08/13] KVM: selftests: Use the right memslot for code, page-tables, and data allocations commit: 72ad71ddb5fae4dc26a2fa7e885213598baab9ad [09/13] KVM: selftests: aarch64: Add aarch64/page_fault_test commit: fa7b86adf85be5de36a797df7b1509542af1f119 [10/13] KVM: selftests: aarch64: Add userfaultfd tests into page_fault_test commit: 596fcc0f6888241b0b2f02577a2b608f274b299d [11/13] KVM: selftests: aarch64: Add dirty logging tests into page_fault_test commit: 0740d435146f69be9950df5dd45a31fbaec943ba [12/13] KVM: selftests: aarch64: Add readonly memslot tests into page_fault_test commit: a9246644455d51faa4063749bb17aa7e060adc70 [13/13] KVM: selftests: aarch64: Add mix of tests into page_fault_test commit: 383d48a1442ca477732ea77d6231b3cc73b9d7f8 Cheers, M.
On Mon, Sep 19, 2022, Marc Zyngier wrote: > On Tue, 6 Sep 2022 18:09:17 +0000, Ricardo Koller wrote: > > This series adds a new aarch64 selftest for testing stage 2 fault handling for > > various combinations of guest accesses (e.g., write, S1PTW), backing sources > > (e.g., anon), and types of faults (e.g., read on hugetlbfs with a hole, write > > on a readonly memslot). Each test tries a different combination and then checks > > that the access results in the right behavior (e.g., uffd faults with the right > > address and write/read flag). Some interesting combinations are: > > > > [...] > > Given how long this has been around, I've picked this series up, applying > Oliver's fixes in the process. Any chance this can be undone? A big reason why this is at v6 is because of the common API changes, and due to KVM Forum I've effectively had three working days since this was posted, and others have probably had even less, i.e. lack of reviews on v6 isn't because no one cares. It's not the end of the world if we have to fix things up on top, but we'd avoid a decent amount of churn if we can instead unwind and do a v7.
On Mon, 19 Sep 2022 17:38:14 +0100, Sean Christopherson <seanjc@google.com> wrote: > > On Mon, Sep 19, 2022, Marc Zyngier wrote: > > On Tue, 6 Sep 2022 18:09:17 +0000, Ricardo Koller wrote: > > > This series adds a new aarch64 selftest for testing stage 2 fault handling for > > > various combinations of guest accesses (e.g., write, S1PTW), backing sources > > > (e.g., anon), and types of faults (e.g., read on hugetlbfs with a hole, write > > > on a readonly memslot). Each test tries a different combination and then checks > > > that the access results in the right behavior (e.g., uffd faults with the right > > > address and write/read flag). Some interesting combinations are: > > > > > > [...] > > > > Given how long this has been around, I've picked this series up, applying > > Oliver's fixes in the process. > > Any chance this can be undone? A big reason why this is at v6 is > because of the common API changes, and due to KVM Forum I've > effectively had three working days since this was posted, and others > have probably had even less, i.e. lack of reviews on v6 isn't > because no one cares. Hey, I'm still not back at work, and won't be for another week! But fair enough, if there is going to be a respin, I'd rather see that (and I'm less hung up on tests having been in -next for some time before sending out a PR that eventually reaches Linus). > It's not the end of the world if we have to fix things up on top, > but we'd avoid a decent amount of churn if we can instead unwind and > do a v7. No skin off my nose, as this leaves on its own topic branch. Now dropped. M.
On Mon, Sep 19, 2022 at 05:57:16PM +0100, Marc Zyngier wrote: > On Mon, 19 Sep 2022 17:38:14 +0100, > Sean Christopherson <seanjc@google.com> wrote: > > > > On Mon, Sep 19, 2022, Marc Zyngier wrote: > > > On Tue, 6 Sep 2022 18:09:17 +0000, Ricardo Koller wrote: > > > > This series adds a new aarch64 selftest for testing stage 2 fault handling for > > > > various combinations of guest accesses (e.g., write, S1PTW), backing sources > > > > (e.g., anon), and types of faults (e.g., read on hugetlbfs with a hole, write > > > > on a readonly memslot). Each test tries a different combination and then checks > > > > that the access results in the right behavior (e.g., uffd faults with the right > > > > address and write/read flag). Some interesting combinations are: > > > > > > > > [...] > > > > > > Given how long this has been around, I've picked this series up, applying > > > Oliver's fixes in the process. > > > > Any chance this can be undone? A big reason why this is at v6 is > > because of the common API changes, and due to KVM Forum I've > > effectively had three working days since this was posted, and others > > have probably had even less, i.e. lack of reviews on v6 isn't > > because no one cares. > > Hey, I'm still not back at work, and won't be for another week! But > fair enough, if there is going to be a respin, I'd rather see that > (and I'm less hung up on tests having been in -next for some time > before sending out a PR that eventually reaches Linus). > > > It's not the end of the world if we have to fix things up on top, > > but we'd avoid a decent amount of churn if we can instead unwind and > > do a v7. > > No skin off my nose, as this leaves on its own topic branch. Now > dropped. Thank you both. Yes, this will make our lives easier (including getting the changes internally). Ricardo > > M. > > -- > Without deviation from the norm, progress is not possible.