Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp904417pxv; Fri, 25 Jun 2021 00:39:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjV4OkUPr5+M8Ne2qXELHT+kKaKC+rZMUIKbzq398qy2bDF1Bcs2O1qM4s5v75aN7HbfRV X-Received: by 2002:a17:906:4759:: with SMTP id j25mr9374250ejs.4.1624606779927; Fri, 25 Jun 2021 00:39:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624606779; cv=none; d=google.com; s=arc-20160816; b=CFLRK/kQqDZptRPkjRdhKk6pyG/kDfwoiP+5xd+pqYJcvYpk2cuC42kLkWdDfI+HN4 BNV8ry0mueuckyxC45kU3VJoCDxNRM1By1Ndj/yB3j2Y6G70NI4Z48QWaFOx7gCbGFUo /X49jYY+SmsqZm3hwHxxm3EQIHJm4ZqBHI0hW+cuoe6LCh/ulWuEt9N2rZJsN8PUquvl FgU23u4rQId718q+yFXY+CKa6R8hbDHEP16k8TtODn4SZ2YFqA6M3U4Bvwpo04oPRxSd DT4AHJ13pnbWIayv/b/oPuPJF8HECSQ6qMDcoF5xXCNTcQpO2U5/kWRhEZ+JneRgcl4c yhyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Fqk0DelF/G3CbqfbPGVAAboO/i2+VKjmNvuYbOFS18c=; b=jPnZnQRVn9DkjMreTQAlX838tskU3T6HzLzlRm3h8UziOHqg7zaWfbv098nKAUY28Y NCIbUlYjGGjvHQinyUPBViKMCDPd2GxFw2aiqEqJ9hP8ZNw6qGSTX0HEEgC9e0Okxizd Lg73Fd+HbBIc56a6aUwLx52LTRZqlIS8/ZUserRrMv++RHEFk4swKRVXcnMaDblkc07W TrtIsNLw2hBdTFd6j5qVdGpaYEUzBp8sm3eyapSXZAGxezFEcyUxVf6h0EKetz/zBylG X+StP73lqYTSGbvKzGJi6Bv5ECWCMPAgyTegt58BeMJtqh77CVFTZoxGrRHZsVzgDpSv QFxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MfQ9c0II; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id de47si5094923ejc.372.2021.06.25.00.39.16; Fri, 25 Jun 2021 00:39:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MfQ9c0II; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230267AbhFYHkL (ORCPT + 99 others); Fri, 25 Jun 2021 03:40:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48828 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230157AbhFYHkF (ORCPT ); Fri, 25 Jun 2021 03:40:05 -0400 Received: from mail-pg1-x534.google.com (mail-pg1-x534.google.com [IPv6:2607:f8b0:4864:20::534]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 55E78C06175F for ; Fri, 25 Jun 2021 00:37:44 -0700 (PDT) Received: by mail-pg1-x534.google.com with SMTP id a2so6871613pgi.6 for ; Fri, 25 Jun 2021 00:37:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Fqk0DelF/G3CbqfbPGVAAboO/i2+VKjmNvuYbOFS18c=; b=MfQ9c0IIzkrFE+VtmmcjNlao2nJ8ViQGBtFp/x/59KONu6gOH3Mwk5XrtXTblsxFVA 1mu4wyW2+1q33Y0q8K+qQlRULEPaJz0VOOS5NpFzA6uNw4HgpMvZ2kLnINHDWsIJVxVX MBdifgomPj+X+YQSA40dAjd9J57SbwAtlWJBo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Fqk0DelF/G3CbqfbPGVAAboO/i2+VKjmNvuYbOFS18c=; b=f+rKnu65vGwlAU5wYbYFhIFoTVk72tBJRioEtamO8oz2QJlmE73qmZXFrH6oTcAWp3 t33VMpbPxxkrqKceOE7xWdUfIBVNmskHg3gFC6irb/MQ+/TkIxdGwuc32BFQhFlok6lp nCQXuENv1H3SGrKA1FMdClKEXCmRvBIFSYGVhSFMJ4slgPHdk/YShx98hoJnxQKttB/y RAqgR3rTk/H1lnZgCKMkoruSg03DkKXlBp24pUC0cyLo9jTUAXxOIO3s8PiZc2pzl8o+ jANaSotTSCEHNEIL5qiiufXVDQNVcWW6dyrj7CLDKiZyXzJi+3g7sac/xh3Rh+oCYvhl N9lQ== X-Gm-Message-State: AOAM532ZPVCkVGxFZP4iAnVtYj0OBvdiEhbrp6K04DWa7CY52Yjua+Vw jS6V7YxO9OZS9bHiqqUopyaM7w== X-Received: by 2002:a63:b54:: with SMTP id a20mr8444200pgl.407.1624606663879; Fri, 25 Jun 2021 00:37:43 -0700 (PDT) Received: from localhost ([2401:fa00:8f:203:1492:9d4f:19fa:df61]) by smtp.gmail.com with UTF8SMTPSA id m18sm5284072pff.88.2021.06.25.00.37.38 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 25 Jun 2021 00:37:43 -0700 (PDT) From: David Stevens X-Google-Original-From: David Stevens To: Marc Zyngier , Huacai Chen , Aleksandar Markovic , Paul Mackerras , Paolo Bonzini , Nick Piggin Cc: James Morse , Alexandru Elisei , Suzuki K Poulose , Will Deacon , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Zhenyu Wang , Zhi Wang , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org, linux-mips@vger.kernel.org, kvm@vger.kernel.org, kvm-ppc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, intel-gvt-dev@lists.freedesktop.org, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, David Stevens Subject: [PATCH v2 4/5] KVM: arm64/mmu: use gfn_to_pfn_page Date: Fri, 25 Jun 2021 16:36:15 +0900 Message-Id: <20210625073616.2184426-5-stevensd@google.com> X-Mailer: git-send-email 2.32.0.93.g670b81a890-goog In-Reply-To: <20210625073616.2184426-1-stevensd@google.com> References: <20210625073616.2184426-1-stevensd@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Stevens Covert usages of the deprecated gfn_to_pfn functions to the new gfn_to_pfn_page functions. Signed-off-by: David Stevens --- arch/arm64/kvm/mmu.c | 26 ++++++++++++++++---------- 1 file changed, 16 insertions(+), 10 deletions(-) diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c index c10207fed2f3..c29da690ed74 100644 --- a/arch/arm64/kvm/mmu.c +++ b/arch/arm64/kvm/mmu.c @@ -780,7 +780,7 @@ static bool fault_supports_stage2_huge_mapping(struct kvm_memory_slot *memslot, static unsigned long transparent_hugepage_adjust(struct kvm_memory_slot *memslot, unsigned long hva, kvm_pfn_t *pfnp, - phys_addr_t *ipap) + struct page **page, phys_addr_t *ipap) { kvm_pfn_t pfn = *pfnp; @@ -789,7 +789,7 @@ transparent_hugepage_adjust(struct kvm_memory_slot *memslot, * sure that the HVA and IPA are sufficiently aligned and that the * block map is contained within the memslot. */ - if (kvm_is_transparent_hugepage(pfn) && + if (*page && kvm_is_transparent_hugepage(pfn) && fault_supports_stage2_huge_mapping(memslot, hva, PMD_SIZE)) { /* * The address we faulted on is backed by a transparent huge @@ -810,10 +810,11 @@ transparent_hugepage_adjust(struct kvm_memory_slot *memslot, * page accordingly. */ *ipap &= PMD_MASK; - kvm_release_pfn_clean(pfn); + put_page(*page); pfn &= ~(PTRS_PER_PMD - 1); - kvm_get_pfn(pfn); *pfnp = pfn; + *page = pfn_to_page(pfn); + get_page(*page); return PMD_SIZE; } @@ -837,6 +838,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, short vma_shift; gfn_t gfn; kvm_pfn_t pfn; + struct page *page; bool logging_active = memslot_is_logging(memslot); unsigned long fault_level = kvm_vcpu_trap_get_fault_level(vcpu); unsigned long vma_pagesize, fault_granule; @@ -933,8 +935,8 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, */ smp_rmb(); - pfn = __gfn_to_pfn_memslot(memslot, gfn, false, NULL, - write_fault, &writable, NULL); + pfn = __gfn_to_pfn_page_memslot(memslot, gfn, false, NULL, + write_fault, &writable, NULL, &page); if (pfn == KVM_PFN_ERR_HWPOISON) { kvm_send_hwpoison_signal(hva, vma_shift); return 0; @@ -967,7 +969,8 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, */ if (vma_pagesize == PAGE_SIZE && !force_pte) vma_pagesize = transparent_hugepage_adjust(memslot, hva, - &pfn, &fault_ipa); + &pfn, &page, + &fault_ipa); if (writable) prot |= KVM_PGTABLE_PROT_W; @@ -999,14 +1002,17 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, /* Mark the page dirty only if the fault is handled successfully */ if (writable && !ret) { - kvm_set_pfn_dirty(pfn); + if (page) + kvm_set_pfn_dirty(pfn); mark_page_dirty_in_slot(kvm, memslot, gfn); } out_unlock: spin_unlock(&kvm->mmu_lock); - kvm_set_pfn_accessed(pfn); - kvm_release_pfn_clean(pfn); + if (page) { + kvm_set_pfn_accessed(pfn); + put_page(page); + } return ret != -EAGAIN ? ret : 0; } -- 2.32.0.93.g670b81a890-goog