Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp279111pxb; Wed, 18 Aug 2021 02:05:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJySpMWacR3XRxZLrL2LGjHJE8kpXjtupfg74AF6ebaNItsTa6Pir1vqOebHPSCi69antoVE X-Received: by 2002:a17:906:a18f:: with SMTP id s15mr315153ejy.269.1629277528271; Wed, 18 Aug 2021 02:05:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629277528; cv=none; d=google.com; s=arc-20160816; b=gUZqVijb7+1pUtd/YcYNJoIrdDIT9oO1Ac6EH2Sesejpe6KqvESulnJvtC3U86D2Xv etcnCGkwnRWTGWGzU7DdvkjiExMYQNLOjOb5lEoWFOoBUuoPhqncTqUTsaPE+ExiyIo9 iuzAGzQqeFF6IhmXSP7H5ksKIQMh0D1vXirQ96xu+4S6k0PAdVuZsfHa3SYmxf82oMxL C6k7JwPh/GZ6JVK47J+77M3X/pxXZip0Q6jyeFhfy4VFiycO/D11KNm1sXsjxeke/NU+ ZShDb5pwoW4l+Wi4WCnixjxdEhGmc2qmYWYYzwB0OS/B11cre6TU3lY/dRAaF8XSMmYd hwqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=koZyDJ5M5B8mJGjjUNX6ImXe8elhxJEcIzpkDgjwuBI=; b=Lkwe+WSD3iFqrMCOmMYPz1opa0305uQi6qF+FQbl9Do+2AF2lrHXlbQGnpUFw1Qmo4 ncsEGcdLI6JAJK7yGqQW8RDj1ELphB81y6YHOFQtkt1BG3Yrp35t/E/uYUWYtk/ja2rZ TbCID2DuFcIKWxmr000DxsvlidX3NN9Ltja0fsAcMTWkBj1Pq/gEdozdGYroH7FewOeA r9/awgQwu7VL/TYMN3nZ83gJitDXZNq+Te6rL7KwCQWIUt5GPKR9Bwm/5A1fpidfzLRq me1YypUkMeTUeEdpknDLqXagUIxpyxeLpSe/8FJrQBDf3OgxlMw9PbSW5ST6nKaQzTfo kWhw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=sF4VTXbb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w16si5502380ejb.337.2021.08.18.02.05.03; Wed, 18 Aug 2021 02:05:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=sF4VTXbb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230412AbhHRJAv (ORCPT + 99 others); Wed, 18 Aug 2021 05:00:51 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:1098 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230344AbhHRJAt (ORCPT ); Wed, 18 Aug 2021 05:00:49 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17I8Zf1n077928; Wed, 18 Aug 2021 05:00:15 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=koZyDJ5M5B8mJGjjUNX6ImXe8elhxJEcIzpkDgjwuBI=; b=sF4VTXbbEVuJCun4EYhS6vp/thcQg4eogzm0qc0BEDoGHKrEFXG5IS64lPU0nE0JC8xl 2ep35x6j8p5Pm8WqmREeIQhq9FM/kf4NHqmoaJXEMomnkj+OoHeefcGP5/8tMKcx9F6v IbOac10qaDOEcSCUo63icVRxIKHIheVH+NJYgaANfwqzJFZHjR4fVlaEuJDZ1LIwN4el 3kiC7b9ijW3EQdofbJ+PAX0m6uy3nT+w6NxwABq8wjodcA+UTIHEX0K3uqN9/pgnd2hK Zo3f9Iops05iRBuh7dVmsdjL3K26m3hlGM0l0zIB3jUMoMFwJ45v8PmddqqnPQQcctUm Gw== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3agcf67fbp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 18 Aug 2021 05:00:14 -0400 Received: from m0098410.ppops.net (m0098410.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 17I8ccXo085286; Wed, 18 Aug 2021 05:00:14 -0400 Received: from ppma06fra.de.ibm.com (48.49.7a9f.ip4.static.sl-reverse.com [159.122.73.72]) by mx0a-001b2d01.pphosted.com with ESMTP id 3agcf67fa3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 18 Aug 2021 05:00:14 -0400 Received: from pps.filterd (ppma06fra.de.ibm.com [127.0.0.1]) by ppma06fra.de.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 17I8wQIp027686; Wed, 18 Aug 2021 09:00:11 GMT Received: from b06cxnps4074.portsmouth.uk.ibm.com (d06relay11.portsmouth.uk.ibm.com [9.149.109.196]) by ppma06fra.de.ibm.com with ESMTP id 3ae53hded1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 18 Aug 2021 09:00:11 +0000 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 17I907Rk50463196 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 18 Aug 2021 09:00:07 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7D5E411C058; Wed, 18 Aug 2021 09:00:07 +0000 (GMT) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9021E11C073; Wed, 18 Aug 2021 09:00:06 +0000 (GMT) Received: from li-7e0de7cc-2d9d-11b2-a85c-de26c016e5ad.ibm.com (unknown [9.171.50.49]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 18 Aug 2021 09:00:06 +0000 (GMT) Subject: Re: [PATCH 1/2] KVM: s390: gaccess: Cleanup access to guest frames To: David Hildenbrand , Janis Schoetterl-Glausch , kvm@vger.kernel.org, borntraeger@de.ibm.com, frankja@linux.ibm.com, imbrenda@linux.ibm.com, Heiko Carstens , Vasily Gorbik Cc: cohuck@redhat.com, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org References: <20210816150718.3063877-1-scgl@linux.ibm.com> <20210816150718.3063877-2-scgl@linux.ibm.com> From: Janis Schoetterl-Glausch Message-ID: <3326a23b-be19-4461-6268-809d4ed194e8@linux.vnet.ibm.com> Date: Wed, 18 Aug 2021 11:00:06 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: wmzpbC0jIajJkIWG-rhofcUhKMMC6FRQ X-Proofpoint-GUID: nLpErGr8BYpo90rsZOXxLoVSZthVwYJw X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391,18.0.790 definitions=2021-08-18_03:2021-08-17,2021-08-18 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 spamscore=0 mlxscore=0 suspectscore=0 phishscore=0 adultscore=0 priorityscore=1501 bulkscore=0 clxscore=1015 mlxlogscore=999 lowpriorityscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108180052 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/18/21 9:54 AM, David Hildenbrand wrote: > On 16.08.21 17:07, Janis Schoetterl-Glausch wrote: >> Introduce a helper function for guest frame access. >> Rewrite the calculation of the gpa and the length of the segment >> to be more readable. >> >> Signed-off-by: Janis Schoetterl-Glausch >> --- >>   arch/s390/kvm/gaccess.c | 48 +++++++++++++++++++++++++---------------- >>   1 file changed, 29 insertions(+), 19 deletions(-) >> >> diff --git a/arch/s390/kvm/gaccess.c b/arch/s390/kvm/gaccess.c >> index b9f85b2dc053..df83de0843de 100644 >> --- a/arch/s390/kvm/gaccess.c >> +++ b/arch/s390/kvm/gaccess.c >> @@ -827,11 +827,26 @@ static int guest_page_range(struct kvm_vcpu *vcpu, unsigned long ga, u8 ar, >>       return 0; >>   } >>   +static int access_guest_frame(struct kvm *kvm, enum gacc_mode mode, gpa_t gpa, >> +                  void *data, unsigned int len) > > I know, "frame" is a beautiful term for "page" -- can we just avoid using it because we're not using it anywhere else here? :) > > What's wrong with "access_guest_page()" ? Ok, I'll use page for consistency's sake. > > >> +{ >> +    gfn_t gfn = gpa_to_gfn(gpa); >> +    unsigned int offset = offset_in_page(gpa); >> +    int rc; > > You could turn both const. You might want to consider reverse-christmas-treeing this. Ok > >> + >> +    if (mode == GACC_STORE) >> +        rc = kvm_write_guest_page(kvm, gfn, data, offset, len); >> +    else >> +        rc = kvm_read_guest_page(kvm, gfn, data, offset, len); > > Personally, I prefer passing in pfn + offset instead of a gpa. Also avoids having to convert back and forth. In access_guest_real we get back the gpa directly from the translation function. After the next patch the same is true for access_guest. So using gpas everywhere is nicer. And if we were to introduce a len_in_page function the offset would not even show up as an intermediary. > >> +    return rc; >> +} >> + >>   int access_guest(struct kvm_vcpu *vcpu, unsigned long ga, u8 ar, void *data, >>            unsigned long len, enum gacc_mode mode) >>   { >>       psw_t *psw = &vcpu->arch.sie_block->gpsw; >> -    unsigned long _len, nr_pages, gpa, idx; >> +    unsigned long nr_pages, gpa, idx; >> +    unsigned int seg; > > Dito, reverse christmas tree might be worth keeping. > >>       unsigned long pages_array[2]; >>       unsigned long *pages; >>       int need_ipte_lock; >> @@ -855,15 +870,12 @@ int access_guest(struct kvm_vcpu *vcpu, unsigned long ga, u8 ar, void *data, >>           ipte_lock(vcpu); >>       rc = guest_page_range(vcpu, ga, ar, pages, nr_pages, asce, mode); >>       for (idx = 0; idx < nr_pages && !rc; idx++) { >> -        gpa = *(pages + idx) + (ga & ~PAGE_MASK); >> -        _len = min(PAGE_SIZE - (gpa & ~PAGE_MASK), len); >> -        if (mode == GACC_STORE) >> -            rc = kvm_write_guest(vcpu->kvm, gpa, data, _len); >> -        else >> -            rc = kvm_read_guest(vcpu->kvm, gpa, data, _len); >> -        len -= _len; >> -        ga += _len; >> -        data += _len; >> +        gpa = pages[idx] + offset_in_page(ga); >> +        seg = min(PAGE_SIZE - offset_in_page(gpa), len); >> +        rc = access_guest_frame(vcpu->kvm, mode, gpa, data, seg); >> +        len -= seg; >> +        ga += seg; >> +        data += seg; >>       } >>       if (need_ipte_lock) >>           ipte_unlock(vcpu); >> @@ -875,19 +887,17 @@ int access_guest(struct kvm_vcpu *vcpu, unsigned long ga, u8 ar, void *data, >>   int access_guest_real(struct kvm_vcpu *vcpu, unsigned long gra, >>                 void *data, unsigned long len, enum gacc_mode mode) >>   { >> -    unsigned long _len, gpa; >> +    unsigned long gpa; >> +    unsigned int seg; >>       int rc = 0; >>         while (len && !rc) { >>           gpa = kvm_s390_real_to_abs(vcpu, gra); >> -        _len = min(PAGE_SIZE - (gpa & ~PAGE_MASK), len); >> -        if (mode) >> -            rc = write_guest_abs(vcpu, gpa, data, _len); >> -        else >> -            rc = read_guest_abs(vcpu, gpa, data, _len); >> -        len -= _len; >> -        gra += _len; >> -        data += _len; >> +        seg = min(PAGE_SIZE - offset_in_page(gpa), len); > > What does "seg" mean? I certainly know when "len" means -- which is also what the function eats. > >> +        rc = access_guest_frame(vcpu->kvm, mode, gpa, data, seg); >> +        len -= seg; >> +        gra += seg; >> +        data += seg; >>       } >>       return rc; >>   } >> > >