Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C4D02C05027 for ; Mon, 6 Feb 2023 22:34:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230080AbjBFWeM (ORCPT ); Mon, 6 Feb 2023 17:34:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49402 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229615AbjBFWeI (ORCPT ); Mon, 6 Feb 2023 17:34:08 -0500 Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com [IPv6:2a00:1450:4864:20::532]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0B86D16AC3 for ; Mon, 6 Feb 2023 14:34:04 -0800 (PST) Received: by mail-ed1-x532.google.com with SMTP id q19so13213218edd.2 for ; Mon, 06 Feb 2023 14:34:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=u8hK6aDnGas5wTwlB9YPUBcu6UkRBLvZchU/qDz76og=; b=EevNMgbk9U4T97qNlnWsGtygl8qMB7c4XLR9I/txerpfKx5PVnGRxFzigNSYs7NYZg WLgmPHL0+MGznlHVdb0ddRLKUJyqUHdugQk0gRwt1UYuhXblEQZ85W3IUHRrTXVuetsL 0CN5R/4jlN/IWKHVNjDjCNJmhX0ySRcbSLETCLsIXLBw4KKN865+2kA5Kr6biOc2NBU1 Xgbui+TwtpgQgW8WWcdDjhFSvxiCGbVcoXGih8/eceKXPUF0H6qTUSNAXjVpwUsVqyTj OM53iCOSNHIHsveRMv1xKw/3xqkXQqYGYmRBLslGn4BFiFqkQrXIGGLWmwTV/LkRg0Ld hl/w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=u8hK6aDnGas5wTwlB9YPUBcu6UkRBLvZchU/qDz76og=; b=N1MUiMTrTsbaZtWkpdFWF1TVVnTkS9ZCvj4kkX+q3KEEbwd8fVK8VyP1/W1sFWtihE 9kQXg3MgjNxWfVKD2DFcTLDn4I2/Y0EprrM/MgXSmhIJ/UlHiGWp8pxo+9WCQB9ERcN4 zxLwSxVafP6K/b62sj0akOD6r1qSuHyFWM85x06AEvu5KBR079ou3oVbMEcXPCikiRNR Fx7nxYxpsVjPe5DgQZCd7dKQNBimI7DvPjGkAHqizPDr9Udy4Q2GHnNSIv9rEOiKpS9i QrvQcccXEJKmZzzY6jI5GdPGsdo2N9diCp7xrTb4RgSschVpbFSefmzrIZBSuSGqCxUN s2mQ== X-Gm-Message-State: AO0yUKXYI4y/AQBp3MpUjmoQ8SMjY72+jKdD94pNxYlEvVQTH5OwL3u4 /af3oXuIXC2KqFf7+7taqkF/4KpItpf80SJBtORyb1vi7H7+4bo8 X-Google-Smtp-Source: AK7set+H3rGwLjh8NVvvnFI7Dml0OaOooCV26xcKw2FJTaXXdzG0Q/pEmu9yvXMetA9du1JlLANUA8H90NenyJlySqo= X-Received: by 2002:a50:cd17:0:b0:4a2:7833:e39c with SMTP id z23-20020a50cd17000000b004a27833e39cmr24934edi.3.1675722842269; Mon, 06 Feb 2023 14:34:02 -0800 (PST) MIME-Version: 1.0 References: <20230203192822.106773-1-vipinsh@google.com> <20230203192822.106773-6-vipinsh@google.com> In-Reply-To: <20230203192822.106773-6-vipinsh@google.com> From: Ben Gardon Date: Mon, 6 Feb 2023 14:33:50 -0800 Message-ID: Subject: Re: [Patch v2 5/5] KVM: x86/mmu: Merge all handle_changed_pte* functions. To: Vipin Sharma Cc: seanjc@google.com, pbonzini@redhat.com, dmatlack@google.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 3, 2023 at 11:28 AM Vipin Sharma wrote: > > __handle_changed_pte() and handle_changed_spte_acc_track() are always > used together. Merge these two functions and name the new function > handle_changed_pte(). Remove the existing handle_changed_pte() function > which just calls __handle_changed_pte and > handle_changed_spte_acc_track(). > > This converges SPTEs change handling code to a single place. > > Signed-off-by: Vipin Sharma Reviewed-by: Ben Gardon > --- > arch/x86/kvm/mmu/tdp_mmu.c | 42 +++++++++++--------------------------- > 1 file changed, 12 insertions(+), 30 deletions(-) > > diff --git a/arch/x86/kvm/mmu/tdp_mmu.c b/arch/x86/kvm/mmu/tdp_mmu.c > index afe0dcb1859e..9b0c81a28f97 100644 > --- a/arch/x86/kvm/mmu/tdp_mmu.c > +++ b/arch/x86/kvm/mmu/tdp_mmu.c > @@ -334,17 +334,6 @@ static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, > u64 old_spte, u64 new_spte, int level, > bool shared); > > -static void handle_changed_spte_acc_track(u64 old_spte, u64 new_spte, int level) > -{ > - if (!is_shadow_present_pte(old_spte) || !is_last_spte(old_spte, level)) > - return; > - > - if (is_accessed_spte(old_spte) && > - (!is_shadow_present_pte(new_spte) || !is_accessed_spte(new_spte) || > - spte_to_pfn(old_spte) != spte_to_pfn(new_spte))) > - kvm_set_pfn_accessed(spte_to_pfn(old_spte)); > -} > - > static void tdp_account_mmu_page(struct kvm *kvm, struct kvm_mmu_page *sp) > { > kvm_account_pgtable_pages((void *)sp->spt, +1); > @@ -487,7 +476,7 @@ static void handle_removed_pt(struct kvm *kvm, tdp_ptep_t pt, bool shared) > } > > /** > - * __handle_changed_spte - handle bookkeeping associated with an SPTE change > + * handle_changed_spte - handle bookkeeping associated with an SPTE change > * @kvm: kvm instance > * @as_id: the address space of the paging structure the SPTE was a part of > * @gfn: the base GFN that was mapped by the SPTE > @@ -501,9 +490,9 @@ static void handle_removed_pt(struct kvm *kvm, tdp_ptep_t pt, bool shared) > * Handle bookkeeping that might result from the modification of a SPTE. > * This function must be called for all TDP SPTE modifications. > */ > -static void __handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, > - u64 old_spte, u64 new_spte, int level, > - bool shared) > +static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, > + u64 old_spte, u64 new_spte, int level, > + bool shared) > { > bool was_present = is_shadow_present_pte(old_spte); > bool is_present = is_shadow_present_pte(new_spte); > @@ -587,15 +576,10 @@ static void __handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, > if (was_present && !was_leaf && > (is_leaf || !is_present || WARN_ON_ONCE(pfn_changed))) > handle_removed_pt(kvm, spte_to_child_pt(old_spte, level), shared); > -} > > -static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, > - u64 old_spte, u64 new_spte, int level, > - bool shared) > -{ > - __handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level, > - shared); > - handle_changed_spte_acc_track(old_spte, new_spte, level); > + if (was_leaf && is_accessed_spte(old_spte) && > + (!is_present || !is_accessed_spte(new_spte) || pfn_changed)) > + kvm_set_pfn_accessed(spte_to_pfn(old_spte)); > } > > /* > @@ -638,9 +622,8 @@ static inline int tdp_mmu_set_spte_atomic(struct kvm *kvm, > if (!try_cmpxchg64(sptep, &iter->old_spte, new_spte)) > return -EBUSY; > > - __handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte, > - new_spte, iter->level, true); > - handle_changed_spte_acc_track(iter->old_spte, new_spte, iter->level); > + handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte, > + new_spte, iter->level, true); > > return 0; > } > @@ -705,8 +688,7 @@ static u64 _tdp_mmu_set_spte(struct kvm *kvm, int as_id, tdp_ptep_t sptep, > > old_spte = kvm_tdp_mmu_write_spte(sptep, old_spte, new_spte, level); > > - __handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level, false); > - handle_changed_spte_acc_track(old_spte, new_spte, level); > + handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level, false); > return old_spte; > } > > @@ -1273,7 +1255,7 @@ static bool set_spte_gfn(struct kvm *kvm, struct tdp_iter *iter, > * Note, when changing a read-only SPTE, it's not strictly necessary to > * zero the SPTE before setting the new PFN, but doing so preserves the > * invariant that the PFN of a present * leaf SPTE can never change. > - * See __handle_changed_spte(). > + * See handle_changed_spte(). > */ > tdp_mmu_set_spte(kvm, iter, 0); > > @@ -1298,7 +1280,7 @@ bool kvm_tdp_mmu_set_spte_gfn(struct kvm *kvm, struct kvm_gfn_range *range) > /* > * No need to handle the remote TLB flush under RCU protection, the > * target SPTE _must_ be a leaf SPTE, i.e. cannot result in freeing a > - * shadow page. See the WARN on pfn_changed in __handle_changed_spte(). > + * shadow page. See the WARN on pfn_changed in handle_changed_spte(). > */ > return kvm_tdp_mmu_handle_gfn(kvm, range, set_spte_gfn); > } > -- > 2.39.1.519.gcb327c4b5f-goog >