From: Claudio Imbrenda <imbrenda@linux.ibm.com>
To: Alexander Gordeev <agordeev@linux.ibm.com>
Cc: kvm@vger.kernel.org, linux-s390@vger.kernel.org,
borntraeger@de.ibm.com, frankja@linux.ibm.com, nsg@linux.ibm.com,
nrb@linux.ibm.com, seiden@linux.ibm.com,
schlameuss@linux.ibm.com, hca@linux.ibm.com, svens@linux.ibm.com,
david@redhat.com, gerald.schaefer@linux.ibm.com
Subject: Re: [PATCH v2 05/20] KVM: s390: Add helper functions for fault handling
Date: Thu, 18 Sep 2025 17:10:50 +0200 [thread overview]
Message-ID: <20250918171050.7781b83d@p-imbrenda> (raw)
In-Reply-To: <4b67fe70-efc7-46cb-a160-51e4fc1bc54c-agordeev@linux.ibm.com>
On Thu, 18 Sep 2025 16:41:56 +0200
Alexander Gordeev <agordeev@linux.ibm.com> wrote:
> On Wed, Sep 10, 2025 at 08:07:31PM +0200, Claudio Imbrenda wrote:
> > Add some helper functions for handling multiple guest faults at the
> > same time.
> >
> > This will be needed for VSIE, where a nested guest access also needs to
> > access all the page tables that map it.
> >
> > Signed-off-by: Claudio Imbrenda <imbrenda@linux.ibm.com>
> > ---
> > arch/s390/kvm/gaccess.h | 14 ++++++++++
> > arch/s390/kvm/kvm-s390.c | 44 +++++++++++++++++++++++++++++++
> > arch/s390/kvm/kvm-s390.h | 56 ++++++++++++++++++++++++++++++++++++++++
> > 3 files changed, 114 insertions(+)
> >
> > diff --git a/arch/s390/kvm/gaccess.h b/arch/s390/kvm/gaccess.h
> > index 3fde45a151f2..9c82f7460821 100644
> > --- a/arch/s390/kvm/gaccess.h
> > +++ b/arch/s390/kvm/gaccess.h
> > @@ -457,4 +457,18 @@ int kvm_s390_check_low_addr_prot_real(struct kvm_vcpu *vcpu, unsigned long gra);
> > int kvm_s390_shadow_fault(struct kvm_vcpu *vcpu, struct gmap *shadow,
> > unsigned long saddr, unsigned long *datptr);
> >
> > +static inline int __kvm_s390_faultin_read_gpa(struct kvm *kvm, struct guest_fault *f, gpa_t gaddr,
> > + unsigned long *val)
> > +{
> > + phys_addr_t phys_addr;
> > + int rc;
> > +
> > + rc = __kvm_s390_faultin_gfn(kvm, f, gpa_to_gfn(gaddr), false);
>
> Why not a "typical" flow (below)?
>
> > + if (!rc) {
> > + phys_addr = PFN_PHYS(f->pfn) | offset_in_page(gaddr);
> > + *val = *(unsigned long *)phys_to_virt(phys_addr);
> > + }
> > + return rc;
>
> if (rc)
> return rc;
>
> phys_addr = pfn_to_phys(f->pfn) | offset_in_page(gaddr);
> *val = *(unsigned long *)phys_to_virt(phys_addr);
>
> return 0;
>
I swear, at some point it made more sense in the way I had written it :D
I'll fix it
> > +}
> > +
> > #endif /* __KVM_S390_GACCESS_H */
> > diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c
> > index 61aa64886c36..af8a62abec48 100644
> > --- a/arch/s390/kvm/kvm-s390.c
> > +++ b/arch/s390/kvm/kvm-s390.c
> > @@ -4858,6 +4858,50 @@ static void kvm_s390_assert_primary_as(struct kvm_vcpu *vcpu)
> > current->thread.gmap_int_code, current->thread.gmap_teid.val);
> > }
> >
> > +/**
> > + * __kvm_s390_faultin_gfn() - fault in and pin a guest address
> > + * @kvm: the guest
> > + * @guest_fault: will be filled with information on the pin operation
> > + * @gfn: guest frame
> > + * @wr: if true indicates a write access
> > + *
> > + * Fault in and pin a guest address using absolute addressing, and without
> > + * marking the page referenced.
> > + *
> > + * Context: Called with mm->mmap_lock in read mode.
> > + *
> > + * Return:
> > + * * 0 in case of success,
> > + * * -EFAULT if reading using the virtual address failed,
> > + * * -EINTR if a signal is pending,
> > + * * -EAGAIN if FOLL_NOWAIT was specified, but IO is needed
> > + * * PGM_ADDRESSING if the guest address lies outside of guest memory.
> > + */
> > +int __kvm_s390_faultin_gfn(struct kvm *kvm, struct guest_fault *guest_fault, gfn_t gfn, bool wr)
> > +{
> > + struct kvm_memory_slot *slot;
> > + kvm_pfn_t pfn;
> > + int foll;
> > +
> > + foll = wr ? FOLL_WRITE : 0;
> > + slot = gfn_to_memslot(kvm, gfn);
> > + pfn = __kvm_faultin_pfn(slot, gfn, foll, &guest_fault->writable, &guest_fault->page);
> > + if (is_noslot_pfn(pfn))
> > + return PGM_ADDRESSING;
> > + if (is_sigpending_pfn(pfn))
> > + return -EINTR;
> > + if (pfn == KVM_PFN_ERR_NEEDS_IO)
> > + return -EAGAIN;
> > + if (is_error_pfn(pfn))
> > + return -EFAULT;
> > +
> > + guest_fault->pfn = pfn;
> > + guest_fault->gfn = gfn;
> > + guest_fault->write_attempt = wr;
> > + guest_fault->valid = true;
> > + return 0;
> > +}
> > +
> > /*
> > * __kvm_s390_handle_dat_fault() - handle a dat fault for the gmap of a vcpu
> > * @vcpu: the vCPU whose gmap is to be fixed up
> > diff --git a/arch/s390/kvm/kvm-s390.h b/arch/s390/kvm/kvm-s390.h
> > index c44fe0c3a097..dabcf65f58ff 100644
> > --- a/arch/s390/kvm/kvm-s390.h
> > +++ b/arch/s390/kvm/kvm-s390.h
> > @@ -22,6 +22,15 @@
> >
> > #define KVM_S390_UCONTROL_MEMSLOT (KVM_USER_MEM_SLOTS + 0)
> >
> > +struct guest_fault {
> > + gfn_t gfn; /* Guest frame */
> > + kvm_pfn_t pfn; /* Host PFN */
> > + struct page *page; /* Host page */
> > + bool writable; /* Mapping is writable */
> > + bool write_attempt; /* Write access attempted */
> > + bool valid; /* This entry contains valid data */
> > +};
> > +
> > static inline void kvm_s390_fpu_store(struct kvm_run *run)
> > {
> > fpu_stfpc(&run->s.regs.fpc);
> > @@ -464,12 +473,59 @@ int kvm_s390_cpus_from_pv(struct kvm *kvm, u16 *rc, u16 *rrc);
> > int __kvm_s390_handle_dat_fault(struct kvm_vcpu *vcpu, gfn_t gfn, gpa_t gaddr, unsigned int flags);
> > int __kvm_s390_mprotect_many(struct gmap *gmap, gpa_t gpa, u8 npages, unsigned int prot,
> > unsigned long bits);
> > +int __kvm_s390_faultin_gfn(struct kvm *kvm, struct guest_fault *f, gfn_t gfn, bool wr);
> >
> > static inline int kvm_s390_handle_dat_fault(struct kvm_vcpu *vcpu, gpa_t gaddr, unsigned int flags)
> > {
> > return __kvm_s390_handle_dat_fault(vcpu, gpa_to_gfn(gaddr), gaddr, flags);
> > }
> >
> > +static inline void release_faultin_multiple(struct kvm *kvm, struct guest_fault *guest_faults,
> > + int n, bool ignore)
> > +{
> > + int i;
> > +
> > + for (i = 0; i < n; i++) {
> > + kvm_release_faultin_page(kvm, guest_faults[i].page, ignore,
> > + guest_faults[i].write_attempt);
> > + guest_faults[i].page = NULL;
> > + }
> > +}
> > +
> > +static inline bool __kvm_s390_multiple_faults_need_retry(struct kvm *kvm, unsigned long seq,
> > + struct guest_fault *guest_faults, int n,
> > + bool unsafe)
> > +{
> > + int i;
> > +
> > + for (i = 0; i < n; i++) {
> > + if (!guest_faults[i].valid)
> > + continue;
> > + if ((unsafe && mmu_invalidate_retry_gfn_unsafe(kvm, seq, guest_faults[i].gfn)) ||
> > + (!unsafe && mmu_invalidate_retry_gfn(kvm, seq, guest_faults[i].gfn))) {
> > + release_faultin_multiple(kvm, guest_faults, n, true);
> > + return true;
> > + }
> > + }
> > + return false;
> > +}
> > +
> > +static inline int __kvm_s390_faultin_gfn_range(struct kvm *kvm, struct guest_fault *guest_faults,
> > + gfn_t start, int n_pages, bool write_attempt)
> > +{
> > + int i, rc = 0;
> > +
> > + for (i = 0; !rc && i < n_pages; i++)
> > + rc = __kvm_s390_faultin_gfn(kvm, guest_faults + i, start + i, write_attempt);
> > + return rc;
> > +}
> > +
> > +#define release_faultin_array(kvm, array, ignore) \
> > + release_faultin_multiple(kvm, array, ARRAY_SIZE(array), ignore)
> > +
> > +#define __kvm_s390_fault_array_needs_retry(kvm, seq, array, unsafe) \
> > + __kvm_s390_multiple_faults_need_retry(kvm, seq, array, ARRAY_SIZE(array), unsafe)
> > +
> > /* implemented in diag.c */
> > int kvm_s390_handle_diag(struct kvm_vcpu *vcpu);
> >
> > --
> > 2.51.0
> >
next prev parent reply other threads:[~2025-09-18 15:10 UTC|newest]
Thread overview: 75+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-09-10 18:07 [PATCH v2 00/20] KVM: s390: gmap rewrite, the real deal Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 01/20] KVM: s390: add P bit in table entry bitfields, move union vaddress Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 02/20] s390: Move sske_frame() to a header Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 03/20] KVM: s390: Add gmap_helper_set_unused() Claudio Imbrenda
2025-09-11 8:38 ` Nico Boehr
2025-09-12 9:17 ` Nina Schoetterl-Glausch
2025-09-15 11:33 ` Claudio Imbrenda
2025-10-27 18:00 ` Nina Schoetterl-Glausch
2025-09-10 18:07 ` [PATCH v2 04/20] KVM: s390: Enable KVM_GENERIC_MMU_NOTIFIER Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 05/20] KVM: s390: Add helper functions for fault handling Claudio Imbrenda
2025-09-12 17:56 ` Nina Schoetterl-Glausch
2025-09-15 11:49 ` Claudio Imbrenda
2025-09-18 14:19 ` Alexander Gordeev
2025-09-18 14:46 ` Claudio Imbrenda
2025-09-18 14:41 ` Alexander Gordeev
2025-09-18 15:10 ` Claudio Imbrenda [this message]
2025-09-10 18:07 ` [PATCH v2 06/20] KVM: s390: Rename some functions in gaccess.c Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 07/20] KVM: s390: KVM-specific bitfields and helper functions Claudio Imbrenda
2025-09-17 12:18 ` Heiko Carstens
2025-09-17 12:51 ` Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 08/20] KVM: s390: KVM page table management functions: allocation Claudio Imbrenda
2025-09-11 8:22 ` Janosch Frank
2025-09-11 8:43 ` Claudio Imbrenda
2025-09-16 16:26 ` Heiko Carstens
2025-09-16 16:47 ` Claudio Imbrenda
2025-09-16 17:01 ` Christian Borntraeger
2025-09-16 17:05 ` Claudio Imbrenda
2025-09-16 17:06 ` Christian Borntraeger
2025-09-16 17:36 ` Heiko Carstens
2025-09-17 7:27 ` Heiko Carstens
2025-09-17 11:25 ` Claudio Imbrenda
2025-09-17 12:30 ` Heiko Carstens
2025-09-17 13:11 ` Claudio Imbrenda
2025-09-17 13:26 ` Christian Borntraeger
2025-09-17 14:00 ` Claudio Imbrenda
2025-09-17 14:05 ` Christian Borntraeger
2025-09-17 14:11 ` Claudio Imbrenda
2025-09-17 17:08 ` Claudio Imbrenda
2025-09-17 13:31 ` Heiko Carstens
2025-09-17 14:00 ` Claudio Imbrenda
2025-09-17 12:12 ` Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 09/20] KVM: s390: KVM page table management functions: clear and replace Claudio Imbrenda
2025-09-11 12:57 ` Janosch Frank
2025-09-11 13:19 ` Claudio Imbrenda
2025-09-11 13:27 ` Janosch Frank
2025-09-16 15:56 ` Heiko Carstens
2025-09-16 16:47 ` Heiko Carstens
2025-09-16 17:04 ` Claudio Imbrenda
2025-09-16 17:27 ` Heiko Carstens
2025-09-10 18:07 ` [PATCH v2 10/20] KVM: s390: KVM page table management functions: walks Claudio Imbrenda
2025-09-11 12:56 ` Janosch Frank
2025-09-11 13:14 ` Claudio Imbrenda
2025-09-12 5:47 ` Gerd Bayer
2025-09-16 16:22 ` Heiko Carstens
2025-09-16 16:48 ` Claudio Imbrenda
2025-09-16 17:24 ` Heiko Carstens
2025-09-17 11:14 ` Claudio Imbrenda
2025-09-17 12:55 ` Heiko Carstens
2025-09-17 13:13 ` Claudio Imbrenda
2025-09-17 13:24 ` Heiko Carstens
2025-09-17 14:01 ` Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 11/20] KVM: s390: KVM page table management functions: storage keys Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 12/20] KVM: s390: KVM page table management functions: lifecycle management Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 13/20] KVM: s390: KVM page table management functions: CMMA Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 14/20] KVM: s390: New gmap code Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 15/20] KVM: s390: Stop using CONFIG_PGSTE Claudio Imbrenda
2025-09-16 7:45 ` Steffen Eiden
2025-09-10 18:07 ` [PATCH v2 16/20] KVM: s390: Switch to new gmap Claudio Imbrenda
2025-09-17 13:20 ` Heiko Carstens
2025-09-10 18:07 ` [PATCH v2 17/20] KVM: s390: Remove gmap from s390/mm Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 18/20] KVM: S390: Remove PGSTE code from linux/s390 mm Claudio Imbrenda
2025-09-16 7:30 ` Steffen Eiden
2025-09-16 9:24 ` Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 19/20] KVM: s390: Enable 1M pages for gmap Claudio Imbrenda
2025-09-10 18:07 ` [PATCH v2 20/20] KVM: s390: Storage key manipulation IOCTL Claudio Imbrenda
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250918171050.7781b83d@p-imbrenda \
--to=imbrenda@linux.ibm.com \
--cc=agordeev@linux.ibm.com \
--cc=borntraeger@de.ibm.com \
--cc=david@redhat.com \
--cc=frankja@linux.ibm.com \
--cc=gerald.schaefer@linux.ibm.com \
--cc=hca@linux.ibm.com \
--cc=kvm@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=nrb@linux.ibm.com \
--cc=nsg@linux.ibm.com \
--cc=schlameuss@linux.ibm.com \
--cc=seiden@linux.ibm.com \
--cc=svens@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox