From nobody Sun Feb 8 12:37:04 2026 Received: from mail-pl1-f202.google.com (mail-pl1-f202.google.com [209.85.214.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 85967258CE2 for ; Tue, 7 Oct 2025 22:14:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.202 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1759875281; cv=none; b=PRyUIofzJy0939KVUkSZSWQkvMmY8poOK6e0ND6/k51l33/cCQj0uYeEiQ0+3w/dPW9fBuItkO+xOq4TXrZ965qrA3BwR9EU8/1akT/Tlp8ZyrsW8X/Tdya/d5H2wp1NbC2fvmtBm1FXO7XDZ73lhf13xA+avzwg/raPOqUC46k= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1759875281; c=relaxed/simple; bh=UIqBgwsb+vRNqfEauPUfOsNdF2dMfog0jQ1gcUf0ha8=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=UjulBNFvxky7zNbfUchNx0LUmegliPWRxOIRp15pjoAZ3v95ZcT14Kpebprlkkhj/szsvT33DiOAjd9Ie/lxeVghVSqeQJNgT4UUEnIFnAg1xq51bWMN0wNteHUQXqu9BEGATEd0ZodS1sP/lTN8MvrUwI99xSx9bTM+vS1SWuE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=St5gLDbT; arc=none smtp.client-ip=209.85.214.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="St5gLDbT" Received: by mail-pl1-f202.google.com with SMTP id d9443c01a7336-277f0ea6ee6so87745865ad.0 for ; Tue, 07 Oct 2025 15:14:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1759875279; x=1760480079; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=icsR5rcCxPu2mbO19M+4yBFFv/b0hAKJOcgfFqtENIY=; b=St5gLDbTcQhOJs48MPfPI3mZvE8mIUVkx/7HWgvPGmL2uCb5m64uILR0+8wWCzDY/O La3zDvWNEB23Coxo+LmajMnvL4e3RXtKHH4+ESXgB/Td1FBVasi4HGTzPHqFPsWQYRch cNF+fhhkcZemumF8TOdiTAZbpZomzLDgFkHZ9HsWX7T7/RutSPk3CaDjnwNRTCWYuxMj UslMXxVz/yTS1RtdZCgUOZy7RMD9UfRITL4I3jwIhmz4T1/5LsRCxkcoJ8COITdMEL4m WEiqbwLErqK3f8kHDt76SMsojOl5fKY9Yy15Q7wb7Of1/dz2UxLCN0dprVtSPW3Xxb+u 9+vg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759875279; x=1760480079; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=icsR5rcCxPu2mbO19M+4yBFFv/b0hAKJOcgfFqtENIY=; b=xBIA7SlCHreQWEvyevQuCJ/XdryYKCvRvQcmPZvpdKU5ZlxW9XPQbL92V3FTkNQZ4b V8bw7ZBk4S0HtUFYezyubzd4ocTGmzUuDVZwJnQyrMTlP8e2iQ7mcgmfmOldIasSPoBw yoMhMh+Xe+LkfXnqNO9ZxmqS2QDGQ4LBRQUdAU1ZD8LZdFc8nZEbt350SOz9SnrENNhR 3jba4iKI3khH3x8iUoGEpjxtzNGPugjA74fEFICot3UZ42QcFacPYMtSdJg/nC3JD+eu we6OWJOUaeTbKd0MQ+uJCuq/8SRlHTwEZrAVtPvXj6CD7vtgC6LBYa7f2PaIuoCclelx /PxQ== X-Forwarded-Encrypted: i=1; AJvYcCUdwRlqwXYkZcJ08Z5sdbh/DV1xh6PgvEC38KRwH/kliAVE3FRXUpXlL+j6ZTVUAvXRAz/2Y6JfjkN4TaI=@vger.kernel.org X-Gm-Message-State: AOJu0Yyuf9NzR/pLxJG59DqAMbRSuKi7QY7A1z/wEHxRVUyEU9voR4GR sgZ45wypfgrjUAYrkSvCrO/3L1bXKAjVdgB/GSlX8Pu12EAf++FkQXvu4zkaCgVwnYgHwJIoe+N 1PzDufg== X-Google-Smtp-Source: AGHT+IFzjZnIWMgQjMlS5yIf3CAjQgFHrvUBdvw28xfclFFsf//YAI6F0Vd324LvQxWiJFyU7jWQTlDOCyA= X-Received: from plbcp5.prod.google.com ([2002:a17:902:e785:b0:290:28e2:ce55]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:903:1aa4:b0:27c:a35a:1321 with SMTP id d9443c01a7336-290272e6f79mr13157245ad.51.1759875278814; Tue, 07 Oct 2025 15:14:38 -0700 (PDT) Reply-To: Sean Christopherson Date: Tue, 7 Oct 2025 15:14:09 -0700 In-Reply-To: <20251007221420.344669-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251007221420.344669-1-seanjc@google.com> X-Mailer: git-send-email 2.51.0.710.ga91ca5db03-goog Message-ID: <20251007221420.344669-2-seanjc@google.com> Subject: [PATCH v12 01/12] KVM: guest_memfd: Rename "struct kvm_gmem" to "struct gmem_file" From: Sean Christopherson To: Marc Zyngier , Oliver Upton , Paolo Bonzini , Sean Christopherson Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, David Hildenbrand , Fuad Tabba , Ackerley Tng , Shivank Garg , Ashish Kalra , Vlastimil Babka Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Rename the "kvm_gmem" structure to "gmem_file" in anticipation of using dedicated guest_memfd inodes instead of anonyomous inodes, at which point the "kvm_gmem" nomenclature becomes quite misleading. In guest_memfd, inodes are effectively the raw underlying physical storage, and will be used to track properties of the physical memory, while each gmem file is effectively a single VM's view of that storage, and is used to track assets specific to its associated VM, e.g. memslots=3D>gmem bindings. Using "kvm_gmem" suggests that the per-VM/per-file structures are _the_ guest_memfd instance, which almost the exact opposite of reality. Opportunistically rename local variables from "gmem" to "f", again to avoid confusion once guest_memfd specific inodes come along. No functional change intended. Signed-off-by: Sean Christopherson Reviewed-by: Ackerley Tng Reviewed-by: Shivank Garg Tested-by: Ackerley Tng --- virt/kvm/guest_memfd.c | 100 ++++++++++++++++++++++------------------- 1 file changed, 54 insertions(+), 46 deletions(-) diff --git a/virt/kvm/guest_memfd.c b/virt/kvm/guest_memfd.c index fbca8c0972da..3c57fb42f12c 100644 --- a/virt/kvm/guest_memfd.c +++ b/virt/kvm/guest_memfd.c @@ -7,7 +7,16 @@ =20 #include "kvm_mm.h" =20 -struct kvm_gmem { +/* + * A guest_memfd instance can be associated multiple VMs, each with its own + * "view" of the underlying physical memory. + * + * The gmem's inode is effectively the raw underlying physical storage, an= d is + * used to track properties of the physical memory, while each gmem file is + * effectively a single VM's view of that storage, and is used to track as= sets + * specific to its associated VM, e.g. memslots=3D>gmem bindings. + */ +struct gmem_file { struct kvm *kvm; struct xarray bindings; struct list_head entry; @@ -110,16 +119,16 @@ static enum kvm_gfn_range_filter kvm_gmem_get_invalid= ate_filter(struct inode *in return KVM_FILTER_PRIVATE; } =20 -static void __kvm_gmem_invalidate_begin(struct kvm_gmem *gmem, pgoff_t sta= rt, +static void __kvm_gmem_invalidate_begin(struct gmem_file *f, pgoff_t start, pgoff_t end, enum kvm_gfn_range_filter attr_filter) { bool flush =3D false, found_memslot =3D false; struct kvm_memory_slot *slot; - struct kvm *kvm =3D gmem->kvm; + struct kvm *kvm =3D f->kvm; unsigned long index; =20 - xa_for_each_range(&gmem->bindings, index, slot, start, end - 1) { + xa_for_each_range(&f->bindings, index, slot, start, end - 1) { pgoff_t pgoff =3D slot->gmem.pgoff; =20 struct kvm_gfn_range gfn_range =3D { @@ -152,20 +161,20 @@ static void kvm_gmem_invalidate_begin(struct inode *i= node, pgoff_t start, { struct list_head *gmem_list =3D &inode->i_mapping->i_private_list; enum kvm_gfn_range_filter attr_filter; - struct kvm_gmem *gmem; + struct gmem_file *f; =20 attr_filter =3D kvm_gmem_get_invalidate_filter(inode); =20 - list_for_each_entry(gmem, gmem_list, entry) - __kvm_gmem_invalidate_begin(gmem, start, end, attr_filter); + list_for_each_entry(f, gmem_list, entry) + __kvm_gmem_invalidate_begin(f, start, end, attr_filter); } =20 -static void __kvm_gmem_invalidate_end(struct kvm_gmem *gmem, pgoff_t start, +static void __kvm_gmem_invalidate_end(struct gmem_file *f, pgoff_t start, pgoff_t end) { - struct kvm *kvm =3D gmem->kvm; + struct kvm *kvm =3D f->kvm; =20 - if (xa_find(&gmem->bindings, &start, end - 1, XA_PRESENT)) { + if (xa_find(&f->bindings, &start, end - 1, XA_PRESENT)) { KVM_MMU_LOCK(kvm); kvm_mmu_invalidate_end(kvm); KVM_MMU_UNLOCK(kvm); @@ -176,10 +185,10 @@ static void kvm_gmem_invalidate_end(struct inode *ino= de, pgoff_t start, pgoff_t end) { struct list_head *gmem_list =3D &inode->i_mapping->i_private_list; - struct kvm_gmem *gmem; + struct gmem_file *f; =20 - list_for_each_entry(gmem, gmem_list, entry) - __kvm_gmem_invalidate_end(gmem, start, end); + list_for_each_entry(f, gmem_list, entry) + __kvm_gmem_invalidate_end(f, start, end); } =20 static long kvm_gmem_punch_hole(struct inode *inode, loff_t offset, loff_t= len) @@ -277,9 +286,9 @@ static long kvm_gmem_fallocate(struct file *file, int m= ode, loff_t offset, =20 static int kvm_gmem_release(struct inode *inode, struct file *file) { - struct kvm_gmem *gmem =3D file->private_data; + struct gmem_file *f =3D file->private_data; struct kvm_memory_slot *slot; - struct kvm *kvm =3D gmem->kvm; + struct kvm *kvm =3D f->kvm; unsigned long index; =20 /* @@ -299,7 +308,7 @@ static int kvm_gmem_release(struct inode *inode, struct= file *file) =20 filemap_invalidate_lock(inode->i_mapping); =20 - xa_for_each(&gmem->bindings, index, slot) + xa_for_each(&f->bindings, index, slot) WRITE_ONCE(slot->gmem.file, NULL); =20 /* @@ -307,18 +316,18 @@ static int kvm_gmem_release(struct inode *inode, stru= ct file *file) * Zap all SPTEs pointed at by this file. Do not free the backing * memory, as its lifetime is associated with the inode, not the file. */ - __kvm_gmem_invalidate_begin(gmem, 0, -1ul, + __kvm_gmem_invalidate_begin(f, 0, -1ul, kvm_gmem_get_invalidate_filter(inode)); - __kvm_gmem_invalidate_end(gmem, 0, -1ul); + __kvm_gmem_invalidate_end(f, 0, -1ul); =20 - list_del(&gmem->entry); + list_del(&f->entry); =20 filemap_invalidate_unlock(inode->i_mapping); =20 mutex_unlock(&kvm->slots_lock); =20 - xa_destroy(&gmem->bindings); - kfree(gmem); + xa_destroy(&f->bindings); + kfree(f); =20 kvm_put_kvm(kvm); =20 @@ -493,7 +502,7 @@ bool __weak kvm_arch_supports_gmem_init_shared(struct k= vm *kvm) static int __kvm_gmem_create(struct kvm *kvm, loff_t size, u64 flags) { const char *anon_name =3D "[kvm-gmem]"; - struct kvm_gmem *gmem; + struct gmem_file *f; struct inode *inode; struct file *file; int fd, err; @@ -502,14 +511,13 @@ static int __kvm_gmem_create(struct kvm *kvm, loff_t = size, u64 flags) if (fd < 0) return fd; =20 - gmem =3D kzalloc(sizeof(*gmem), GFP_KERNEL); - if (!gmem) { + f =3D kzalloc(sizeof(*f), GFP_KERNEL); + if (!f) { err =3D -ENOMEM; goto err_fd; } =20 - file =3D anon_inode_create_getfile(anon_name, &kvm_gmem_fops, gmem, - O_RDWR, NULL); + file =3D anon_inode_create_getfile(anon_name, &kvm_gmem_fops, f, O_RDWR, = NULL); if (IS_ERR(file)) { err =3D PTR_ERR(file); goto err_gmem; @@ -531,15 +539,15 @@ static int __kvm_gmem_create(struct kvm *kvm, loff_t = size, u64 flags) WARN_ON_ONCE(!mapping_unevictable(inode->i_mapping)); =20 kvm_get_kvm(kvm); - gmem->kvm =3D kvm; - xa_init(&gmem->bindings); - list_add(&gmem->entry, &inode->i_mapping->i_private_list); + f->kvm =3D kvm; + xa_init(&f->bindings); + list_add(&f->entry, &inode->i_mapping->i_private_list); =20 fd_install(fd, file); return fd; =20 err_gmem: - kfree(gmem); + kfree(f); err_fd: put_unused_fd(fd); return err; @@ -564,7 +572,7 @@ int kvm_gmem_bind(struct kvm *kvm, struct kvm_memory_sl= ot *slot, { loff_t size =3D slot->npages << PAGE_SHIFT; unsigned long start, end; - struct kvm_gmem *gmem; + struct gmem_file *f; struct inode *inode; struct file *file; int r =3D -EINVAL; @@ -578,8 +586,8 @@ int kvm_gmem_bind(struct kvm *kvm, struct kvm_memory_sl= ot *slot, if (file->f_op !=3D &kvm_gmem_fops) goto err; =20 - gmem =3D file->private_data; - if (gmem->kvm !=3D kvm) + f =3D file->private_data; + if (f->kvm !=3D kvm) goto err; =20 inode =3D file_inode(file); @@ -593,8 +601,8 @@ int kvm_gmem_bind(struct kvm *kvm, struct kvm_memory_sl= ot *slot, start =3D offset >> PAGE_SHIFT; end =3D start + slot->npages; =20 - if (!xa_empty(&gmem->bindings) && - xa_find(&gmem->bindings, &start, end - 1, XA_PRESENT)) { + if (!xa_empty(&f->bindings) && + xa_find(&f->bindings, &start, end - 1, XA_PRESENT)) { filemap_invalidate_unlock(inode->i_mapping); goto err; } @@ -609,7 +617,7 @@ int kvm_gmem_bind(struct kvm *kvm, struct kvm_memory_sl= ot *slot, if (kvm_gmem_supports_mmap(inode)) slot->flags |=3D KVM_MEMSLOT_GMEM_ONLY; =20 - xa_store_range(&gmem->bindings, start, end - 1, slot, GFP_KERNEL); + xa_store_range(&f->bindings, start, end - 1, slot, GFP_KERNEL); filemap_invalidate_unlock(inode->i_mapping); =20 /* @@ -627,7 +635,7 @@ void kvm_gmem_unbind(struct kvm_memory_slot *slot) { unsigned long start =3D slot->gmem.pgoff; unsigned long end =3D start + slot->npages; - struct kvm_gmem *gmem; + struct gmem_file *f; struct file *file; =20 /* @@ -638,10 +646,10 @@ void kvm_gmem_unbind(struct kvm_memory_slot *slot) if (!file) return; =20 - gmem =3D file->private_data; + f =3D file->private_data; =20 filemap_invalidate_lock(file->f_mapping); - xa_store_range(&gmem->bindings, start, end - 1, NULL, GFP_KERNEL); + xa_store_range(&f->bindings, start, end - 1, NULL, GFP_KERNEL); =20 /* * synchronize_srcu(&kvm->srcu) ensured that kvm_gmem_get_pfn() @@ -659,18 +667,18 @@ static struct folio *__kvm_gmem_get_pfn(struct file *= file, pgoff_t index, kvm_pfn_t *pfn, bool *is_prepared, int *max_order) { - struct file *gmem_file =3D READ_ONCE(slot->gmem.file); - struct kvm_gmem *gmem =3D file->private_data; + struct file *slot_file =3D READ_ONCE(slot->gmem.file); + struct gmem_file *f =3D file->private_data; struct folio *folio; =20 - if (file !=3D gmem_file) { - WARN_ON_ONCE(gmem_file); + if (file !=3D slot_file) { + WARN_ON_ONCE(slot_file); return ERR_PTR(-EFAULT); } =20 - gmem =3D file->private_data; - if (xa_load(&gmem->bindings, index) !=3D slot) { - WARN_ON_ONCE(xa_load(&gmem->bindings, index)); + f =3D file->private_data; + if (xa_load(&f->bindings, index) !=3D slot) { + WARN_ON_ONCE(xa_load(&f->bindings, index)); return ERR_PTR(-EIO); } =20 --=20 2.51.0.710.ga91ca5db03-goog