From patchwork Thu Jan 19 17:35:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Matlack X-Patchwork-Id: 13108427 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 40BDFC004D4 for ; Thu, 19 Jan 2023 17:36:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230021AbjASRgM (ORCPT ); Thu, 19 Jan 2023 12:36:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43720 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230099AbjASRgL (ORCPT ); Thu, 19 Jan 2023 12:36:11 -0500 Received: from mail-pg1-x54a.google.com (mail-pg1-x54a.google.com [IPv6:2607:f8b0:4864:20::54a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4F8A04742E for ; Thu, 19 Jan 2023 09:36:10 -0800 (PST) Received: by mail-pg1-x54a.google.com with SMTP id 69-20020a630148000000b00478118684c4so1315353pgb.20 for ; Thu, 19 Jan 2023 09:36:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=YXwKcERxaLuVKb5nhPV+CPBgH/1CDOfYUJatcNI9Lps=; b=OTqsYX12neD7rYwEWRn8ph1+Ivtv7Ny3gNRUzRN4gpl2Eo4fWlPbPU6In/4jxn719a 2slMyQuQUGYeMW/mBJE87s2KFofWL2A+b2t0AGtJWafNEsGMAYWeQipZoQ1wuc/AwP98 q6x1X0TMG1Ad+kT9cWeSraqE2aVQjTFYY8XrvpXdV5XrOCH5Z0/4P8kT8Gk2C8Whx2FG 81gR4+aJciehqPLB3q7y9lYytTmBxQ2kqUF/pcLWKVy8x5Z3rc4oYcrFbsLGgX3dj310 jjv6aYJuXYmn/PCkMZw8+4RuZGYn5ZS3Cw5swhmMDgbV/Bu5G0pBJ9SOJXuv6t7ZXXHT rVTw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=YXwKcERxaLuVKb5nhPV+CPBgH/1CDOfYUJatcNI9Lps=; b=rvs2Suy0TGtYP8yK4Q0bcR/Pu+GcNg6nd2SIxLbpCZroCKRA5u9lbn6vpbPXafR1t0 AZqMsE/uTHLozYcLGun5bBVPHe6MECeNVW0TG7UuAzQy+BfC43VgVJhJkMEvu0yZ0sTX OwnDDH72y1sRdbDD7+dZmLVA2n2S9nCWA67WexxeNOh+BfsYc/G+3Ob4P0OmTlb5saAO uDxvmkHwW+Tta5xJ1r/KvuD8EdNTlH9mcP2BeJYIuyei2OKQfpWLiQ9zUFHrrASqR4Z1 R982YrnTx2lSop72WnRVpkHV9/nJ+i1c3DMMS7q/XKpEc38R/QymPVfQCnHsnuuKzn6E 4/Dg== X-Gm-Message-State: AFqh2kpZGpRJ1lFZN+piWviOWZeJn6b2Qgd7vOtbqDo4D/L7K6+0g91W VLxqHsn98/uAwSgxJYdpDgQ0T5sRlNiMQQ== X-Google-Smtp-Source: AMrXdXuXExC+O9r6ly79uchmV3y9bAojfkYhjynfBp2nNUiPyiTU/esa3EM+EgTfMCGZFP3dGppk25OULxh7DA== X-Received: from dmatlack-n2d-128.c.googlers.com ([fda3:e722:ac3:cc00:20:ed76:c0a8:1309]) (user=dmatlack job=sendgmr) by 2002:a05:6a00:24d4:b0:58b:a320:29b9 with SMTP id d20-20020a056a0024d400b0058ba32029b9mr1062701pfv.38.1674149769306; Thu, 19 Jan 2023 09:36:09 -0800 (PST) Date: Thu, 19 Jan 2023 09:35:52 -0800 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.246.g2a6d74b583-goog Message-ID: <20230119173559.2517103-1-dmatlack@google.com> Subject: [PATCH 0/7] KVM: Add a common API for range-based TLB invalidation From: David Matlack To: Paolo Bonzini Cc: Marc Zyngier , James Morse , Suzuki K Poulose , Oliver Upton , Zenghui Yu , Huacai Chen , Aleksandar Markovic , Anup Patel , Atish Patra , Paul Walmsley , Palmer Dabbelt , Albert Ou , Sean Christopherson , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org, kvm@vger.kernel.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, David Matlack , Raghavendra Rao Ananta Precedence: bulk List-ID: X-Mailing-List: linux-mips@vger.kernel.org This series introduces a common API for performing range-based TLB invalidation. This is then used to supplant kvm_arch_flush_remote_tlbs_memslot() and pave the way for two other patch series: 1. https://lore.kernel.org/kvm/20230109215347.3119271-1-rananta@google.com/ Adds ARM support for range-based TLB invalidation and needs a mechanism to invoke it from common code. This series provides such a mechanism via kvm_arch_flush_remote_tlbs_range(). 2. https://lore.kernel.org/kvm/20221208193857.4090582-1-dmatlack@google.com/ Refactors the TDP MMU into common code, which requires an API for range-based TLB invaliation. This series is based on patches 29-33 from (2.), but I made some further cleanups after looking at it a second time. Tested on x86_64 and ARM64 using KVM selftests. Cc: Raghavendra Rao Ananta David Matlack (7): KVM: Rename kvm_arch_flush_remote_tlb() to kvm_arch_flush_remote_tlbs() KVM: arm64: Use kvm_arch_flush_remote_tlbs() KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range,address}() together KVM: x86/mmu: Rename kvm_flush_remote_tlbs_with_address() KVM: x86/MMU: Use gfn_t in kvm_flush_remote_tlbs_range() KVM: Allow range-based TLB invalidation from common code KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code arch/arm64/include/asm/kvm_host.h | 3 ++ arch/arm64/kvm/Kconfig | 1 - arch/arm64/kvm/arm.c | 6 --- arch/arm64/kvm/mmu.c | 6 +-- arch/mips/include/asm/kvm_host.h | 4 +- arch/mips/kvm/mips.c | 12 ++---- arch/riscv/kvm/mmu.c | 6 --- arch/x86/include/asm/kvm_host.h | 7 +++- arch/x86/kvm/mmu/mmu.c | 68 ++++++++++--------------------- arch/x86/kvm/mmu/mmu_internal.h | 2 - arch/x86/kvm/mmu/paging_tmpl.h | 4 +- arch/x86/kvm/mmu/tdp_mmu.c | 7 ++-- arch/x86/kvm/x86.c | 2 +- include/linux/kvm_host.h | 20 ++++++--- virt/kvm/kvm_main.c | 35 +++++++++++++--- 15 files changed, 87 insertions(+), 96 deletions(-) base-commit: de60733246ff4545a0483140c1f21426b8d7cb7f prerequisite-patch-id: 42a76ce7cec240776c21f674e99e893a3a6bee58 prerequisite-patch-id: c5ef6bbef252706b7e65b76dc9bd92cf320828f5 prerequisite-patch-id: c6e662cb6c369a47a027c25d3ccc7138a19b17f5 prerequisite-patch-id: 15a58bec64bf1537e6c9e2f52179fac652d441f7 prerequisite-patch-id: d5b6fea4724f4f2c3408b95d7ce5acdd4b528b10