Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp5016359ybg; Mon, 21 Oct 2019 19:05:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZITJAF5FQqEud1mkqHQ4xi1RVWaGNKm3WipddsPJ62hT/La6lDEls6tgX+v1ooncQ8fRA X-Received: by 2002:a17:906:86d5:: with SMTP id j21mr10799280ejy.219.1571709951418; Mon, 21 Oct 2019 19:05:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571709951; cv=none; d=google.com; s=arc-20160816; b=XfbMHejnjR+RwG44hi7EoDHMrQWQBzq61bI6sLu0vkYRTsUx64WoIn2msvS0Hft9qf LC9tPd2K/hY9FxxET25BB8X7IIb7GsMJpuOC3vu1e5sk9FTHKjx8d5/J9UxFlfzSxMvu dVEGcQicyul2DFLctJWFhhOQqXl/QyLE0LHJVTdmAxc9QLO2roBnSXWFVEhVsTN0Lp5G oCGSoaKmmaaAZhtlwoG0MIhD2rZ8A0ldxqJYmqJgTDSN0YjyGh/w3jy1VO5wP3S288Ie LATMUA9FL8OJpBusbvsUtCI7zq0Drrlw4cVJMBvSAIvv7NUX88fPcV88MyaWNVMA60IO Feuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=VBcqLIhsBO82r78RVoDemign55iWA3dPa+3xzQE65EQ=; b=SR1/R0TK5ypsH/MMncdidbx6hVh5mxb63HRtDe7I4VXGY/rJeqnuF/c2AWhXPhSmpr GDVb9kjG7Lxstu+RVXBLaLaEvIwRX8q8N8dCdRYzIYbUpnXBHbISExwh6MsUIwGpe2eF yUSx/tARPk1NZEj2WD6hZhYZVGa857rqAg9rPmK01zkew9tOcT6EgzntRTj4t7hBG0I6 DOucdXveDfL64clZa+MJDBE2cQ8b3gfLyCCE0qMf78x6VU2YcxUHU3gBvM3ACGDfPvud 72q8Ta5YccepovB68mzhaWsqVCzMwti4I89VmaKnGVILQK3V1zUUBi28LISEGy2Zzc3B WAaQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o14si9834802ejc.433.2019.10.21.19.05.27; Mon, 21 Oct 2019 19:05:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730736AbfJVB7c (ORCPT + 99 others); Mon, 21 Oct 2019 21:59:32 -0400 Received: from mga14.intel.com ([192.55.52.115]:61583 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727953AbfJVB7c (ORCPT ); Mon, 21 Oct 2019 21:59:32 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Oct 2019 18:59:31 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,325,1566889200"; d="scan'208";a="196293739" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.41]) by fmsmga008.fm.intel.com with ESMTP; 21 Oct 2019 18:59:30 -0700 From: Sean Christopherson To: Marc Zyngier , James Hogan , Paul Mackerras , Christian Borntraeger , Janosch Frank , Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= Cc: James Morse , Julien Thierry , Suzuki K Poulose , David Hildenbrand , Cornelia Huck , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org, kvm-ppc@vger.kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 00/45] KVM: Refactor vCPU creation Date: Mon, 21 Oct 2019 18:58:40 -0700 Message-Id: <20191022015925.31916-1-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.22.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org *************************** DISCLAIMER ********************************** The non-x86 arch specific patches are completely untested. Although the changes are conceptually straightforward, I'm not remotely confident that the patches are bug free, e.g. checkpatch caught several blatant typos that would break compilation. ************************************************************************* The end goal of this series is to strip down the interface between common KVM code and arch specific code so that there is precisely one arch hook for creating a vCPU and one hook for destroying a vCPU. In addition to cleaning up the code base, simplifying the interface gives architectures more freedom to organize their vCPU creation code. KVM's vCPU creation code is comically messy. kvm_vm_ioctl_create_vcpu() calls three separate arch hooks: init(), create() and setup(). The init() call is especially nasty as it's hidden away in a common KVM function, kvm_init_vcpu(), that for all intents and purposes must be immediately invoked after the vcpu object is allocated. Not to be outdone, vCPU destruction also has three arch hooks: uninit(), destroy() and free(), the latter of which isn't actually invoked by common KVM code, but the hook declaration still exists because architectures are relying on its forward declaration. Eliminating the extra arch hooks is relatively straightforward, just tedious. For the most part, there is no fundamental constraint that necessitated the proliferation of arch hooks, rather they crept in over time, usually when x86-centric code was moved out of generic KVM and into x86 code. E.g. kvm_arch_vcpu_setup() was added to allow x86 to do vcpu_load(), which can only be done after preempt_notifier initialization, but adding setup() overlooked the fact that the preempt_notifier was only initialized after kvm_arch_vcpu_create() because preemption support was added when x86's MMU setup (the vcpu_load() user) was called from common KVM code. For all intents and purposes, there is no true functional change in this series. The order of some allocations will change, and a few memory leaks are fixed, but the actual functionality of a guest should be unaffected. Patches 01-03 are bug fixes in error handling paths that were found by inspection when refactoring the associated code. Patches 04-43 refactor each arch implementation so that the unwanted arch hooks can be dropped without a functional change, e.g. move code out of kvm_arch_vcpu_setup() so that all implementations are empty, then drop the functions and caller. Patches 44-45 are minor clean up to eliminate kvm_vcpu_uninit(). The net result is to go from this: vcpu = kvm_arch_vcpu_create(kvm, id); | |-> kvm_vcpu_init() | |-> kvm_arch_vcpu_init() if (IS_ERR(vcpu)) { r = PTR_ERR(vcpu); goto vcpu_decrement; } preempt_notifier_init(&vcpu->preempt_notifier, &kvm_preempt_ops); r = kvm_arch_vcpu_setup(vcpu); if (r) goto vcpu_destroy; to this: r = kvm_arch_vcpu_precreate(kvm, id); if (r) goto vcpu_decrement; vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL); if (!vcpu) { r = -ENOMEM; goto vcpu_decrement; } page = alloc_page(GFP_KERNEL | __GFP_ZERO); if (!page) { r = -ENOMEM; goto vcpu_free; } vcpu->run = page_address(page); kvm_vcpu_init(vcpu, kvm, id); r = kvm_arch_vcpu_create(vcpu); if (r) goto vcpu_free_run_page; Sean Christopherson (45): KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails KVM: PPC: Book3S PR: Free shared page if mmu initialization fails KVM: x86: Free wbinvd_dirty_mask if vCPU creation fails KVM: VMX: Allocate VPID after initializing VCPU KVM: VMX: Use direct vcpu pointer during vCPU create/free KVM: SVM: Use direct vcpu pointer during vCPU create/free KVM: x86: Allocate vcpu struct in common x86 code KVM: x86: Move FPU allocation to common x86 code KVM: x86: Move allocation of pio_data page down a few lines KVM: x86: Move kvm_vcpu_init() invocation to common code KVM: PPC: e500mc: Add build-time assert that vcpu is at offset 0 KVM: PPC: Allocate vcpu struct in common PPC code KVM: PPC: Book3S PR: Allocate book3s and shadow vcpu after common init KVM: PPC: e500mc: Move reset of oldpir below call to kvm_vcpu_init() KVM: PPC: Move kvm_vcpu_init() invocation to common code KVM: MIPS: Use kvm_vcpu_cache to allocate vCPUs KVM: MIPS: Drop kvm_arch_vcpu_free() KVM: PPC: Drop kvm_arch_vcpu_free() KVM: arm: Drop kvm_arch_vcpu_free() KVM: x86: Remove spurious kvm_mmu_unload() from vcpu destruction path KVM: x86: Remove spurious clearing of async #PF MSR KVM: x86: Drop kvm_arch_vcpu_free() KVM: Remove kvm_arch_vcpu_free() declaration KVM: Add kvm_arch_vcpu_precreate() to handle pre-allocation issues KVM: s390: Move guts of kvm_arch_vcpu_init() into kvm_arch_vcpu_create() KVM: s390: Invoke kvm_vcpu_init() before allocating sie_page KVM: MIPS: Invoke kvm_vcpu_uninit() immediately prior to freeing vcpu KVM: x86: Invoke kvm_vcpu_uninit() immediately prior to freeing vcpu KVM: Introduce kvm_vcpu_destroy() KVM: Move vcpu alloc and init invocation to common code KVM: Unexport kvm_vcpu_cache and kvm_{un}init_vcpu() KVM: Move initialization of preempt notifier to kvm_vcpu_init() KVM: x86: Move guts of kvm_arch_vcpu_setup() into kvm_arch_vcpu_create() KVM: MIPS: Move .vcpu_setup() call to kvm_arch_vcpu_create() KVM: s390: Manually invoke vcpu setup during kvm_arch_vcpu_create() KVM: PPC: BookE: Setup vcpu during kvmppc_core_vcpu_create() KVM: Drop kvm_arch_vcpu_setup() KVM: x86: Move all vcpu init code into kvm_arch_vcpu_create() KVM: MIPS: Move all vcpu init code into kvm_arch_vcpu_create() KVM: ARM: Move all vcpu init code into kvm_arch_vcpu_create() KVM: PPC: Move all vcpu init code into kvm_arch_vcpu_create() KVM: arm64: Free sve_state via arm specific hook KVM: Drop kvm_arch_vcpu_init() and kvm_arch_vcpu_uninit() KVM: Move putting of vcpu->pid to kvm_vcpu_destroy() KVM: Move vcpu->run page allocation out of kvm_vcpu_init() arch/arm/include/asm/kvm_host.h | 2 +- arch/arm/kvm/guest.c | 5 - arch/arm64/include/asm/kvm_host.h | 2 +- arch/arm64/kvm/guest.c | 5 - arch/arm64/kvm/reset.c | 2 +- arch/mips/kvm/mips.c | 84 ++++------- arch/powerpc/include/asm/kvm_ppc.h | 6 +- arch/powerpc/kvm/book3s.c | 9 +- arch/powerpc/kvm/book3s_hv.c | 27 +--- arch/powerpc/kvm/book3s_pr.c | 33 ++--- arch/powerpc/kvm/booke.c | 65 ++++---- arch/powerpc/kvm/e500.c | 34 +---- arch/powerpc/kvm/e500mc.c | 32 ++-- arch/powerpc/kvm/powerpc.c | 70 ++++----- arch/s390/include/asm/kvm_host.h | 1 - arch/s390/kvm/kvm-s390.c | 110 +++++++------- arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/kvm/svm.c | 52 +------ arch/x86/kvm/vmx/vmx.c | 72 +++------ arch/x86/kvm/x86.c | 230 ++++++++++++++--------------- include/linux/kvm_host.h | 13 +- virt/kvm/arm/arm.c | 76 ++++------ virt/kvm/kvm_main.c | 71 +++++---- 23 files changed, 387 insertions(+), 616 deletions(-) -- 2.22.0