Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp787035ybt; Wed, 24 Jun 2020 11:11:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwxqasgQTps2CRNIeRna1w5/Sh6HylTdTN8dQytUZc3Xd0/twzwWiQxm8dR3nujD8O/9Cu6 X-Received: by 2002:a05:6402:17ce:: with SMTP id s14mr27737764edy.53.1593022278258; Wed, 24 Jun 2020 11:11:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593022278; cv=none; d=google.com; s=arc-20160816; b=z5qfABNmHFPqw/yHji5GeU8PNkZmnq9A202LFRzEQiDGnsZ9atLvmhF8v7Z20kOrSm lxe5ZUgLJZHvYYwyUWXUnIseJkU0r5r9EUsmHuqeuXZGAzlKQ42Vij4LlK7p8cCvCoeT S0snmdsBx6WkfXN50Y8uwUHqTmYF894cDwkOk9xNfEMc3vBh1AvRoXM5VR6znzCJPAak wkmBgwR9kFbKgdgiM3n3WiPAHpyJI3n/WJ4LNv0FWKPnumXCq6OFov78YQyHvj/mofE9 CfwY5FLWa2/86rUeX1FUm3krjQx5FobtW47VHZkQRfukp6IyQ94Y7/sBEXZGBynfIWRd LUYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=kZtsQ2QNgpTuGJ0L1UMDGKkHsHIMQ6IFPmQoCgXSxPk=; b=eWPt9VcpRQUUAZAQHTT0zv7ZxBqImO4kGJVqm+stC0nmOIu9jsDLv56rXNgyZbIS86 7AKxkdeGAGG6ngzMB/51FjH1gVcQQ0YXHIg8IVXF8JMNdNtjim/Y0k/NpUIIMc7sytLg g2L/yD8yGbULBImyks5KZyOFtMZkv121dauTRjOTdAAZZI55EG4wI/xC7TyiKcnXZufn CU7WIv7jymCYt7RR4iNk6URnDiE3mrYmDfUJnq71ObPKzYtNWFGeuYvbWIiHXux2ebpb WuYXTX+TmqLhmCw8Z3qtntnHUOzpEti/XhKEtI9ffp+V7D8/OH1HNXrZT+Hg7U5Pgffb pBcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=I8xsjIFu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n9si1006472eja.529.2020.06.24.11.10.53; Wed, 24 Jun 2020 11:11:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=I8xsjIFu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405384AbgFXSIW (ORCPT + 99 others); Wed, 24 Jun 2020 14:08:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56462 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405111AbgFXSIU (ORCPT ); Wed, 24 Jun 2020 14:08:20 -0400 Received: from mail-vs1-xe41.google.com (mail-vs1-xe41.google.com [IPv6:2607:f8b0:4864:20::e41]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7B9EBC061796 for ; Wed, 24 Jun 2020 11:08:20 -0700 (PDT) Received: by mail-vs1-xe41.google.com with SMTP id m62so1941524vsd.4 for ; Wed, 24 Jun 2020 11:08:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kZtsQ2QNgpTuGJ0L1UMDGKkHsHIMQ6IFPmQoCgXSxPk=; b=I8xsjIFuXxhPs3/VTvNDexQl4rZEOI5GPNOHlVduDEWE/AEaBV1aY37eSRWsPccgVS AlxzyS5GQfBUPAlJ4cy7tWZuyxndg6qqZjdP++mE7aRv6yBuqWO5Si/RflVJum6TWjU3 w/sFsCFId/I82+L82jE2RjnZyPvuaBMQzDrbFBWYQBouvCeo4nuxpdakQe7uiGqti9n2 eYa2QIvE5N8aBTwg5m28l1F6C0lStww0PWhCNQjunELBNvSFYFL1brZrMqojoqlR4X08 8/w4r6hLrmBzJVjqQRRO8AE1vvcAGOg4f/rfFBwNkuMn6PrCJuD83PxBN/WwyI3qAQRu Ihsg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kZtsQ2QNgpTuGJ0L1UMDGKkHsHIMQ6IFPmQoCgXSxPk=; b=b8FBbEBbLyHe1Pxevq+QtdGbQG9Eouy2EEHf47QFyEel5N6ZKToCNjh+UMs8uDXK4+ Rl2rvV5lori8yoURQ0aMj5L+I9Su3JOER9OHjIjS0Ib/CPQl0mhR0PAwyk0/KQSocwbJ Va7I6fQ0PyPox+FLvZVXJPfhf696YzDvFrzG4/Nq5qPqZqz741oi5i8q63H8159E5XO2 sIhGCuO3kWWwEIw+m0Nudq5xs4kxXsp28mpfBF3KMy3AiXGHZWBpjz5OffPGzLOt925M oxECg4aIOAHVKm2iG2WWix71rjSF3+hVmRMqY3HDaMHHCUxPEEXmcAbtrs0r5uqydnh/ mc/g== X-Gm-Message-State: AOAM530vUp1iB7Z4Zxj83zUkxskrgBf8YNXk/amfBCPTVxWpUzzg25BM Lj3sgRh1TarxXJqScEQHSEWQikMw2IbOBTloZxlLdA== X-Received: by 2002:a67:f785:: with SMTP id j5mr2811502vso.17.1593022099114; Wed, 24 Jun 2020 11:08:19 -0700 (PDT) MIME-Version: 1.0 References: <20200622200822.4426-1-sean.j.christopherson@intel.com> <20200622200822.4426-15-sean.j.christopherson@intel.com> In-Reply-To: <20200622200822.4426-15-sean.j.christopherson@intel.com> From: Ben Gardon Date: Wed, 24 Jun 2020 11:08:08 -0700 Message-ID: Subject: Re: [PATCH v2 14/21] KVM: Move x86's version of struct kvm_mmu_memory_cache to common code To: Sean Christopherson Cc: Marc Zyngier , Paolo Bonzini , Arnd Bergmann , James Morse , Julien Thierry , Suzuki K Poulose , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org, kvm@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, Peter Feiner , Peter Shier , Junaid Shahid , Christoffer Dall Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 22, 2020 at 1:09 PM Sean Christopherson wrote: > > Move x86's 'struct kvm_mmu_memory_cache' to common code in anticipation > of moving the entire x86 implementation code to common KVM and reusing > it for arm64 and MIPS. Add a new architecture specific asm/kvm_types.h > to control the existence and parameters of the struct. The new header > is needed to avoid a chicken-and-egg problem with asm/kvm_host.h as all > architectures define instances of the struct in their vCPU structs. > > Add an asm-generic version of kvm_types.h to avoid having empty files on > PPC and s390 in the long term, and for arm64 and mips in the short term. > > Suggested-by: Christoffer Dall Reviewed-by: Ben Gardon > Signed-off-by: Sean Christopherson > --- > arch/arm64/include/asm/Kbuild | 1 + > arch/mips/include/asm/Kbuild | 1 + > arch/powerpc/include/asm/Kbuild | 1 + > arch/s390/include/asm/Kbuild | 1 + > arch/x86/include/asm/kvm_host.h | 13 ------------- > arch/x86/include/asm/kvm_types.h | 7 +++++++ > include/asm-generic/kvm_types.h | 5 +++++ > include/linux/kvm_types.h | 19 +++++++++++++++++++ > 8 files changed, 35 insertions(+), 13 deletions(-) > create mode 100644 arch/x86/include/asm/kvm_types.h > create mode 100644 include/asm-generic/kvm_types.h > > diff --git a/arch/arm64/include/asm/Kbuild b/arch/arm64/include/asm/Kbuild > index ff9cbb631212..35a68155cd0e 100644 > --- a/arch/arm64/include/asm/Kbuild > +++ b/arch/arm64/include/asm/Kbuild > @@ -1,5 +1,6 @@ > # SPDX-License-Identifier: GPL-2.0 > generic-y += early_ioremap.h > +generic-y += kvm_types.h > generic-y += local64.h > generic-y += mcs_spinlock.h > generic-y += qrwlock.h > diff --git a/arch/mips/include/asm/Kbuild b/arch/mips/include/asm/Kbuild > index 8643d313890e..397e6d24d2ab 100644 > --- a/arch/mips/include/asm/Kbuild > +++ b/arch/mips/include/asm/Kbuild > @@ -5,6 +5,7 @@ generated-y += syscall_table_64_n32.h > generated-y += syscall_table_64_n64.h > generated-y += syscall_table_64_o32.h > generic-y += export.h > +generic-y += kvm_types.h > generic-y += local64.h > generic-y += mcs_spinlock.h > generic-y += parport.h > diff --git a/arch/powerpc/include/asm/Kbuild b/arch/powerpc/include/asm/Kbuild > index dadbcf3a0b1e..2d444d09b553 100644 > --- a/arch/powerpc/include/asm/Kbuild > +++ b/arch/powerpc/include/asm/Kbuild > @@ -4,6 +4,7 @@ generated-y += syscall_table_64.h > generated-y += syscall_table_c32.h > generated-y += syscall_table_spu.h > generic-y += export.h > +generic-y += kvm_types.h > generic-y += local64.h > generic-y += mcs_spinlock.h > generic-y += vtime.h > diff --git a/arch/s390/include/asm/Kbuild b/arch/s390/include/asm/Kbuild > index 83f6e85de7bc..319efa0e6d02 100644 > --- a/arch/s390/include/asm/Kbuild > +++ b/arch/s390/include/asm/Kbuild > @@ -6,5 +6,6 @@ generated-y += unistd_nr.h > > generic-y += asm-offsets.h > generic-y += export.h > +generic-y += kvm_types.h > generic-y += local64.h > generic-y += mcs_spinlock.h > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index 67b84aa2984e..70832aa762e5 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -193,8 +193,6 @@ struct x86_exception; > enum x86_intercept; > enum x86_intercept_stage; > > -#define KVM_NR_MEM_OBJS 40 > - > #define KVM_NR_DB_REGS 4 > > #define DR6_BD (1 << 13) > @@ -245,17 +243,6 @@ enum x86_intercept_stage; > > struct kvm_kernel_irq_routing_entry; > > -/* > - * We don't want allocation failures within the mmu code, so we preallocate > - * enough memory for a single page fault in a cache. > - */ > -struct kvm_mmu_memory_cache { > - int nobjs; > - gfp_t gfp_zero; > - struct kmem_cache *kmem_cache; > - void *objects[KVM_NR_MEM_OBJS]; > -}; > - > /* > * the pages used as guest page table on soft mmu are tracked by > * kvm_memory_slot.arch.gfn_track which is 16 bits, so the role bits used > diff --git a/arch/x86/include/asm/kvm_types.h b/arch/x86/include/asm/kvm_types.h > new file mode 100644 > index 000000000000..08f1b57d3b62 > --- /dev/null > +++ b/arch/x86/include/asm/kvm_types.h > @@ -0,0 +1,7 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef _ASM_X86_KVM_TYPES_H > +#define _ASM_X86_KVM_TYPES_H > + > +#define KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE 40 > + > +#endif /* _ASM_X86_KVM_TYPES_H */ > diff --git a/include/asm-generic/kvm_types.h b/include/asm-generic/kvm_types.h > new file mode 100644 > index 000000000000..2a82daf110f1 > --- /dev/null > +++ b/include/asm-generic/kvm_types.h > @@ -0,0 +1,5 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef _ASM_GENERIC_KVM_TYPES_H > +#define _ASM_GENERIC_KVM_TYPES_H > + > +#endif > diff --git a/include/linux/kvm_types.h b/include/linux/kvm_types.h > index 68e84cf42a3f..a7580f69dda0 100644 > --- a/include/linux/kvm_types.h > +++ b/include/linux/kvm_types.h > @@ -20,6 +20,8 @@ enum kvm_mr_change; > > #include > > +#include > + > /* > * Address types: > * > @@ -58,4 +60,21 @@ struct gfn_to_pfn_cache { > bool dirty; > }; > > +#ifdef KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE > +/* > + * Memory caches are used to preallocate memory ahead of various MMU flows, > + * e.g. page fault handlers. Gracefully handling allocation failures deep in > + * MMU flows is problematic, as is triggering reclaim, I/O, etc... while > + * holding MMU locks. Note, these caches act more like prefetch buffers than > + * classical caches, i.e. objects are not returned to the cache on being freed. > + */ > +struct kvm_mmu_memory_cache { > + int nobjs; > + gfp_t gfp_zero; > + struct kmem_cache *kmem_cache; > + void *objects[KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE]; > +}; > +#endif > + > + > #endif /* __KVM_TYPES_H__ */ > -- > 2.26.0 >