Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp595748pxb; Wed, 27 Jan 2021 16:12:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJwM2918y1b9ruzZxMHiVjABush6sPaNrRElDWgceJJbn2BYGqvPWravnVZNANIEjoHZPspP X-Received: by 2002:a17:906:4c85:: with SMTP id q5mr8534472eju.375.1611792741621; Wed, 27 Jan 2021 16:12:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611792741; cv=none; d=google.com; s=arc-20160816; b=LeQNKvIdB9DrR9APL+qNigHorgFjh2Lm1r/1ur7JNK0C8wE16x9tgi6SbY3xvUj8Rr URtyMzjEOW8D9MeOe/S6Rr9pFl7mccrS+4WXgcVqMvUfC7fe8o2Tgb0Q8Dr0sns/Lb9a emEJ+M69lCEc6/fvGJGZ0lVAv7ess63KDJSTIk04UVJpBnhcGbWv0OhKqaZ8jAayUg4f rEGipSG3kjBjZuq7O2LqWU4x9Cyv0NnnN6BgqQ9BoO8dA33ntbvjGmiYdR0cBHm9ytl+ MUYCCiM9k6Ro0pSSeVhNcGiW+BcO/Kk8MmTb+RsOWkNJxQRXaYd5UBWiBbQZizZZbMLi PrNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=/kgM17qMrEPrlxe0M/aOkXhDJH0p+mZ7iXasHYPaVmQ=; b=fj0pzyuJHxYWuL7bUl94JOCWCpl5iqsjnAj5z8Jt3UjHILVCNcGzqVBBg619YgNBzZ 5yQNrP62p8l4R7H64ygQBQHQmJO4h/BVNiCp0P5WAS03hakNlA+451UqzORQ7o96MRhQ XBs7mG4mcshROMpiWUP9jLrDlysHcKjlrzUk9zWlUuOt6mw57QIKhh8JnlK46G5u6r6f DtbwPINpD2CseQUerZ99cr9/9jDuwJYODfcUg9K6SWvojklDszrjtFUdJH6Pirgehpv8 rG8TwhL8sEqMbLZSNjOI7KAyKS6lbrWXWgEUbLhFNCd52Y6wFqlhRCGRh5+vrvDKKzLX HL5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="Fc/hBzq2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d9si1524449ejz.720.2021.01.27.16.11.57; Wed, 27 Jan 2021 16:12:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="Fc/hBzq2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344089AbhA0SMR (ORCPT + 99 others); Wed, 27 Jan 2021 13:12:17 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:56457 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344003AbhA0SMQ (ORCPT ); Wed, 27 Jan 2021 13:12:16 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1611771049; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=/kgM17qMrEPrlxe0M/aOkXhDJH0p+mZ7iXasHYPaVmQ=; b=Fc/hBzq2bWVY5Mthdp7YPuxCtM2HihlcNiWMLw+7Ge8qqdN2K/6xrS9TholAeq3MXmIzxE UuXZm06thPGa7Zs/mhsPNTOgd6a+JbtZHTXPcFz28/57K5eTKZdEaNB9cyTi69fieA/rIF NNqCMcj+4sbAQNGn7YxR3Gpcj4reyXY= Received: from mail-ed1-f72.google.com (mail-ed1-f72.google.com [209.85.208.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-151-HeqJrmP8MKm53Js2MrFzzw-1; Wed, 27 Jan 2021 13:10:47 -0500 X-MC-Unique: HeqJrmP8MKm53Js2MrFzzw-1 Received: by mail-ed1-f72.google.com with SMTP id a26so1804051edx.8 for ; Wed, 27 Jan 2021 10:10:47 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=/kgM17qMrEPrlxe0M/aOkXhDJH0p+mZ7iXasHYPaVmQ=; b=QkOWr/EaJYlBQULs1i7AxnZD4qXJywCZRRpqPhkvyu468o5/EF5rUpewK0edOBL9/r b8NH8/Zfcsg6CYU5rbP0zJKmIUunUqzNiD8Vyq/KoMtmdyGPURrj1IaoBs/x7B2xyaAE Wo3tA8gSEjvkOYB+AUFtJs+q19NmANr6PxdCGC6ElMmzZK6Rzhcy9A1yp7l1Wcm9O+Dn qijCIv++yNojkqrJpOSh3wK1k+ed4qQ3pll6S4m3cJlBlY2/9oCQURDqfjp/IvoY52G7 j3McfsX4xDCeCuUTPs0sGlR93bYo218j12swEArAJtvJPmHaGe0BkgVTUrX/DvAr579C sI1Q== X-Gm-Message-State: AOAM531eDaFNMWWeqdN+6X7eT6AnFnD4RmLffKDmERV+cNwbELkxBaXS m0WGs90rmiCJKxYuWWGk/JWgcEkM9+nWlpXNGmviZb34b5kB4L0BAsmAlKOC/Nug3HnoHawg174 aV9uG8eeKp8JYBYEKlpJv2gBlDXSIDHmDn7ooJorCOVDsJc0FpG8l2PPtyJWLPBY3/otavwiW2m Y4 X-Received: by 2002:a05:6402:22a8:: with SMTP id cx8mr10433030edb.32.1611771046546; Wed, 27 Jan 2021 10:10:46 -0800 (PST) X-Received: by 2002:a05:6402:22a8:: with SMTP id cx8mr10433007edb.32.1611771046361; Wed, 27 Jan 2021 10:10:46 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:c8dd:75d4:99ab:290a? ([2001:b07:6468:f312:c8dd:75d4:99ab:290a]) by smtp.gmail.com with ESMTPSA id w6sm1167293ejj.116.2021.01.27.10.10.44 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 27 Jan 2021 10:10:45 -0800 (PST) Subject: Re: [PATCH v3 00/11] KVM: VMX: Clean up Hyper-V PV TLB flush To: Sean Christopherson Cc: Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org References: <20201027212346.23409-1-sean.j.christopherson@intel.com> From: Paolo Bonzini Message-ID: <7ed340f1-f6f7-4682-65be-6bc02f25d612@redhat.com> Date: Wed, 27 Jan 2021 19:10:42 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 MIME-Version: 1.0 In-Reply-To: <20201027212346.23409-1-sean.j.christopherson@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27/10/20 22:23, Sean Christopherson wrote: > Clean up KVM's PV TLB flushing when running with EPT on Hyper-V, i.e. as > a nested VMM. No real goal in mind other than the sole patch in v1, which > is a minor change to avoid a future mixup when TDX also wants to define > .remote_flush_tlb. Everything else is opportunistic clean up. > > Patch 1 legitimately tested on VMX (no SVM), everything else effectively > build tested only. > > v3: > - Add a patch to pass the root_hpa instead of pgd to vmx_load_mmu_pgd() > and retrieve the active PCID only when necessary. [Vitaly] > - Selectively collects reviews (skipped a few due to changes). [Vitaly] > - Explicitly invalidate hv_tlb_eptp instead of leaving it valid when > the mismatch tracker "knows" it's invalid. [Vitaly] > - Change the last patch to use "hv_root_ept" instead of "hv_tlb_pgd" > to better reflect what is actually being tracked. > > v2: Rewrite everything. > > Sean Christopherson (11): > KVM: x86: Get active PCID only when writing a CR3 value > KVM: VMX: Track common EPTP for Hyper-V's paravirt TLB flush > KVM: VMX: Stash kvm_vmx in a local variable for Hyper-V paravirt TLB > flush > KVM: VMX: Fold Hyper-V EPTP checking into it's only caller > KVM: VMX: Do Hyper-V TLB flush iff vCPU's EPTP hasn't been flushed > KVM: VMX: Invalidate hv_tlb_eptp to denote an EPTP mismatch > KVM: VMX: Don't invalidate hv_tlb_eptp if the new EPTP matches > KVM: VMX: Explicitly check for hv_remote_flush_tlb when loading pgd > KVM: VMX: Define Hyper-V paravirt TLB flush fields iff Hyper-V is > enabled > KVM: VMX: Skip additional Hyper-V TLB EPTP flushes if one fails > KVM: VMX: Track root HPA instead of EPTP for paravirt Hyper-V TLB > flush > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/mmu.h | 2 +- > arch/x86/kvm/svm/svm.c | 4 +- > arch/x86/kvm/vmx/vmx.c | 134 ++++++++++++++++++-------------- > arch/x86/kvm/vmx/vmx.h | 19 ++--- > 5 files changed, 87 insertions(+), 76 deletions(-) > Queued, thanks. Paolo