Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp244607rdg; Tue, 10 Oct 2023 09:04:13 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGMvW1SHjtrCAuUpc4yvYKzf8fFpmov7lV18cBsLx48N+JcU1cWdRYdRWW5raV4a1aEgdgi X-Received: by 2002:a17:902:d4c4:b0:1c9:abb5:aedf with SMTP id o4-20020a170902d4c400b001c9abb5aedfmr3477913plg.44.1696953852603; Tue, 10 Oct 2023 09:04:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696953852; cv=none; d=google.com; s=arc-20160816; b=0rFvgcB+kSmyMg0C4QlmyeTDT77xtSmrlz9+QmXPs/zjqxttp7R4Dni72m89nu2lj5 ZeDqH14hKy5/xok0b8zBFpmzAyIdCVBCRadBbAvTPukdf0QMZhYfzG/IyGXhBv2U5WK/ sQ0lVtxFgMFHvFiuSgNmhir60uMBr/qxjWkPA7ngPh3R20Ls53/3z/098J1pSvhcLe+R 0MRcJxsC/acAmle0mTd42lvsYrKXaaAmIBnWBZE+ttqj4nfjQhVjoF6yUkDAHnF4nG34 DZS0LkOQneRstgwNz0875gzTJMrDpcTp6YUaY8BDjOHdiN1kZfamv8+9Y+gs6WUj0vN6 vAng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=5AesHVAQUxcR1GAtYtYzOkU6c6/CTxsVJcL3ikJVYAI=; fh=SJRVlyvhIPEM+1ZkklEUy6ba01ZQIQ4PgkK8h+im/FM=; b=VMZw5fwfTB5SFSlWb6QCwYre4oo08CO/S/iV4wgyjLxnjNWnu/HHQWbCXJnoQdh8l4 V5kibkZpCJPQUOw5n7zoYoba7Hwyk4gqfcnv141eKK/8K2zc7UPjsZmoCA3K/IyLV4hw 9LGQwsHbwS6FQwEG/iz2VIePHTcNCB7WivUBhKjKDWTyt6y+7NObucSG+w2Ahiy5hD2B r9iSEIcIs8gE0KXrlzDZ5N/xaZs7O4EsU8UN4ZCsW/rZLpH3FICSzevDRJDGODriOCg7 h7jC8hCHEvNtjDetgQy57Svv3kiwDGAn6WYwu1skuHDZycnBbXToxK2I39HuSios3u6j tk0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hamdaLKW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id jj15-20020a170903048f00b001bbca0a8393si9822210plb.56.2023.10.10.09.04.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 09:04:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hamdaLKW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 513C98026DDA; Tue, 10 Oct 2023 09:04:03 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233689AbjJJQD4 (ORCPT + 99 others); Tue, 10 Oct 2023 12:03:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44038 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233674AbjJJQDy (ORCPT ); Tue, 10 Oct 2023 12:03:54 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE1D2B8 for ; Tue, 10 Oct 2023 09:03:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1696953784; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=5AesHVAQUxcR1GAtYtYzOkU6c6/CTxsVJcL3ikJVYAI=; b=hamdaLKWZhqk+cdKK9MXjaSFZJSMqIqi5eGwxEiOl3xxtCPdkmCqKbDWji0Gvf9GukkEOJ Cb7StLOcXQZrszbZdxIx3vOnRENCbIN1UCn1WnTeU3/2uZAtcXO+r/pB8WFjUcxkKiqUiq cL3TEq+O7jS2auHmPAGrwToZzl5gKIU= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-487-x0HiwtMcPpWoaVmCvGtVbA-1; Tue, 10 Oct 2023 12:03:03 -0400 X-MC-Unique: x0HiwtMcPpWoaVmCvGtVbA-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.rdu2.redhat.com [10.11.54.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 512A41C11712; Tue, 10 Oct 2023 16:03:02 +0000 (UTC) Received: from fedora.redhat.com (unknown [10.45.226.166]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7F386158; Tue, 10 Oct 2023 16:03:01 +0000 (UTC) From: Vitaly Kuznetsov To: kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson Cc: linux-kernel@vger.kernel.org Subject: [PATCH RFC 00/11] KVM: x86: Make Hyper-V emulation optional (AKA introduce CONFIG_KVM_HYPERV) Date: Tue, 10 Oct 2023 18:02:49 +0200 Message-ID: <20231010160300.1136799-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.1 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 10 Oct 2023 09:04:03 -0700 (PDT) Ideas to make Hyper-V emulation by KVM optional were expressed in the past so I've decided to take a look at what would it take us to implement it. Turns out it's quite a lot of code churn but the gain is also significant. Just comparing the resulting module sizes, I can see: # CONFIG_KVM_HYPERV is not set # CONFIG_HYPERV is not set -rw-r--r--. 1 user user 3612632 Oct 10 16:53 arch/x86/kvm/kvm-amd.ko -rw-r--r--. 1 user user 5343968 Oct 10 16:53 arch/x86/kvm/kvm-intel.ko CONFIG_KVM_HYPERV=y # CONFIG_HYPERV is not set -rw-r--r--. 1 user user 3925704 Oct 10 16:51 arch/x86/kvm/kvm-amd.ko -rw-r--r--. 1 user user 5819192 Oct 10 16:51 arch/x86/kvm/kvm-intel.ko # CONFIG_KVM_HYPERV is not set CONFIG_HYPERV=m -rw-r--r--. 1 user user 3928440 Oct 10 16:40 arch/x86/kvm/kvm-amd.ko -rw-r--r--. 1 user user 8156464 Oct 10 16:40 arch/x86/kvm/kvm-intel.ko CONFIG_KVM_HYPERV=y CONFIG_HYPERV=m -rw-r--r--. 1 user user 4245440 Oct 10 16:37 arch/x86/kvm/kvm-amd.ko -rw-r--r--. 1 user user 8583872 Oct 10 16:37 arch/x86/kvm/kvm-intel.ko While code churn is certainly something we can survive, adding more CONFIG options always comes with a risk of a broken build somewhere in the future. Early RFC. I have only compile tested these patches in these four configurations and I'd like to get your opinion on whether it's worth it or not. The first patch of the series is not Hyper-V related but as I hide Hyper-V emulation context under CONFIG_KVM_HYPERV I think it would make sense to do the same for Xen. Vitaly Kuznetsov (11): KVM: x86: xen: Remove unneeded xen context from struct kvm_arch when !CONFIG_KVM_XEN KVM: x86: hyper-v: Move Hyper-V partition assist page out of Hyper-V emulation context KVM: VMX: Split off vmx_onhyperv.{ch} from hyperv.{ch} KVM: x86: hyper-v: Introduce kvm_hv_synic_auto_eoi_set() KVM: x86: hyper-v: Introduce kvm_hv_synic_has_vector() KVM: VMX: Split off hyperv_evmcs.{ch} KVM: x86: Make Hyper-V emulation optional KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr() accessor KVM: nVMX: hyper-v: Introduce nested_vmx_evmcs() accessor KVM: nVMX: hyper-v: Hide more stuff under CONFIG_KVM_HYPERV KVM: nSVM: hyper-v: Hide more stuff under CONFIG_KVM_HYPERV/CONFIG_HYPERV arch/x86/include/asm/kvm_host.h | 11 +- arch/x86/kvm/Kconfig | 9 + arch/x86/kvm/Makefile | 19 +- arch/x86/kvm/cpuid.c | 6 + arch/x86/kvm/hyperv.h | 39 ++- arch/x86/kvm/irq.c | 2 + arch/x86/kvm/irq_comm.c | 9 +- arch/x86/kvm/lapic.c | 5 +- arch/x86/kvm/svm/hyperv.h | 7 + arch/x86/kvm/svm/nested.c | 22 +- arch/x86/kvm/svm/svm.h | 2 + arch/x86/kvm/svm/svm_onhyperv.c | 2 +- arch/x86/kvm/svm/svm_onhyperv.h | 2 + arch/x86/kvm/vmx/hyperv.c | 447 -------------------------------- arch/x86/kvm/vmx/hyperv.h | 191 ++------------ arch/x86/kvm/vmx/hyperv_evmcs.c | 311 ++++++++++++++++++++++ arch/x86/kvm/vmx/hyperv_evmcs.h | 162 ++++++++++++ arch/x86/kvm/vmx/nested.c | 94 ++++--- arch/x86/kvm/vmx/nested.h | 3 +- arch/x86/kvm/vmx/vmx.c | 6 +- arch/x86/kvm/vmx/vmx.h | 2 + arch/x86/kvm/vmx/vmx_onhyperv.c | 36 +++ arch/x86/kvm/vmx/vmx_onhyperv.h | 125 +++++++++ arch/x86/kvm/vmx/vmx_ops.h | 2 +- arch/x86/kvm/x86.c | 60 +++-- 25 files changed, 885 insertions(+), 689 deletions(-) create mode 100644 arch/x86/kvm/vmx/hyperv_evmcs.c create mode 100644 arch/x86/kvm/vmx/hyperv_evmcs.h create mode 100644 arch/x86/kvm/vmx/vmx_onhyperv.c create mode 100644 arch/x86/kvm/vmx/vmx_onhyperv.h -- 2.41.0