Received: by 2002:a05:7412:cfc7:b0:fc:a2b0:25d7 with SMTP id by7csp1612625rdb; Tue, 20 Feb 2024 01:17:25 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWEWVvyVZI5lhOPunxhh50yMduufTgTUFhR5eVOiv9rXyWkUoFStVMdNaKYqZ9G5XNjzeVF+nZd1vsueBhflmr01zp/FBvnq5tMASoydQ== X-Google-Smtp-Source: AGHT+IE7oj8cWPSCaxt5CQYyuoPj9qZ8+qZ2rNNonqzdkQhJTyYhmO6OUaTB/BT2ljsdoTa09BHp X-Received: by 2002:a05:622a:388:b0:42c:8054:8a with SMTP id j8-20020a05622a038800b0042c8054008amr23974230qtx.27.1708420644975; Tue, 20 Feb 2024 01:17:24 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708420644; cv=pass; d=google.com; s=arc-20160816; b=DZWlN5TLuTO34btVxn7X9zRWDuNvngNaVCpjRUP7SdKyCSK2XQi8cmJrYSJB++xwSF H6mnk6MkVhmG1b9kSzS9er+ZUtcTJVdHydY1XQBf6nid2NPOe423Yr5evU5HP4rxVxoE AmlI5naJziFIoaeqwgnSQSIKnGEjyy0ZSSRxy67tL1Y/6YsJY/VJjO9Ff9h24QOwBjO8 pEpWTBgCPzve0Znu7CtxJjWvDp5cyIzfuLsw1fDsOjrVY2BFLfjGy+xonbYOWzQQl59U 6HGv6rL9OpvjRWP4jyYIBU+atSkj4qXhpoE+sv2qw8+zSVRfk4NwJg2LAQAV0D2Maw5a D5FQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :from:dkim-signature; bh=bHRJ5uavxHQACQ5cYO9Ea7N25IBRyUXaZPA2PXvjQX0=; fh=8PQBN+Atv6X3QNBaIwSal/x2Vl8DvvUcGrlqaIztMTk=; b=YIiv/t0J5Hv9WsUIngwnQ+WKXfZL0Y+lOszc5LSStCKZAEbL5lZoTvSZAx3RRhcJDd U4VJ7FRIS9bYC+PrxLsjjzDOpUuA5zTmCDWg3pUK8jmM5/qIzklRrgb0r0ONfowYro3i 00fps58lDR3dCkEFP3A0Dxn5pEwTtPI+cvon0duF4dIb5Ef15HBXymr/lnyhMZIQc8U3 SpVNIcPzIqd39xnSj16S9OoaL3OKc6ufzfSdrMCSdM7lPAs02oR1haxwpV5Xc1sdsqdF LzDj/05MLhM3c5a2CZtnqU3g+yq/gqifhPPIj2IZNl/Fsc5Xiea3QA4uV5071CJlKch7 bzHQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=cETYwYuS; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-72673-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-72673-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id q1-20020a05622a030100b0042c5c5855e1si8788596qtw.736.2024.02.20.01.17.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 20 Feb 2024 01:17:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-72673-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=cETYwYuS; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-72673-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-72673-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id A35491C24161 for ; Tue, 20 Feb 2024 09:17:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3584360DFC; Tue, 20 Feb 2024 09:14:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="cETYwYuS" Received: from mail-lj1-f173.google.com (mail-lj1-f173.google.com [209.85.208.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8AEC35D754; Tue, 20 Feb 2024 09:14:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.208.173 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708420469; cv=none; b=E63z4UwLydBdsOFg/JPehxHo3OaurKuUIOVoYblRNF2LkjE6sl4eAv5cjN0Hwmofdw4GEYQTwPlO+brxa03GXc35DXkAk6qDmNKPXhjlx6LStCGDvCOhSrqaGJTHVwKMj4RGTR4ZIS3g/rTLPBgcRUDYAWKL2eK1OyUPvoPrx7w= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708420469; c=relaxed/simple; bh=RtTybUor9/LxymR5f14KPmgtgO8KSgVPbZN0ZPDUpNQ=; h=From:Message-ID:Date:MIME-Version:Subject:To:Cc:References: In-Reply-To:Content-Type; b=c1zKKYlM5PlgKh5DoGg8xmHyZGsDKZbI8VgMy62Bl9YGLTCjMl/aIOm5Wi2tsJEDxuXzHDvKMi9xeguE3EdTnWN6bhvqGL0tZnfoNpbP9c/7++fu9S4xI4Ce4hRdtvvPOw83H8DtBVSzjEOb/4Pzu8UwEPAnQhcFPduuDHXHehU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=cETYwYuS; arc=none smtp.client-ip=209.85.208.173 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-lj1-f173.google.com with SMTP id 38308e7fff4ca-2d241ff062cso18768511fa.3; Tue, 20 Feb 2024 01:14:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1708420466; x=1709025266; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:from:to:cc:subject:date:message-id:reply-to; bh=bHRJ5uavxHQACQ5cYO9Ea7N25IBRyUXaZPA2PXvjQX0=; b=cETYwYuSNYFf8t7dqPDj/WupuK4boT7M8VWuFhuZjuE65CZXNDD9xhXS75NETbFWAz P5hvaSs8TUPZDSGZM4eLy+Uu8B2bw3mUC0PFBCuUsc065mJ2/Q7t9RbIZJj3OuqJIo9k nM5r8vFHpPT3Y0BoSq3jSJA7mMXs+RVLh0h6zr4qIEw4gKpL59R2v34V4D+3jVeCYJCc oD4tuznzkLA0jBa8CLKb/LjvJiTj4uBx3Y8fSF4O06p0DFCeOF4ewmgnL8MC9YYzuwSt CZT+T/Wj3vBRi/EjKDgBYBSy4fB4DO65iztA2jeQpirAKFjyNDwr26hlXj7EN7O0vQgK ESAw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708420466; x=1709025266; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=bHRJ5uavxHQACQ5cYO9Ea7N25IBRyUXaZPA2PXvjQX0=; b=RHK9oCmA35vj1fYMqh2D8YXCgDQaO685PYnYjlTCIh/HNZBr/rr+5EPSuOQdUMSVDJ m7ymUnMguFRZ3i/PBEcuhp32mRm2Hz7JJp2YjyiJyjdDJO6GTehknSRN7UdY7NZIv51G tzvXQnVBPbOcmS3/sDU5t+d2bu6Mh7uqe7wKRI4SwU2HtFDHYprnWLoYG0MShl8rQtlD BBe3xWl/OzmRUD4QTlL7Renhv+t2NaRXqHZCcKocy2BY+TwUeWU2J+/N6/UTqtwak0MD YKylPoSvpIzVfrC4xoqsVKMYsI1GFUVr816XVUhQTASZYxJ+EO114bhCGO6F3D1P2+I7 r8hg== X-Forwarded-Encrypted: i=1; AJvYcCWSnGxB+WIZNq35uFZrDqDfZ30OMg8iVuOUZX8GHoFYK+WPu83qDBIm3HLuayyHEBvCUXyqjZCt6Emf3h80/ds9yFINSmrcv9LWvAqBU2UATh2y6Lyq9CA2Im6JPTmHjzQk3CEBChdMZaT7ICPU3JQXHlmQ301XcU7wOHYt6xTaSsM1cdKe4c33xDjv8JBb608jUKWlXaCMUJf+VNVsNf47SIGqY5+QIy6ShSJJKAJ5V2mBDTuqLX0F6g== X-Gm-Message-State: AOJu0Yxyw3K5TR4BoCaYdn33QKH/bePzN/aTd6o/pM+sWCxLexgywh67 9YBFOsMZ0GShXXQnIPmnkCVK0/PRnmvvF4GTYTDaZ6hgvIQ2yRvI X-Received: by 2002:a2e:bc09:0:b0:2d2:38b6:661b with SMTP id b9-20020a2ebc09000000b002d238b6661bmr4331135ljf.33.1708420465340; Tue, 20 Feb 2024 01:14:25 -0800 (PST) Received: from [10.24.67.19] ([15.248.2.239]) by smtp.gmail.com with ESMTPSA id bt21-20020a056000081500b0033d1f25b798sm12629258wrb.82.2024.02.20.01.14.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 20 Feb 2024 01:14:25 -0800 (PST) From: Paul Durrant X-Google-Original-From: Paul Durrant Message-ID: Date: Tue, 20 Feb 2024 09:14:23 +0000 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Reply-To: paul@xen.org Subject: Re: [PATCH v13 00/21] KVM: xen: update shared_info and vcpu_info handling Content-Language: en-US To: Sean Christopherson Cc: Paolo Bonzini , Jonathan Corbet , Christian Borntraeger , Janosch Frank , Claudio Imbrenda , David Hildenbrand , Heiko Carstens , Vasily Gorbik , Alexander Gordeev , Sven Schnelle , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , David Woodhouse , Shuah Khan , kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, linux-kselftest@vger.kernel.org References: <20240215152916.1158-1-paul@xen.org> Organization: Xen Project In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 19/02/2024 22:06, Sean Christopherson wrote: > On Thu, Feb 15, 2024, Paul Durrant wrote: >> David Woodhouse (1): >> KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues >> >> Paul Durrant (19): >> KVM: pfncache: Add a map helper function >> KVM: pfncache: remove unnecessary exports >> KVM: x86/xen: mark guest pages dirty with the pfncache lock held >> KVM: pfncache: add a mark-dirty helper >> KVM: pfncache: remove KVM_GUEST_USES_PFN usage >> KVM: pfncache: stop open-coding offset_in_page() >> KVM: pfncache: include page offset in uhva and use it consistently >> KVM: pfncache: allow a cache to be activated with a fixed (userspace) >> HVA >> KVM: x86/xen: separate initialization of shared_info cache and content >> KVM: x86/xen: re-initialize shared_info if guest (32/64-bit) mode is >> set >> KVM: x86/xen: allow shared_info to be mapped by fixed HVA >> KVM: x86/xen: allow vcpu_info to be mapped by fixed HVA >> KVM: selftests: map Xen's shared_info page using HVA rather than GFN >> KVM: selftests: re-map Xen's vcpu_info using HVA rather than GPA >> KVM: x86/xen: advertize the KVM_XEN_HVM_CONFIG_SHARED_INFO_HVA >> capability >> KVM: x86/xen: split up kvm_xen_set_evtchn_fast() >> KVM: x86/xen: don't block on pfncache locks in >> kvm_xen_set_evtchn_fast() >> KVM: pfncache: check the need for invalidation under read lock first >> KVM: x86/xen: allow vcpu_info content to be 'safely' copied >> >> Sean Christopherson (1): >> KVM: s390: Refactor kvm_is_error_gpa() into kvm_is_gpa_in_memslot() >> >> Documentation/virt/kvm/api.rst | 53 ++- >> arch/s390/kvm/diag.c | 2 +- >> arch/s390/kvm/gaccess.c | 14 +- >> arch/s390/kvm/kvm-s390.c | 4 +- >> arch/s390/kvm/priv.c | 4 +- >> arch/s390/kvm/sigp.c | 2 +- >> arch/x86/kvm/x86.c | 7 +- >> arch/x86/kvm/xen.c | 361 +++++++++++------ >> include/linux/kvm_host.h | 49 ++- >> include/linux/kvm_types.h | 8 - >> include/uapi/linux/kvm.h | 9 +- >> .../selftests/kvm/x86_64/xen_shinfo_test.c | 59 ++- >> virt/kvm/pfncache.c | 382 ++++++++++-------- >> 13 files changed, 591 insertions(+), 363 deletions(-) > > Except for the read_trylock() patch, just a few nits that I can fixup when > applying, though I'll defeinitely want your eyeballs on the end result as they > tweaks aren't _that_ trivial. > > Running tests now, if all goes well I'll push to kvm-x86 within the hour. Oh, I read this last and you already made the changes :-) I'll check kvm-x86. Thanks.