Received: by 2002:a05:7412:cfc7:b0:fc:a2b0:25d7 with SMTP id by7csp1819902rdb; Tue, 20 Feb 2024 07:58:12 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCV6jud/eGQzBcqNPzYzB4xMgtWeI34bk6vVF20ruQ2Z7TKFQJO/+SX+ODqqxM7A7wWh0Oikkq8MRFbrR0H07AnK+G8ulbwOHYdgi5Lpqw== X-Google-Smtp-Source: AGHT+IHaqp99X6MCCyjKcb8YQ9fnBWfkXcvhe+q/ULBmurZfOFexy/m+1bUt6OC4p0gHXWQo8nho X-Received: by 2002:a17:90b:4ace:b0:299:3efe:8209 with SMTP id mh14-20020a17090b4ace00b002993efe8209mr7639421pjb.4.1708444692494; Tue, 20 Feb 2024 07:58:12 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708444692; cv=pass; d=google.com; s=arc-20160816; b=RysErx9usz1sEAVcfrjNhUTFaekRR+NeYVA3Sj/SNppzNPELlIwYDok0SQJ6wDlxPI mVJWYJahCc7qfQJhh99ZpCwNf3QzPAecS6czsaiDL9r9Pa90tdFTVVwQ0BBQ0XrpqNVu ykfHm2Z4yZtriLRbe5kQjj6eS9x0bIU6YU8WlC/84KgHvZ2dX5pH1AANZ5UpoUretViu wIESaXMyu8je7h3iZ1aIfjGprOZar1jCzmIx9uoM9n7oHZy1AX1NBbtx9oD5DiyMnMUU 75PMlzwiAQ+4uUCL6eLhrw9yaOr3g4PhF9unN2jZu2z2nyE+Hx2FKH8Iam/mwyztkxef 3SVw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=to:from:subject:message-id:references:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:in-reply-to:date:dkim-signature; bh=nkZ1YNi4HdlEBdTOsrosj2I/p2QRJpg3Qe1Xk4lNWF0=; fh=TRuuOvfRq1/c/M74xqKfRTkARVa87qwlnthIYJoP9UE=; b=c3ZIZZ4H09X/Dx3V6u89yMbakbwq/BkHizE0sqO8XYgBaMEcHf8YgCuVoiIe887H0x GehbDCTQGEQFE0Ibexrw215eL+AgP/NfTbIHbeathIzFJhn1zcN3zblpMjwMR0ie5UTO SHb3RmTn1nsIp5onO7viY11WEDPS6Kr1s8vwPuAEyfXFpy3oGeDL+yn04tNYvy/dN6yu IinhOyn/N4yrtGkPE23mKWs6D6e4U189HBWZ6M2XrzGdVEFreC3MWY4QTgcGbYoQshFD QmZd0Oq8R2TdbCSKKneRCZpKU14mTDrzG1V39eJUDOCrvGwFFkKycs12lm/EcBEnTB0x WDQg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=p2EhsI2l; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-73279-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-73279-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id pd18-20020a17090b1dd200b0029999892009si3996305pjb.163.2024.02.20.07.58.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 20 Feb 2024 07:58:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-73279-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=p2EhsI2l; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-73279-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-73279-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id A7B1DB229CA for ; Tue, 20 Feb 2024 15:55:55 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9F5656A8A9; Tue, 20 Feb 2024 15:55:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="p2EhsI2l" Received: from mail-yw1-f202.google.com (mail-yw1-f202.google.com [209.85.128.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 117BE76058 for ; Tue, 20 Feb 2024 15:55:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.202 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708444545; cv=none; b=Vdh/swyA/AUzH30aeqVi+3P7tIsWiwS7WwqrrSwmadHfdCiEfkzo0smYlZ1w93OXhznhtthPypFpG1ge3EIHEro+FNQb79eG3RxyU4R+puM4AJiG1Bsn0BymtkZr0KS9alWIGUerlZA1EvsbyZUxCoDzuw1NRBZ7iKiCDxHZ23Q= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708444545; c=relaxed/simple; bh=Kz0GA9Y94W0SFhelWwox2nUv5tXBxEbev4X5jMa+djk=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Content-Type; b=Vp+ykVdIr5eeaL3T8s4SMPEnWiGX1DCtmz5g1Li4maJw78HMcdGW9oO5HyTjgAyrDZR2ybXurPYmYfxa2z3IbN6f3bMhJHYEkZ2SM/+jbhAnR3Yj+qmiiYvHXs9m4YCp+2TwBqAWvdHFEakZp0nUXS69l8eJUG8zfSudFzNTi/g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=p2EhsI2l; arc=none smtp.client-ip=209.85.128.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-yw1-f202.google.com with SMTP id 00721157ae682-5ffee6fcdc1so72519537b3.2 for ; Tue, 20 Feb 2024 07:55:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1708444543; x=1709049343; darn=vger.kernel.org; h=to:from:subject:message-id:references:mime-version:in-reply-to:date :from:to:cc:subject:date:message-id:reply-to; bh=nkZ1YNi4HdlEBdTOsrosj2I/p2QRJpg3Qe1Xk4lNWF0=; b=p2EhsI2lVDdB7akSjITmV+58d9qTKwuMEdrSp3830ZiHSdU0mDJR+gTOMen74z130I R3iz4/oR8riFKKW7Eqeu06w77IeKsZC0d+W5tJD1PJSNQCl0+cP+uhMDc/w7DRefN2ne aQW3r8DfSGG1ZLO4NutXsF0wdIdY0QvVSRJWyjf6Go4P4gZRQH01amUDHTVfmMJhd/BW rhi1bD9k+EYoXy6/LTbqW8I2LRS0DmlN6E00DuLWi/9v5DVOLfA/XHBECVhYvZfGAs0Q 0Q4jtgtN6XONO37Tlus7+J4PnzB2v7eUspOwU3r12hMZZJ0HR4dyzziUpyxEM9D1R7bN 4NJg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708444543; x=1709049343; h=to:from:subject:message-id:references:mime-version:in-reply-to:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=nkZ1YNi4HdlEBdTOsrosj2I/p2QRJpg3Qe1Xk4lNWF0=; b=WDRM4QcKzFuJbzbvsNtOnW1m++apEALklzJ/fpvspT3yEGaMFQmQEeHIb0w6ORDPjR IFlaTTMcTH+btSsmwcuGb5FXDigRjE51zERZ0yfXp7aUWcq/723h7w96FxQwRvhu71sh SNHukJeqZw79x7432nZcNj8lFCGDFJsp9ZFpsH3fTpLfq++H1ccHrLQdAEdJ8rCd6bsT hN1pOuEs7a/FX/mudKMiE6f0kf3WqgF6UfjldhwUXSAW8Q+rh3AIyGciaAqwv+RGu3PB RgmoInt6HgAWkA9H/nfV55gEDbaiAmZTygyiiHwg1f/oEL1n7snbNXWroZbcLDRg5Pdj DnjA== X-Forwarded-Encrypted: i=1; AJvYcCUr17q/RpUzD08l+GQHkVuOO3TjiM4+VwcQ1YUbMNnXDmpfo6lYQBODS03vNT7vsIxt4qUDQHuqT/3w89piVyPuvW63TbrrK5VgPhiL X-Gm-Message-State: AOJu0YzRQBrtxVkq8z6MibCkFYq8sush6CFB/QGTETYjAm7rJAz6wIeg 3z5aGRjiS2AypKBeF6/FvSy1lmgyAgvMhRfq2jLf3YFyfrQb5tfv3huUs+IOITJaGrcfuQTNfAG vFQ== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a81:ee0a:0:b0:608:66be:2f71 with SMTP id l10-20020a81ee0a000000b0060866be2f71mr302250ywm.9.1708444543193; Tue, 20 Feb 2024 07:55:43 -0800 (PST) Date: Tue, 20 Feb 2024 07:55:13 -0800 In-Reply-To: <20240215152916.1158-1-paul@xen.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240215152916.1158-1-paul@xen.org> X-Mailer: git-send-email 2.44.0.rc0.258.g7320e95886-goog Message-ID: <170838297541.2281798.7838961694439257911.b4-ty@google.com> Subject: Re: [PATCH v13 00/21] KVM: xen: update shared_info and vcpu_info handling From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini , Jonathan Corbet , Christian Borntraeger , Janosch Frank , Claudio Imbrenda , David Hildenbrand , Heiko Carstens , Vasily Gorbik , Alexander Gordeev , Sven Schnelle , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , David Woodhouse , Shuah Khan , kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, linux-kselftest@vger.kernel.org, Paul Durrant Content-Type: text/plain; charset="utf-8" On Thu, 15 Feb 2024 15:28:55 +0000, Paul Durrant wrote: > From: Paul Durrant > > This series contains a new patch from Sean added since v12 [1]: > > * KVM: s390: Refactor kvm_is_error_gpa() into kvm_is_gpa_in_memslot() > > This frees up the function name kvm_is_error_gpa() such that it can then be > re-defined in: > > [...] *sigh* I forgot to hit "send" on this yesterday. But lucky for me, that worked out in my favor as I needed to rebase on top of kvm/kvm-uapi to avoid pointless conflicts in the uapi headeres. So.... Applied to kvm-x86 xen, minus 18 and 19 (trylock stuff) and 21 (locking cleanup that we're doing elsewhere). Paul and David, please take (another) look at the end result to make sure you don't object to any of my tweaks and that I didn't botch anything. s390 folks, I'm applying/pushing now to get it into -next asap, but I'll make sure to get acks/reviews on patch 08/21 before I do anything else with this branch/series. Thanks! [01/21] KVM: pfncache: Add a map helper function https://github.com/kvm-x86/linux/commit/f39b80e3ff12 [02/21] KVM: pfncache: remove unnecessary exports https://github.com/kvm-x86/linux/commit/41496fffc0e1 [03/21] KVM: x86/xen: mark guest pages dirty with the pfncache lock held https://github.com/kvm-x86/linux/commit/4438355ec6e1 [04/21] KVM: pfncache: add a mark-dirty helper https://github.com/kvm-x86/linux/commit/78b74638eb6d [05/21] KVM: pfncache: remove KVM_GUEST_USES_PFN usage https://github.com/kvm-x86/linux/commit/a4bff3df5147 [06/21] KVM: pfncache: stop open-coding offset_in_page() https://github.com/kvm-x86/linux/commit/53e63e953e14 [07/21] KVM: pfncache: include page offset in uhva and use it consistently https://github.com/kvm-x86/linux/commit/406c10962a4c [08/21] KVM: s390: Refactor kvm_is_error_gpa() into kvm_is_gpa_in_memslot() https://github.com/kvm-x86/linux/commit/9e7325acb3dc [09/21] KVM: pfncache: allow a cache to be activated with a fixed (userspace) HVA https://github.com/kvm-x86/linux/commit/721f5b0dda78 [10/21] KVM: x86/xen: separate initialization of shared_info cache and content https://github.com/kvm-x86/linux/commit/c01c55a34f28 [11/21] KVM: x86/xen: re-initialize shared_info if guest (32/64-bit) mode is set https://github.com/kvm-x86/linux/commit/21b99e4d6db6 [12/21] KVM: x86/xen: allow shared_info to be mapped by fixed HVA https://github.com/kvm-x86/linux/commit/10dcbfc46724 [13/21] KVM: x86/xen: allow vcpu_info to be mapped by fixed HVA https://github.com/kvm-x86/linux/commit/16877dd45f98 [14/21] KVM: selftests: map Xen's shared_info page using HVA rather than GFN https://github.com/kvm-x86/linux/commit/95c27ed8619b [15/21] KVM: selftests: re-map Xen's vcpu_info using HVA rather than GPA https://github.com/kvm-x86/linux/commit/5359bf19a3f0 [16/21] KVM: x86/xen: advertize the KVM_XEN_HVM_CONFIG_SHARED_INFO_HVA capability https://github.com/kvm-x86/linux/commit/49668ce7e1ae [17/21] KVM: x86/xen: split up kvm_xen_set_evtchn_fast() (not applied) [18/21] KVM: x86/xen: don't block on pfncache locks in kvm_xen_set_evtchn_fast() (not applied) [19/21] KVM: pfncache: check the need for invalidation under read lock first https://github.com/kvm-x86/linux/commit/21dadfcd665e [20/21] KVM: x86/xen: allow vcpu_info content to be 'safely' copied https://github.com/kvm-x86/linux/commit/dadeabc3b6fa [21/21] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues (not applied) -- https://github.com/kvm-x86/linux/tree/next