All of lore.kernel.org
 help / color / mirror / Atom feed
From: David Matlack <dmatlack@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: Marc Zyngier <maz@kernel.org>, James Morse <james.morse@arm.com>,
	Alexandru Elisei <alexandru.elisei@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	Oliver Upton <oliver.upton@linux.dev>,
	Huacai Chen <chenhuacai@kernel.org>,
	Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Anup Patel <anup@brainfault.org>,
	Atish Patra <atishp@atishpatra.org>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	Sean Christopherson <seanjc@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	David Matlack <dmatlack@google.com>,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Nadav Amit <namit@vmware.com>,
	"Matthew Wilcox (Oracle)" <willy@infradead.org>,
	Vlastimil Babka <vbabka@suse.cz>,
	"Liam R. Howlett" <Liam.Howlett@Oracle.com>,
	Suren Baghdasaryan <surenb@google.com>,
	Peter Xu <peterx@redhat.com>, xu xin <cgel.zte@gmail.com>,
	Arnd Bergmann <arnd@arndb.de>, Yu Zhao <yuzhao@google.com>,
	Colin Cross <ccross@google.com>, Hugh Dickins <hughd@google.com>,
	Ben Gardon <bgardon@google.com>,
	Mingwei Zhang <mizhang@google.com>,
	Krish Sadhukhan <krish.sadhukhan@oracle.com>,
	Ricardo Koller <ricarkol@google.com>,
	Jing Zhang <jingzhangos@google.com>,
	linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev,
	kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org,
	kvm@vger.kernel.org, kvm-riscv@lists.infradead.org,
	linux-riscv@lists.infradead.org
Subject: [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
Date: Thu,  8 Dec 2022 11:38:52 -0800	[thread overview]
Message-ID: <20221208193857.4090582-33-dmatlack@google.com> (raw)
In-Reply-To: <20221208193857.4090582-1-dmatlack@google.com>

Make kvm_flush_remote_tlbs_range() visible in common code and create a
default implementation that just invalidates the whole TLB. This will be
used in future commits to clean up kvm_arch_flush_remote_tlbs_memslot()
and to move the KVM/x86 TDP MMU to common code.

No functional change intended.

Signed-off-by: David Matlack <dmatlack@google.com>
---
 arch/x86/kvm/mmu/mmu_internal.h | 1 -
 include/linux/kvm_host.h        | 1 +
 virt/kvm/kvm_main.c             | 9 +++++++++
 3 files changed, 10 insertions(+), 1 deletion(-)

diff --git a/arch/x86/kvm/mmu/mmu_internal.h b/arch/x86/kvm/mmu/mmu_internal.h
index e44fe7ad3cfb..df815cb84bd2 100644
--- a/arch/x86/kvm/mmu/mmu_internal.h
+++ b/arch/x86/kvm/mmu/mmu_internal.h
@@ -65,7 +65,6 @@ void kvm_mmu_gfn_allow_lpage(const struct kvm_memory_slot *slot, gfn_t gfn);
 bool kvm_mmu_slot_gfn_write_protect(struct kvm *kvm,
 				    struct kvm_memory_slot *slot, u64 gfn,
 				    int min_level);
-void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 unsigned int pte_list_count(struct kvm_rmap_head *rmap_head);
 
 extern int nx_huge_pages;
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index ec3a6de6d54e..d9a7f559d2c5 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -1365,6 +1365,7 @@ int kvm_vcpu_yield_to(struct kvm_vcpu *target);
 void kvm_vcpu_on_spin(struct kvm_vcpu *vcpu, bool usermode_vcpu_not_eligible);
 
 void kvm_flush_remote_tlbs(struct kvm *kvm);
+void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 
 #ifdef KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE
 int kvm_mmu_topup_memory_cache(struct kvm_mmu_memory_cache *mc, int min);
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 0f1d48ed7d57..662ca280c0cf 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -379,6 +379,15 @@ void kvm_flush_remote_tlbs(struct kvm *kvm)
 EXPORT_SYMBOL_GPL(kvm_flush_remote_tlbs);
 #endif
 
+/*
+ * Architectures that support range-based TLB invalidation can override this
+ * function.
+ */
+void __weak kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages)
+{
+	kvm_flush_remote_tlbs(kvm);
+}
+
 static void kvm_flush_shadow_all(struct kvm *kvm)
 {
 	kvm_arch_flush_shadow_all(kvm);
-- 
2.39.0.rc1.256.g54fd8350bd-goog


WARNING: multiple messages have this Message-ID (diff)
From: David Matlack <dmatlack@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: Anshuman Khandual <anshuman.khandual@arm.com>,
	Hugh Dickins <hughd@google.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	kvmarm@lists.linux.dev, Nadav Amit <namit@vmware.com>,
	Colin Cross <ccross@google.com>, Ben Gardon <bgardon@google.com>,
	linux-riscv@lists.infradead.org, kvmarm@lists.cs.columbia.edu,
	Yu Zhao <yuzhao@google.com>, Marc Zyngier <maz@kernel.org>,
	Huacai Chen <chenhuacai@kernel.org>,
	"Matthew Wilcox \(Oracle\)" <willy@infradead.org>,
	Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Krish Sadhukhan <krish.sadhukhan@oracle.com>,
	Palmer Dabbelt <palmer@dabbelt.com>,
	Mingwei Zhang <mizhang@google.com>,
	Albert Ou <aou@eecs.berkeley.edu>, xu xin <cgel.zte@gmail.com>,
	Arnd Bergmann <arnd@arndb.de>,
	"Liam R. Howlett" <Liam.Howlett@Oracle.com>,
	kvm@vger.kernel.org, Atish Patra <atishp@atishpatra.org>,
	David Matlack <dmatlack@google.com>,
	Suren Baghdasaryan <surenb@google.com>,
	Vlastimil Babka <vbabka@suse.cz>,
	linux-arm-kernel@lists.infradead.org, linux-mips@vger.kernel.org,
	kvm-riscv@lists.infradead.org,
	Andrew Morton <akpm@linux-foundation.org>
Subject: [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
Date: Thu,  8 Dec 2022 11:38:52 -0800	[thread overview]
Message-ID: <20221208193857.4090582-33-dmatlack@google.com> (raw)
In-Reply-To: <20221208193857.4090582-1-dmatlack@google.com>

Make kvm_flush_remote_tlbs_range() visible in common code and create a
default implementation that just invalidates the whole TLB. This will be
used in future commits to clean up kvm_arch_flush_remote_tlbs_memslot()
and to move the KVM/x86 TDP MMU to common code.

No functional change intended.

Signed-off-by: David Matlack <dmatlack@google.com>
---
 arch/x86/kvm/mmu/mmu_internal.h | 1 -
 include/linux/kvm_host.h        | 1 +
 virt/kvm/kvm_main.c             | 9 +++++++++
 3 files changed, 10 insertions(+), 1 deletion(-)

diff --git a/arch/x86/kvm/mmu/mmu_internal.h b/arch/x86/kvm/mmu/mmu_internal.h
index e44fe7ad3cfb..df815cb84bd2 100644
--- a/arch/x86/kvm/mmu/mmu_internal.h
+++ b/arch/x86/kvm/mmu/mmu_internal.h
@@ -65,7 +65,6 @@ void kvm_mmu_gfn_allow_lpage(const struct kvm_memory_slot *slot, gfn_t gfn);
 bool kvm_mmu_slot_gfn_write_protect(struct kvm *kvm,
 				    struct kvm_memory_slot *slot, u64 gfn,
 				    int min_level);
-void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 unsigned int pte_list_count(struct kvm_rmap_head *rmap_head);
 
 extern int nx_huge_pages;
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index ec3a6de6d54e..d9a7f559d2c5 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -1365,6 +1365,7 @@ int kvm_vcpu_yield_to(struct kvm_vcpu *target);
 void kvm_vcpu_on_spin(struct kvm_vcpu *vcpu, bool usermode_vcpu_not_eligible);
 
 void kvm_flush_remote_tlbs(struct kvm *kvm);
+void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 
 #ifdef KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE
 int kvm_mmu_topup_memory_cache(struct kvm_mmu_memory_cache *mc, int min);
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 0f1d48ed7d57..662ca280c0cf 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -379,6 +379,15 @@ void kvm_flush_remote_tlbs(struct kvm *kvm)
 EXPORT_SYMBOL_GPL(kvm_flush_remote_tlbs);
 #endif
 
+/*
+ * Architectures that support range-based TLB invalidation can override this
+ * function.
+ */
+void __weak kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages)
+{
+	kvm_flush_remote_tlbs(kvm);
+}
+
 static void kvm_flush_shadow_all(struct kvm *kvm)
 {
 	kvm_arch_flush_shadow_all(kvm);
-- 
2.39.0.rc1.256.g54fd8350bd-goog

_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

WARNING: multiple messages have this Message-ID (diff)
From: David Matlack <dmatlack@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: Marc Zyngier <maz@kernel.org>, James Morse <james.morse@arm.com>,
	 Alexandru Elisei <alexandru.elisei@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	 Oliver Upton <oliver.upton@linux.dev>,
	Huacai Chen <chenhuacai@kernel.org>,
	 Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Anup Patel <anup@brainfault.org>,
	 Atish Patra <atishp@atishpatra.org>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	 Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	 Sean Christopherson <seanjc@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	 David Matlack <dmatlack@google.com>,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	 Nadav Amit <namit@vmware.com>,
	"Matthew Wilcox (Oracle)" <willy@infradead.org>,
	Vlastimil Babka <vbabka@suse.cz>,
	 "Liam R. Howlett" <Liam.Howlett@Oracle.com>,
	Suren Baghdasaryan <surenb@google.com>,
	 Peter Xu <peterx@redhat.com>, xu xin <cgel.zte@gmail.com>,
	Arnd Bergmann <arnd@arndb.de>,  Yu Zhao <yuzhao@google.com>,
	Colin Cross <ccross@google.com>, Hugh Dickins <hughd@google.com>,
	 Ben Gardon <bgardon@google.com>,
	Mingwei Zhang <mizhang@google.com>,
	 Krish Sadhukhan <krish.sadhukhan@oracle.com>,
	Ricardo Koller <ricarkol@google.com>,
	 Jing Zhang <jingzhangos@google.com>,
	linux-arm-kernel@lists.infradead.org,  kvmarm@lists.linux.dev,
	kvmarm@lists.cs.columbia.edu,  linux-mips@vger.kernel.org,
	kvm@vger.kernel.org,  kvm-riscv@lists.infradead.org,
	linux-riscv@lists.infradead.org
Subject: [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
Date: Thu,  8 Dec 2022 11:38:52 -0800	[thread overview]
Message-ID: <20221208193857.4090582-33-dmatlack@google.com> (raw)
In-Reply-To: <20221208193857.4090582-1-dmatlack@google.com>

Make kvm_flush_remote_tlbs_range() visible in common code and create a
default implementation that just invalidates the whole TLB. This will be
used in future commits to clean up kvm_arch_flush_remote_tlbs_memslot()
and to move the KVM/x86 TDP MMU to common code.

No functional change intended.

Signed-off-by: David Matlack <dmatlack@google.com>
---
 arch/x86/kvm/mmu/mmu_internal.h | 1 -
 include/linux/kvm_host.h        | 1 +
 virt/kvm/kvm_main.c             | 9 +++++++++
 3 files changed, 10 insertions(+), 1 deletion(-)

diff --git a/arch/x86/kvm/mmu/mmu_internal.h b/arch/x86/kvm/mmu/mmu_internal.h
index e44fe7ad3cfb..df815cb84bd2 100644
--- a/arch/x86/kvm/mmu/mmu_internal.h
+++ b/arch/x86/kvm/mmu/mmu_internal.h
@@ -65,7 +65,6 @@ void kvm_mmu_gfn_allow_lpage(const struct kvm_memory_slot *slot, gfn_t gfn);
 bool kvm_mmu_slot_gfn_write_protect(struct kvm *kvm,
 				    struct kvm_memory_slot *slot, u64 gfn,
 				    int min_level);
-void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 unsigned int pte_list_count(struct kvm_rmap_head *rmap_head);
 
 extern int nx_huge_pages;
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index ec3a6de6d54e..d9a7f559d2c5 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -1365,6 +1365,7 @@ int kvm_vcpu_yield_to(struct kvm_vcpu *target);
 void kvm_vcpu_on_spin(struct kvm_vcpu *vcpu, bool usermode_vcpu_not_eligible);
 
 void kvm_flush_remote_tlbs(struct kvm *kvm);
+void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 
 #ifdef KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE
 int kvm_mmu_topup_memory_cache(struct kvm_mmu_memory_cache *mc, int min);
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 0f1d48ed7d57..662ca280c0cf 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -379,6 +379,15 @@ void kvm_flush_remote_tlbs(struct kvm *kvm)
 EXPORT_SYMBOL_GPL(kvm_flush_remote_tlbs);
 #endif
 
+/*
+ * Architectures that support range-based TLB invalidation can override this
+ * function.
+ */
+void __weak kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages)
+{
+	kvm_flush_remote_tlbs(kvm);
+}
+
 static void kvm_flush_shadow_all(struct kvm *kvm)
 {
 	kvm_arch_flush_shadow_all(kvm);
-- 
2.39.0.rc1.256.g54fd8350bd-goog


_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv

WARNING: multiple messages have this Message-ID (diff)
From: David Matlack <dmatlack@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: Marc Zyngier <maz@kernel.org>, James Morse <james.morse@arm.com>,
	 Alexandru Elisei <alexandru.elisei@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	 Oliver Upton <oliver.upton@linux.dev>,
	Huacai Chen <chenhuacai@kernel.org>,
	 Aleksandar Markovic <aleksandar.qemu.devel@gmail.com>,
	Anup Patel <anup@brainfault.org>,
	 Atish Patra <atishp@atishpatra.org>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	 Palmer Dabbelt <palmer@dabbelt.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	 Sean Christopherson <seanjc@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	 David Matlack <dmatlack@google.com>,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	 Nadav Amit <namit@vmware.com>,
	"Matthew Wilcox (Oracle)" <willy@infradead.org>,
	Vlastimil Babka <vbabka@suse.cz>,
	 "Liam R. Howlett" <Liam.Howlett@Oracle.com>,
	Suren Baghdasaryan <surenb@google.com>,
	 Peter Xu <peterx@redhat.com>, xu xin <cgel.zte@gmail.com>,
	Arnd Bergmann <arnd@arndb.de>,  Yu Zhao <yuzhao@google.com>,
	Colin Cross <ccross@google.com>, Hugh Dickins <hughd@google.com>,
	 Ben Gardon <bgardon@google.com>,
	Mingwei Zhang <mizhang@google.com>,
	 Krish Sadhukhan <krish.sadhukhan@oracle.com>,
	Ricardo Koller <ricarkol@google.com>,
	 Jing Zhang <jingzhangos@google.com>,
	linux-arm-kernel@lists.infradead.org,  kvmarm@lists.linux.dev,
	kvmarm@lists.cs.columbia.edu,  linux-mips@vger.kernel.org,
	kvm@vger.kernel.org,  kvm-riscv@lists.infradead.org,
	linux-riscv@lists.infradead.org
Subject: [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
Date: Thu,  8 Dec 2022 11:38:52 -0800	[thread overview]
Message-ID: <20221208193857.4090582-33-dmatlack@google.com> (raw)
In-Reply-To: <20221208193857.4090582-1-dmatlack@google.com>

Make kvm_flush_remote_tlbs_range() visible in common code and create a
default implementation that just invalidates the whole TLB. This will be
used in future commits to clean up kvm_arch_flush_remote_tlbs_memslot()
and to move the KVM/x86 TDP MMU to common code.

No functional change intended.

Signed-off-by: David Matlack <dmatlack@google.com>
---
 arch/x86/kvm/mmu/mmu_internal.h | 1 -
 include/linux/kvm_host.h        | 1 +
 virt/kvm/kvm_main.c             | 9 +++++++++
 3 files changed, 10 insertions(+), 1 deletion(-)

diff --git a/arch/x86/kvm/mmu/mmu_internal.h b/arch/x86/kvm/mmu/mmu_internal.h
index e44fe7ad3cfb..df815cb84bd2 100644
--- a/arch/x86/kvm/mmu/mmu_internal.h
+++ b/arch/x86/kvm/mmu/mmu_internal.h
@@ -65,7 +65,6 @@ void kvm_mmu_gfn_allow_lpage(const struct kvm_memory_slot *slot, gfn_t gfn);
 bool kvm_mmu_slot_gfn_write_protect(struct kvm *kvm,
 				    struct kvm_memory_slot *slot, u64 gfn,
 				    int min_level);
-void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 unsigned int pte_list_count(struct kvm_rmap_head *rmap_head);
 
 extern int nx_huge_pages;
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index ec3a6de6d54e..d9a7f559d2c5 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -1365,6 +1365,7 @@ int kvm_vcpu_yield_to(struct kvm_vcpu *target);
 void kvm_vcpu_on_spin(struct kvm_vcpu *vcpu, bool usermode_vcpu_not_eligible);
 
 void kvm_flush_remote_tlbs(struct kvm *kvm);
+void kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages);
 
 #ifdef KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE
 int kvm_mmu_topup_memory_cache(struct kvm_mmu_memory_cache *mc, int min);
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 0f1d48ed7d57..662ca280c0cf 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -379,6 +379,15 @@ void kvm_flush_remote_tlbs(struct kvm *kvm)
 EXPORT_SYMBOL_GPL(kvm_flush_remote_tlbs);
 #endif
 
+/*
+ * Architectures that support range-based TLB invalidation can override this
+ * function.
+ */
+void __weak kvm_flush_remote_tlbs_range(struct kvm *kvm, gfn_t start_gfn, u64 pages)
+{
+	kvm_flush_remote_tlbs(kvm);
+}
+
 static void kvm_flush_shadow_all(struct kvm *kvm)
 {
 	kvm_arch_flush_shadow_all(kvm);
-- 
2.39.0.rc1.256.g54fd8350bd-goog


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  parent reply	other threads:[~2022-12-08 19:41 UTC|newest]

Thread overview: 317+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-12-08 19:38 [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code David Matlack
2022-12-08 19:38 ` David Matlack
2022-12-08 19:38 ` David Matlack
2022-12-08 19:38 ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-09  2:37   ` Yang, Weijiang
2022-12-09  2:37     ` Yang, Weijiang
2022-12-09  2:37     ` Yang, Weijiang
2022-12-09  2:37     ` Yang, Weijiang
2022-12-09 17:24     ` Oliver Upton
2022-12-09 17:24       ` Oliver Upton
2022-12-09 17:24       ` Oliver Upton
2022-12-09 17:24       ` Oliver Upton
2022-12-09 17:40       ` David Matlack
2022-12-09 17:40         ` David Matlack
2022-12-09 17:40         ` David Matlack
2022-12-09 17:40         ` David Matlack
2022-12-12 17:39         ` Sean Christopherson
2022-12-12 17:39           ` Sean Christopherson
2022-12-12 17:39           ` Sean Christopherson
2022-12-12 17:39           ` Sean Christopherson
2022-12-12 18:17           ` Oliver Upton
2022-12-12 18:17             ` Oliver Upton
2022-12-12 18:17             ` Oliver Upton
2022-12-12 18:17             ` Oliver Upton
2022-12-13  1:11             ` David Matlack
2022-12-13  1:11               ` David Matlack
2022-12-13  1:11               ` David Matlack
2022-12-13  1:11               ` David Matlack
2022-12-12 22:50           ` Paolo Bonzini
2022-12-12 22:50             ` Paolo Bonzini
2022-12-12 22:50             ` Paolo Bonzini
2022-12-12 22:50             ` Paolo Bonzini
2022-12-13  1:18             ` David Matlack
2022-12-13  1:18               ` David Matlack
2022-12-13  1:18               ` David Matlack
2022-12-13  1:18               ` David Matlack
2022-12-13  1:42             ` Sean Christopherson
2022-12-13  1:42               ` Sean Christopherson
2022-12-13  1:42               ` Sean Christopherson
2022-12-13  1:42               ` Sean Christopherson
2022-12-14  9:50           ` Lai Jiangshan
2022-12-14  9:50             ` Lai Jiangshan
2022-12-14  9:50             ` Lai Jiangshan
2022-12-14  9:50             ` Lai Jiangshan
2022-12-14 19:42             ` Sean Christopherson
2022-12-14 19:42               ` Sean Christopherson
2022-12-14 19:42               ` Sean Christopherson
2022-12-14 19:42               ` Sean Christopherson
2022-12-15  7:20               ` Lai Jiangshan
2022-12-15  7:20                 ` Lai Jiangshan
2022-12-15  7:20                 ` Lai Jiangshan
2022-12-15  7:20                 ` Lai Jiangshan
2022-12-08 19:38 ` [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 17:48   ` Ben Gardon
2022-12-12 17:48     ` Ben Gardon
2022-12-12 17:48     ` Ben Gardon
2022-12-12 17:48     ` Ben Gardon
2022-12-12 23:11   ` Paolo Bonzini
2022-12-12 23:11     ` Paolo Bonzini
2022-12-12 23:11     ` Paolo Bonzini
2022-12-12 23:11     ` Paolo Bonzini
2022-12-13  1:06     ` David Matlack
2022-12-13  1:06       ` David Matlack
2022-12-13  1:06       ` David Matlack
2022-12-13  1:06       ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 03/37] KVM: MMU: Move tdp_ptep_t " David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 23:15   ` Paolo Bonzini
2022-12-12 23:15     ` Paolo Bonzini
2022-12-12 23:15     ` Paolo Bonzini
2022-12-12 23:15     ` Paolo Bonzini
2023-01-11 22:45     ` David Matlack
2023-01-11 22:45       ` David Matlack
2023-01-11 22:45       ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 05/37] KVM: x86/mmu: Unify TDP MMU and Shadow MMU root refcounts David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 18:07   ` Ben Gardon
2022-12-12 18:07     ` Ben Gardon
2022-12-12 18:07     ` Ben Gardon
2022-12-12 18:07     ` Ben Gardon
2022-12-12 22:32   ` Paolo Bonzini
2022-12-12 22:32     ` Paolo Bonzini
2022-12-12 22:32     ` Paolo Bonzini
2022-12-12 22:32     ` Paolo Bonzini
2022-12-12 22:49     ` David Matlack
2022-12-12 22:49       ` David Matlack
2022-12-12 22:49       ` David Matlack
2022-12-12 22:49       ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 07/37] mm: Introduce architecture-neutral PG_LEVEL macros David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 08/37] KVM: selftests: Stop assuming stats are contiguous in kvm_binary_stats_test David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 09/37] KVM: Move page size stats into common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to " David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 18:24   ` Ben Gardon
2022-12-12 18:24     ` Ben Gardon
2022-12-12 18:24     ` Ben Gardon
2022-12-12 18:24     ` Ben Gardon
2022-12-12 22:30     ` David Matlack
2022-12-12 22:30       ` David Matlack
2022-12-12 22:30       ` David Matlack
2022-12-12 22:30       ` David Matlack
2022-12-12 22:27   ` Paolo Bonzini
2022-12-12 22:27     ` Paolo Bonzini
2022-12-12 22:27     ` Paolo Bonzini
2022-12-12 22:27     ` Paolo Bonzini
2023-01-09 18:55     ` David Matlack
2023-01-09 18:55       ` David Matlack
2023-01-09 18:55       ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 11/37] KVM: MMU: Move RET_PF_* into " David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 12/37] KVM: x86/mmu: Use PG_LEVEL_{PTE,PMD,PUD} in the TDP MMU David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` [RFC PATCH 12/37] KVM: x86/mmu: Use PG_LEVEL_{PTE, PMD, PUD} " David Matlack
2022-12-08 19:38 ` [RFC PATCH 13/37] KVM: MMU: Move sptep_to_sp() to common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 14/37] KVM: MMU: Introduce common macros for TDP page tables David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 15/37] KVM: x86/mmu: Add a common API for inspecting/modifying TDP PTEs David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 16/37] KVM: x86/mmu: Abstract away TDP MMU root lookup David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 19:16   ` Ben Gardon
2022-12-12 19:16     ` Ben Gardon
2022-12-12 19:16     ` Ben Gardon
2022-12-12 19:16     ` Ben Gardon
2022-12-08 19:38 ` [RFC PATCH 18/37] KVM: x86/mmu: Add common API for creating TDP PTEs David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 19/37] KVM: x86/mmu: Add arch hooks for NX Huge Pages David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 19:32   ` Ben Gardon
2022-12-12 19:32     ` Ben Gardon
2022-12-12 19:32     ` Ben Gardon
2022-12-12 19:32     ` Ben Gardon
2022-12-12 21:05     ` David Matlack
2022-12-12 21:05       ` David Matlack
2022-12-12 21:05       ` David Matlack
2022-12-12 21:05       ` David Matlack
2022-12-13  1:02       ` Sean Christopherson
2022-12-13  1:02         ` Sean Christopherson
2022-12-13  1:02         ` Sean Christopherson
2022-12-13  1:02         ` Sean Christopherson
2022-12-08 19:38 ` [RFC PATCH 21/37] KVM: Introduce CONFIG_HAVE_TDP_MMU David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 22/37] KVM: x86: Select HAVE_TDP_MMU if X86_64 David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-09 17:31   ` Oliver Upton
2022-12-09 17:31     ` Oliver Upton
2022-12-09 17:31     ` Oliver Upton
2022-12-09 17:31     ` Oliver Upton
2022-12-09 17:57     ` David Matlack
2022-12-09 17:57       ` David Matlack
2022-12-09 17:57       ` David Matlack
2022-12-09 17:57       ` David Matlack
2022-12-09 18:30       ` Oliver Upton
2022-12-09 18:30         ` Oliver Upton
2022-12-09 18:30         ` Oliver Upton
2022-12-09 18:30         ` Oliver Upton
2022-12-08 19:38 ` [RFC PATCH 24/37] KVM: x86/mmu: Move kvm_mmu_hugepage_adjust() up to fault handler David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 25/37] KVM: x86/mmu: Pass root role to kvm_tdp_mmu_get_vcpu_root_hpa() David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 26/37] KVM: Move page table cache to struct kvm_vcpu David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 27/37] KVM: MMU: Move mmu_page_header_cache to common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 28/37] KVM: MMU: Stub out tracepoints on non-x86 architectures David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 29/37] KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range,address}() together David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` [RFC PATCH 29/37] KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range, address}() together David Matlack
2022-12-08 19:38 ` [RFC PATCH 30/37] KVM: x86/mmu: Rename kvm_flush_remote_tlbs_with_address() David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 31/37] KVM: x86/MMU: Use gfn_t in kvm_flush_remote_tlbs_range() David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` David Matlack [this message]
2022-12-08 19:38   ` [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to " David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-12 22:03   ` Ben Gardon
2022-12-12 22:03     ` Ben Gardon
2022-12-12 22:03     ` Ben Gardon
2022-12-12 22:03     ` Ben Gardon
2022-12-12 22:42     ` David Matlack
2022-12-12 22:42       ` David Matlack
2022-12-12 22:42       ` David Matlack
2022-12-12 22:42       ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 34/37] KVM: MMU: Move the TDP iterator " David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 35/37] KVM: x86/mmu: Move tdp_mmu_max_gfn_exclusive() to tdp_pgtable.c David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 36/37] KVM: x86/mmu: Move is_tdp_mmu_page() to mmu_internal.h David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38 ` [RFC PATCH 37/37] KVM: MMU: Move the TDP MMU to common code David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-08 19:38   ` David Matlack
2022-12-09 19:07 ` [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into " Oliver Upton
2022-12-09 19:07   ` Oliver Upton
2022-12-09 19:07   ` Oliver Upton
2022-12-09 19:07   ` Oliver Upton
2022-12-10  1:07   ` David Matlack
2022-12-10  1:07     ` David Matlack
2022-12-10  1:07     ` David Matlack
2022-12-10  1:07     ` David Matlack
2022-12-12 22:54   ` Paolo Bonzini
2022-12-12 22:54     ` Paolo Bonzini
2022-12-12 22:54     ` Paolo Bonzini
2022-12-12 22:54     ` Paolo Bonzini
2022-12-12 23:26     ` Sean Christopherson
2022-12-12 23:26       ` Sean Christopherson
2022-12-12 23:26       ` Sean Christopherson
2022-12-12 23:26       ` Sean Christopherson
2022-12-12 23:43       ` Paolo Bonzini
2022-12-12 23:43         ` Paolo Bonzini
2022-12-12 23:43         ` Paolo Bonzini
2022-12-12 23:43         ` Paolo Bonzini
2023-01-19 17:14 ` David Matlack
2023-01-19 17:14   ` David Matlack
2023-01-19 17:14   ` David Matlack
2023-01-19 17:23   ` Paolo Bonzini
2023-01-19 17:23     ` Paolo Bonzini
2023-01-19 17:23     ` Paolo Bonzini
2023-01-19 17:24   ` Marc Zyngier
2023-01-19 17:24     ` Marc Zyngier
2023-01-19 17:24     ` Marc Zyngier
2023-01-19 18:38     ` David Matlack
2023-01-19 18:38       ` David Matlack
2023-01-19 18:38       ` David Matlack
2023-01-19 19:04       ` David Matlack
2023-01-19 19:04         ` David Matlack
2023-01-19 19:04         ` David Matlack

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20221208193857.4090582-33-dmatlack@google.com \
    --to=dmatlack@google.com \
    --cc=Liam.Howlett@Oracle.com \
    --cc=akpm@linux-foundation.org \
    --cc=aleksandar.qemu.devel@gmail.com \
    --cc=alexandru.elisei@arm.com \
    --cc=anshuman.khandual@arm.com \
    --cc=anup@brainfault.org \
    --cc=aou@eecs.berkeley.edu \
    --cc=arnd@arndb.de \
    --cc=atishp@atishpatra.org \
    --cc=bgardon@google.com \
    --cc=ccross@google.com \
    --cc=cgel.zte@gmail.com \
    --cc=chenhuacai@kernel.org \
    --cc=hughd@google.com \
    --cc=james.morse@arm.com \
    --cc=jingzhangos@google.com \
    --cc=krish.sadhukhan@oracle.com \
    --cc=kvm-riscv@lists.infradead.org \
    --cc=kvm@vger.kernel.org \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=kvmarm@lists.linux.dev \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-mips@vger.kernel.org \
    --cc=linux-riscv@lists.infradead.org \
    --cc=maz@kernel.org \
    --cc=mizhang@google.com \
    --cc=namit@vmware.com \
    --cc=oliver.upton@linux.dev \
    --cc=palmer@dabbelt.com \
    --cc=paul.walmsley@sifive.com \
    --cc=pbonzini@redhat.com \
    --cc=peterx@redhat.com \
    --cc=ricarkol@google.com \
    --cc=seanjc@google.com \
    --cc=surenb@google.com \
    --cc=suzuki.poulose@arm.com \
    --cc=vbabka@suse.cz \
    --cc=willy@infradead.org \
    --cc=yuzhao@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.