1. 23 11月, 2021 2 次提交
  2. 22 11月, 2021 2 次提交
    • M
      KVM: arm64: Get rid of host SVE tracking/saving · 8383741a
      Marc Zyngier 提交于
      The SVE host tracking in KVM is pretty involved. It relies on a
      set of flags tracking the ownership of the SVE register, as well
      as that of the EL0 access.
      
      It is also pretty scary: __hyp_sve_save_host() computes
      a thread_struct pointer and obtains a sve_state which gets directly
      accessed without further ado, even on nVHE. How can this even work?
      
      The answer to that is that it doesn't, and that this is mostly dead
      code. Closer examination shows that on executing a syscall, userspace
      loses its SVE state entirely. This is part of the ABI. Another
      thing to notice is that although the kernel provides helpers such as
      kernel_neon_begin()/end(), they only deal with the FP/NEON state,
      and not SVE.
      
      Given that you can only execute a guest as the result of a syscall,
      and that the kernel cannot use SVE by itself, it becomes pretty
      obvious that there is never any host SVE state to save, and that
      this code is only there to increase confusion.
      
      Get rid of the TIF_SVE tracking and host save infrastructure altogether.
      Reviewed-by: NMark Brown <broonie@kernel.org>
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      8383741a
    • M
      KVM: arm64: Reorder vcpu flag definitions · 892fd259
      Marc Zyngier 提交于
      The vcpu arch flags are in an interesting, semi random order.
      As I have made the mistake of reusing a flag once, let's rework
      this in an order that I find a bit less confusing.
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      892fd259
  3. 08 11月, 2021 1 次提交
  4. 11 10月, 2021 2 次提交
  5. 01 10月, 2021 1 次提交
  6. 20 8月, 2021 4 次提交
  7. 19 8月, 2021 1 次提交
  8. 18 8月, 2021 1 次提交
  9. 02 8月, 2021 1 次提交
    • M
      KVM: arm64: Remove PMSWINC_EL0 shadow register · 7a3ba309
      Marc Zyngier 提交于
      We keep an entry for the PMSWINC_EL0 register in the vcpu structure,
      while *never* writing anything there outside of reset.
      
      Given that the register is defined as write-only, that we always
      trap when this register is accessed, there is little point in saving
      anything anyway.
      
      Get rid of the entry, and save a mighty 8 bytes per vcpu structure.
      
      We still need to keep it exposed to userspace in order to preserve
      backward compatibility with previously saved VMs. Since userspace
      cannot expect any effect of writing to PMSWINC_EL0, treat the
      register as RAZ/WI for the purpose of userspace access.
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      Link: https://lore.kernel.org/r/20210719123902.1493805-5-maz@kernel.org
      7a3ba309
  10. 24 6月, 2021 1 次提交
  11. 22 6月, 2021 3 次提交
  12. 18 6月, 2021 2 次提交
  13. 17 4月, 2021 4 次提交
  14. 07 4月, 2021 4 次提交
  15. 25 3月, 2021 1 次提交
  16. 19 3月, 2021 4 次提交
  17. 18 3月, 2021 3 次提交
  18. 09 2月, 2021 1 次提交
    • V
      KVM: Raise the maximum number of user memslots · 4fc096a9
      Vitaly Kuznetsov 提交于
      Current KVM_USER_MEM_SLOTS limits are arch specific (512 on Power, 509 on x86,
      32 on s390, 16 on MIPS) but they don't really need to be. Memory slots are
      allocated dynamically in KVM when added so the only real limitation is
      'id_to_index' array which is 'short'. We don't have any other
      KVM_MEM_SLOTS_NUM/KVM_USER_MEM_SLOTS-sized statically defined structures.
      
      Low KVM_USER_MEM_SLOTS can be a limiting factor for some configurations.
      In particular, when QEMU tries to start a Windows guest with Hyper-V SynIC
      enabled and e.g. 256 vCPUs the limit is hit as SynIC requires two pages per
      vCPU and the guest is free to pick any GFN for each of them, this fragments
      memslots as QEMU wants to have a separate memslot for each of these pages
      (which are supposed to act as 'overlay' pages).
      Signed-off-by: NVitaly Kuznetsov <vkuznets@redhat.com>
      Message-Id: <20210127175731.2020089-3-vkuznets@redhat.com>
      Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
      4fc096a9
  19. 26 1月, 2021 1 次提交
  20. 22 12月, 2020 1 次提交