On Thu, 2022-04-14 at 15:20 +0200, Vitaly Kuznetsov wrote: > To make terminology between Hyper-V-on-KVM and KVM-on-Hyper-V consistent, > rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'. The change > eliminates the use of confusing 'direct' and adds the missing underscore. > > No functional change. > > Signed-off-by: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx> > --- > arch/x86/include/asm/kvm-x86-ops.h | 2 +- > arch/x86/include/asm/kvm_host.h | 2 +- > arch/x86/kvm/svm/svm_onhyperv.c | 2 +- > arch/x86/kvm/svm/svm_onhyperv.h | 6 +++--- > arch/x86/kvm/vmx/vmx.c | 6 +++--- > arch/x86/kvm/x86.c | 6 +++--- > 6 files changed, 12 insertions(+), 12 deletions(-) > > diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h > index 96e4e9842dfc..1e13612a6446 100644 > --- a/arch/x86/include/asm/kvm-x86-ops.h > +++ b/arch/x86/include/asm/kvm-x86-ops.h > @@ -121,7 +121,7 @@ KVM_X86_OP_OPTIONAL(vm_move_enc_context_from) > KVM_X86_OP(get_msr_feature) > KVM_X86_OP(can_emulate_instruction) > KVM_X86_OP(apic_init_signal_blocked) > -KVM_X86_OP_OPTIONAL(enable_direct_tlbflush) > +KVM_X86_OP_OPTIONAL(enable_l2_tlb_flush) > KVM_X86_OP_OPTIONAL(migrate_timers) > KVM_X86_OP(msr_filter_changed) > KVM_X86_OP(complete_emulated_msr) > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index 168600490bd1..f4fd6da1f565 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -1526,7 +1526,7 @@ struct kvm_x86_ops { > void *insn, int insn_len); > > bool (*apic_init_signal_blocked)(struct kvm_vcpu *vcpu); > - int (*enable_direct_tlbflush)(struct kvm_vcpu *vcpu); > + int (*enable_l2_tlb_flush)(struct kvm_vcpu *vcpu); > > void (*migrate_timers)(struct kvm_vcpu *vcpu); > void (*msr_filter_changed)(struct kvm_vcpu *vcpu); > diff --git a/arch/x86/kvm/svm/svm_onhyperv.c b/arch/x86/kvm/svm/svm_onhyperv.c > index 8cdc62c74a96..69a7014d1cef 100644 > --- a/arch/x86/kvm/svm/svm_onhyperv.c > +++ b/arch/x86/kvm/svm/svm_onhyperv.c > @@ -14,7 +14,7 @@ > #include "kvm_onhyperv.h" > #include "svm_onhyperv.h" > > -int svm_hv_enable_direct_tlbflush(struct kvm_vcpu *vcpu) > +int svm_hv_enable_l2_tlb_flush(struct kvm_vcpu *vcpu) > { > struct hv_enlightenments *hve; > struct hv_partition_assist_pg **p_hv_pa_pg = > diff --git a/arch/x86/kvm/svm/svm_onhyperv.h b/arch/x86/kvm/svm/svm_onhyperv.h > index e2fc59380465..d6ec4aeebedb 100644 > --- a/arch/x86/kvm/svm/svm_onhyperv.h > +++ b/arch/x86/kvm/svm/svm_onhyperv.h > @@ -13,7 +13,7 @@ > > static struct kvm_x86_ops svm_x86_ops; > > -int svm_hv_enable_direct_tlbflush(struct kvm_vcpu *vcpu); > +int svm_hv_enable_l2_tlb_flush(struct kvm_vcpu *vcpu); > > static inline void svm_hv_init_vmcb(struct vmcb *vmcb) > { > @@ -51,8 +51,8 @@ static inline void svm_hv_hardware_setup(void) > > vp_ap->nested_control.features.directhypercall = 1; > } > - svm_x86_ops.enable_direct_tlbflush = > - svm_hv_enable_direct_tlbflush; > + svm_x86_ops.enable_l2_tlb_flush = > + svm_hv_enable_l2_tlb_flush; > } > } > > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > index a81e44852f54..2b3c73b49dcb 100644 > --- a/arch/x86/kvm/vmx/vmx.c > +++ b/arch/x86/kvm/vmx/vmx.c > @@ -461,7 +461,7 @@ static unsigned long host_idt_base; > static bool __read_mostly enlightened_vmcs = true; > module_param(enlightened_vmcs, bool, 0444); > > -static int hv_enable_direct_tlbflush(struct kvm_vcpu *vcpu) > +static int hv_enable_l2_tlb_flush(struct kvm_vcpu *vcpu) > { > struct hv_enlightened_vmcs *evmcs; > struct hv_partition_assist_pg **p_hv_pa_pg = > @@ -8151,8 +8151,8 @@ static int __init vmx_init(void) > } > > if (ms_hyperv.nested_features & HV_X64_NESTED_DIRECT_FLUSH) > - vmx_x86_ops.enable_direct_tlbflush > - = hv_enable_direct_tlbflush; > + vmx_x86_ops.enable_l2_tlb_flush > + = hv_enable_l2_tlb_flush; > > } else { > enlightened_vmcs = false; > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index d3839e648ab3..d620c56bc526 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -4365,7 +4365,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > kvm_x86_ops.nested_ops->get_state(NULL, NULL, 0) : 0; > break; > case KVM_CAP_HYPERV_DIRECT_TLBFLUSH: > - r = kvm_x86_ops.enable_direct_tlbflush != NULL; > + r = kvm_x86_ops.enable_l2_tlb_flush != NULL; > break; > case KVM_CAP_HYPERV_ENLIGHTENED_VMCS: > r = kvm_x86_ops.nested_ops->enable_evmcs != NULL; > @@ -5275,10 +5275,10 @@ static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu, > } > return r; > case KVM_CAP_HYPERV_DIRECT_TLBFLUSH: > - if (!kvm_x86_ops.enable_direct_tlbflush) > + if (!kvm_x86_ops.enable_l2_tlb_flush) > return -ENOTTY; > > - return static_call(kvm_x86_enable_direct_tlbflush)(vcpu); > + return static_call(kvm_x86_enable_l2_tlb_flush)(vcpu); > > case KVM_CAP_HYPERV_ENFORCE_CPUID: > return kvm_hv_set_enforce_cpuid(vcpu, cap->args[0]); Nitpick: You may want to put that patch at the start of the series, since it doesn't depend on it. Reviewed-by: Maxim Levitsky <mlevitsk@xxxxxxxxxx> Best regards, Maxim Levitsky