From patchwork Fri Mar 6 13:02:14 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vitaly Kuznetsov X-Patchwork-Id: 11423843 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 5CCB3921 for ; Fri, 6 Mar 2020 13:02:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3DCCB2166E for ; Fri, 6 Mar 2020 13:02:27 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="Q6oy0vfp" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727146AbgCFNC0 (ORCPT ); Fri, 6 Mar 2020 08:02:26 -0500 Received: from us-smtp-1.mimecast.com ([207.211.31.81]:34939 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726733AbgCFNCZ (ORCPT ); Fri, 6 Mar 2020 08:02:25 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1583499744; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=y2yWNaYqjJ/RvKkVVduCbhM3C1I4Zkz6logIvpDXjRI=; b=Q6oy0vfpoUSWpizjCenTyIP2H4xFppaP/aL07Tm8nzTBA6pdF1XE+jmnddi2ZcTyWuBlAa w3wCs136ssTu+Svp7AkJQeLFFeBLaCNSFlm9uStyelesBKIk/WmWKtDkm8F4UYOkp2ctCO /ce8cmJ3WZQZZHlewRo8GFYP/uo7N9s= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-39-wG0-d9-HNH2lQX5CDpht-g-1; Fri, 06 Mar 2020 08:02:20 -0500 X-MC-Unique: wG0-d9-HNH2lQX5CDpht-g-1 Received: by mail-wm1-f69.google.com with SMTP id y7so859576wmd.4 for ; Fri, 06 Mar 2020 05:02:20 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=y2yWNaYqjJ/RvKkVVduCbhM3C1I4Zkz6logIvpDXjRI=; b=gjBXfGAR4kLou//3lyaAI8T0E4rmodS85S0CpWR+wcKxcweqQXZmTjks6+1CPtjAsW T6tBFLIqqoWKLLdKeysTV3f8UHdPQzq+m+8r/UraopYsyUm0b/zWnbTnMVzA6iZrFFzO gMLaqvrj7KM3VcN8RqbmR1Pf7RjHCmV1O+b2GkxdFdFpw7XsOu6j1UmJDgjmCAfCYy6Q sYjBdbsk/76qY9MgJ4Lu65lJmFU8PLWhKvFuE3iFwxBY/WqOzI8qV6i0T/g366jofJml RuO5y9kYZIs4leEEVb8hT3mTCZTG6cBL9vMwu05hnKXQx95mz3lcCcb6QdtjVxu4yUPe lgfA== X-Gm-Message-State: ANhLgQ3wwSqwi3cmsT1IqZC87bPc8lxZVrO8cLE21rjUBwdSnALTD358 rSzBxD33rO+47z/Y2Hvybs/G/pWLC2fPgD3899N89tNPi+AuVE3BjdiSGcvAG5BeNuZfIFuAohU 2BvXrbgZ4Qy4u X-Received: by 2002:a5d:6690:: with SMTP id l16mr4193877wru.251.1583499739787; Fri, 06 Mar 2020 05:02:19 -0800 (PST) X-Google-Smtp-Source: ADFU+vt1OXPzlEbyvBAvceW/RbmClBEpZeiagwVFOODbocvqNKeEiZjWeqYhWm0qnk58uiEN6mYnZw== X-Received: by 2002:a5d:6690:: with SMTP id l16mr4193848wru.251.1583499739540; Fri, 06 Mar 2020 05:02:19 -0800 (PST) Received: from vitty.brq.redhat.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id i67sm26613243wri.50.2020.03.06.05.02.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 06 Mar 2020 05:02:18 -0800 (PST) From: Vitaly Kuznetsov To: Paolo Bonzini Cc: Jim Mattson , Sean Christopherson , Wanpeng Li , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 1/2] KVM: VMX: rename 'kvm_area' to 'vmxon_region' Date: Fri, 6 Mar 2020 14:02:14 +0100 Message-Id: <20200306130215.150686-2-vkuznets@redhat.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200306130215.150686-1-vkuznets@redhat.com> References: <20200306130215.150686-1-vkuznets@redhat.com> MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org The name 'kvm_area' is misleading (as we have way too many areas which are KVM related), what alloc_kvm_area()/free_kvm_area() functions really do is allocate/free VMXON region for all CPUs. Rename accordingly. No functional change intended. Reviewed-by: Sean Christopherson Signed-off-by: Vitaly Kuznetsov Reviewed-by: Krish Sadhukhan --- arch/x86/kvm/vmx/vmx.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 40b1e6138cd5..dab19e4e5f2b 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -2635,7 +2635,7 @@ int alloc_loaded_vmcs(struct loaded_vmcs *loaded_vmcs) return -ENOMEM; } -static void free_kvm_area(void) +static void free_vmxon_regions(void) { int cpu; @@ -2645,7 +2645,7 @@ static void free_kvm_area(void) } } -static __init int alloc_kvm_area(void) +static __init int alloc_vmxon_regions(void) { int cpu; @@ -2654,7 +2654,7 @@ static __init int alloc_kvm_area(void) vmcs = alloc_vmcs_cpu(false, cpu, GFP_KERNEL); if (!vmcs) { - free_kvm_area(); + free_vmxon_regions(); return -ENOMEM; } @@ -7815,7 +7815,7 @@ static __init int hardware_setup(void) return r; } - r = alloc_kvm_area(); + r = alloc_vmxon_regions(); if (r) nested_vmx_hardware_unsetup(); return r; @@ -7826,7 +7826,7 @@ static __exit void hardware_unsetup(void) if (nested) nested_vmx_hardware_unsetup(); - free_kvm_area(); + free_vmxon_regions(); } static bool vmx_check_apicv_inhibit_reasons(ulong bit) From patchwork Fri Mar 6 13:02:15 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vitaly Kuznetsov X-Patchwork-Id: 11423845 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 5AF2D14E3 for ; Fri, 6 Mar 2020 13:02:32 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3327922B48 for ; Fri, 6 Mar 2020 13:02:32 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="bJk33B0T" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726982AbgCFNCZ (ORCPT ); Fri, 6 Mar 2020 08:02:25 -0500 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:30694 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726646AbgCFNCZ (ORCPT ); Fri, 6 Mar 2020 08:02:25 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1583499744; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=DEYmwO34ejd5Fehx/7gH5NvWBz/ItGWjm6SWsG9bpRU=; b=bJk33B0Tex+iaUwj9UzsUTme93xfSZSYb1Ui602YZIW+Gj3ENUMPmQ88JKZl6+CeL7Lz7Z QcwJdfWMGYCrT33rGOj31cNL9dUlbs+Hn0QYNg7tQDQh2b/ubgqUau8e/Z82cu/WOTKUM1 0MRyT/mC1G5BPxuOGcIXz0fYAUJ6XKs= Received: from mail-wr1-f72.google.com (mail-wr1-f72.google.com [209.85.221.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-474-7as33T5EPfCjUPYM76-Hew-1; Fri, 06 Mar 2020 08:02:22 -0500 X-MC-Unique: 7as33T5EPfCjUPYM76-Hew-1 Received: by mail-wr1-f72.google.com with SMTP id n12so954782wrp.19 for ; Fri, 06 Mar 2020 05:02:22 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=DEYmwO34ejd5Fehx/7gH5NvWBz/ItGWjm6SWsG9bpRU=; b=SXx2cy2odorSePBuNn01CV4CnftPDocFUvVujo7P5GFsoirSGNfo/KvCLAGrTitv3y GowhKatt72PtaMrJZOOUkyvnrDWaBYtrzsbqOKbdcaBo1/v6/JdaHJKc7GEQbOvBu9/g AyXMDiPY0Iu4sZTPqvKpswn7Yu7ClgChwmoVvnFsDAJC1b1R13F3qxwHdm4BdbZHnlo8 gy5bGWsHy0tOoah+5tnLJAYbdb/13s9IdklWqPDpp4S+j7cPh8JXIuJDobMUKwyTqo/o uA2jVHF9Jhmo0MlW8q7yrdTXZaAaQXfwFWpBS6VBT16ifdMtMhInr/AzVYLr4z7eOi9z D1rg== X-Gm-Message-State: ANhLgQ2CHTzi8rIRGuC8b1R7NuYot9uZHWjMt4tOFl8LCS0FzqhTkSZX LpVBMrAGA+8pznVonDEs2BUiBQm7g9oWhJex8AA8t6rrw0Ll3xlejqn/C3Se96/vSsJ3Ce/hIGV R0eouvL6RPejM X-Received: by 2002:a5d:4cc6:: with SMTP id c6mr3928183wrt.30.1583499741191; Fri, 06 Mar 2020 05:02:21 -0800 (PST) X-Google-Smtp-Source: ADFU+vvzKd18Q9ZyAetOJWJu+50Kd94+STONaewuv+fP1bA7GRouCbY0I5lzU1pvtQCmm1vExEeYRg== X-Received: by 2002:a5d:4cc6:: with SMTP id c6mr3928150wrt.30.1583499740818; Fri, 06 Mar 2020 05:02:20 -0800 (PST) Received: from vitty.brq.redhat.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id i67sm26613243wri.50.2020.03.06.05.02.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 06 Mar 2020 05:02:20 -0800 (PST) From: Vitaly Kuznetsov To: Paolo Bonzini Cc: Jim Mattson , Sean Christopherson , Wanpeng Li , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 2/2] KVM: VMX: untangle VMXON revision_id setting when using eVMCS Date: Fri, 6 Mar 2020 14:02:15 +0100 Message-Id: <20200306130215.150686-3-vkuznets@redhat.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200306130215.150686-1-vkuznets@redhat.com> References: <20200306130215.150686-1-vkuznets@redhat.com> MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org As stated in alloc_vmxon_regions(), VMXON region needs to be tagged with revision id from MSR_IA32_VMX_BASIC even in case of eVMCS. The logic to do so is not very straightforward: first, we set hdr.revision_id = KVM_EVMCS_VERSION in alloc_vmcs_cpu() just to reset it back to vmcs_config.revision_id in alloc_vmxon_regions(). Simplify this by introducing 'enum vmcs_type' parameter to alloc_vmcs_cpu()/alloc_vmcs(). No functional change intended. Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/vmx/nested.c | 2 +- arch/x86/kvm/vmx/vmx.c | 34 +++++++++++++++------------------- arch/x86/kvm/vmx/vmx.h | 12 +++++++++--- 3 files changed, 25 insertions(+), 23 deletions(-) diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index e920d7834d73..8c0ed62b29be 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -4566,7 +4566,7 @@ static struct vmcs *alloc_shadow_vmcs(struct kvm_vcpu *vcpu) WARN_ON(loaded_vmcs == &vmx->vmcs01 && loaded_vmcs->shadow_vmcs); if (!loaded_vmcs->shadow_vmcs) { - loaded_vmcs->shadow_vmcs = alloc_vmcs(true); + loaded_vmcs->shadow_vmcs = alloc_vmcs(SHADOW_VMCS_REGION); if (loaded_vmcs->shadow_vmcs) vmcs_clear(loaded_vmcs->shadow_vmcs); } diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index dab19e4e5f2b..a45d3721e7d7 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -2554,7 +2554,7 @@ static __init int setup_vmcs_config(struct vmcs_config *vmcs_conf, return 0; } -struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags) +struct vmcs *alloc_vmcs_cpu(enum vmcs_type type, int cpu, gfp_t flags) { int node = cpu_to_node(cpu); struct page *pages; @@ -2566,13 +2566,21 @@ struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags) vmcs = page_address(pages); memset(vmcs, 0, vmcs_config.size); - /* KVM supports Enlightened VMCS v1 only */ - if (static_branch_unlikely(&enable_evmcs)) + /* + * When eVMCS is enabled, vmcs->revision_id needs to be set to the + * supported eVMCS version (KVM_EVMCS_VERSION) instead of revision_id + * reported by MSR_IA32_VMX_BASIC. + * + * However, even though not explicitly documented by TLFS, VMXArea + * passed as VMXON argument should still be marked with revision_id + * reported by physical CPU. + */ + if (type != VMXON_REGION && static_branch_unlikely(&enable_evmcs)) vmcs->hdr.revision_id = KVM_EVMCS_VERSION; else vmcs->hdr.revision_id = vmcs_config.revision_id; - if (shadow) + if (type == SHADOW_VMCS_REGION) vmcs->hdr.shadow_vmcs = 1; return vmcs; } @@ -2599,7 +2607,7 @@ void free_loaded_vmcs(struct loaded_vmcs *loaded_vmcs) int alloc_loaded_vmcs(struct loaded_vmcs *loaded_vmcs) { - loaded_vmcs->vmcs = alloc_vmcs(false); + loaded_vmcs->vmcs = alloc_vmcs(VMCS_REGION); if (!loaded_vmcs->vmcs) return -ENOMEM; @@ -2652,25 +2660,13 @@ static __init int alloc_vmxon_regions(void) for_each_possible_cpu(cpu) { struct vmcs *vmcs; - vmcs = alloc_vmcs_cpu(false, cpu, GFP_KERNEL); + /* The VMXON region is really just a special type of VMCS. */ + vmcs = alloc_vmcs_cpu(VMXON_REGION, cpu, GFP_KERNEL); if (!vmcs) { free_vmxon_regions(); return -ENOMEM; } - /* - * When eVMCS is enabled, alloc_vmcs_cpu() sets - * vmcs->revision_id to KVM_EVMCS_VERSION instead of - * revision_id reported by MSR_IA32_VMX_BASIC. - * - * However, even though not explicitly documented by - * TLFS, VMXArea passed as VMXON argument should - * still be marked with revision_id reported by - * physical CPU. - */ - if (static_branch_unlikely(&enable_evmcs)) - vmcs->hdr.revision_id = vmcs_config.revision_id; - per_cpu(vmxarea, cpu) = vmcs; } return 0; diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h index e64da06c7009..a5eb92638ac2 100644 --- a/arch/x86/kvm/vmx/vmx.h +++ b/arch/x86/kvm/vmx/vmx.h @@ -489,16 +489,22 @@ static inline struct pi_desc *vcpu_to_pi_desc(struct kvm_vcpu *vcpu) return &(to_vmx(vcpu)->pi_desc); } -struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags); +enum vmcs_type { + VMXON_REGION, + VMCS_REGION, + SHADOW_VMCS_REGION, +}; + +struct vmcs *alloc_vmcs_cpu(enum vmcs_type type, int cpu, gfp_t flags); void free_vmcs(struct vmcs *vmcs); int alloc_loaded_vmcs(struct loaded_vmcs *loaded_vmcs); void free_loaded_vmcs(struct loaded_vmcs *loaded_vmcs); void loaded_vmcs_init(struct loaded_vmcs *loaded_vmcs); void loaded_vmcs_clear(struct loaded_vmcs *loaded_vmcs); -static inline struct vmcs *alloc_vmcs(bool shadow) +static inline struct vmcs *alloc_vmcs(enum vmcs_type type) { - return alloc_vmcs_cpu(shadow, raw_smp_processor_id(), + return alloc_vmcs_cpu(type, raw_smp_processor_id(), GFP_KERNEL_ACCOUNT); }