Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp888468ybe; Fri, 13 Sep 2019 07:52:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqwaJakHedCDVOn53Y+vIaGPJVLDZRZ+MTFUCl2Lnw9/tnwQfTN4VOZhvoytLYuCyDKYCBLW X-Received: by 2002:a17:906:7494:: with SMTP id e20mr40025598ejl.166.1568386344873; Fri, 13 Sep 2019 07:52:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568386344; cv=none; d=google.com; s=arc-20160816; b=QVx/teLpZZQNaIi9Axhr0K+cFJbehgZ3JiDs+dL9dRh1nkSD5yFwXoT/njyqTLLNRx edz8Welg+J2XxxdWpkbTRr9xPqq87lXNecJLHxE2Bbc4rmj5j8g4IMSgsvYvKnbJpjjQ WoRVWoVCiCkjk8rvrtmZf/Vl4Ht/MrNkT/VOvOcuiV8YxUKLeGZ+zly5wvpcDrGFyz+4 tBnfjbI9IWGXtlICDlV8EQmtpjtMicd+P9qCToPOO3ERzfzMWddOUryuVepzc54ENQe4 tM6yjMz9mZ3RknJm9KOJrYx2eBmaIqf10ajs1fouC1D6JJnssHhfhtkjytaGtZzrdxK+ cDTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=STlwYfjblepfdoZRKCBMUBLvdiIjuaXqJlXeRMJEMhg=; b=vlKHDurDiIqqIUOO3SzKipW/eRnVLWkFSSGLMPQF1pfiUh0Wnekqsc0ZLJ6fHNAag9 5iqqBZgoYagZ9oUEDtxmbbHlnFKxHrQ8UTtR4whzpATl5CtJBs2X4d8El7CKpwx27djC Bro+X9G2edwKH+W95kYtBDKlzL+vs4uGupY3S+IvkVd/gqpKR1VQPJBnjVjo9Z8RYHSx 2oHhqD5RNe4/9TaYOpqC75OEXjKF0rBpz5k1AccQh8RXhVXb4uZLxtmNpsnsyk+zpMQ0 8zGQVegHTZhCdJRpa/4eND8ClFFTHjiqNRa5P201zOr9NiG4AOzhudOo2XLc80ty6nEX kRoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=prmKolxo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g26si14814874ejb.70.2019.09.13.07.52.00; Fri, 13 Sep 2019 07:52:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=prmKolxo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390236AbfIMNSb (ORCPT + 99 others); Fri, 13 Sep 2019 09:18:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:46066 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389668AbfIMNS3 (ORCPT ); Fri, 13 Sep 2019 09:18:29 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0D5C4214D8; Fri, 13 Sep 2019 13:18:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380709; bh=2e90/tcQz7eJT9CjO98M7fmzHTLNXw6+JDINlewjzLw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=prmKolxo7fFJkwZ65xQe9WCvoKl54q/QoqwmENc32oqVKEgp5iWeYPz6j+sb7htfl aNLkXmIUr+b8U3p5D5eSu7dh2ob4uQMJVpthowGKVvF8h5JtipUvnXJuVZ1MQHH56l Nq5iTO/tyrqzq8gSAodjm9knTOM5qjmlUQ7b0T0k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sean Christopherson , Paolo Bonzini , Sasha Levin Subject: [PATCH 4.19 152/190] KVM: x86: optimize check for valid PAT value Date: Fri, 13 Sep 2019 14:06:47 +0100 Message-Id: <20190913130612.062736272@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 674ea351cdeb01d2740edce31db7f2d79ce6095d ] This check will soon be done on every nested vmentry and vmexit, "parallelize" it using bitwise operations. Reviewed-by: Sean Christopherson Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- arch/x86/kvm/mtrr.c | 10 +--------- arch/x86/kvm/vmx.c | 2 +- arch/x86/kvm/x86.h | 10 ++++++++++ 3 files changed, 12 insertions(+), 10 deletions(-) diff --git a/arch/x86/kvm/mtrr.c b/arch/x86/kvm/mtrr.c index e9ea2d45ae66b..9f72cc427158e 100644 --- a/arch/x86/kvm/mtrr.c +++ b/arch/x86/kvm/mtrr.c @@ -48,11 +48,6 @@ static bool msr_mtrr_valid(unsigned msr) return false; } -static bool valid_pat_type(unsigned t) -{ - return t < 8 && (1 << t) & 0xf3; /* 0, 1, 4, 5, 6, 7 */ -} - static bool valid_mtrr_type(unsigned t) { return t < 8 && (1 << t) & 0x73; /* 0, 1, 4, 5, 6 */ @@ -67,10 +62,7 @@ bool kvm_mtrr_valid(struct kvm_vcpu *vcpu, u32 msr, u64 data) return false; if (msr == MSR_IA32_CR_PAT) { - for (i = 0; i < 8; i++) - if (!valid_pat_type((data >> (i * 8)) & 0xff)) - return false; - return true; + return kvm_pat_valid(data); } else if (msr == MSR_MTRRdefType) { if (data & ~0xcff) return false; diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index ee9ff20da3902..feff7ed44a2bb 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -4266,7 +4266,7 @@ static int vmx_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) break; case MSR_IA32_CR_PAT: if (vmcs_config.vmentry_ctrl & VM_ENTRY_LOAD_IA32_PAT) { - if (!kvm_mtrr_valid(vcpu, MSR_IA32_CR_PAT, data)) + if (!kvm_pat_valid(data)) return 1; vmcs_write64(GUEST_IA32_PAT, data); vcpu->arch.pat = data; diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index 8889e0c029a70..3a91ea760f073 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -345,6 +345,16 @@ static inline void kvm_after_interrupt(struct kvm_vcpu *vcpu) __this_cpu_write(current_vcpu, NULL); } + +static inline bool kvm_pat_valid(u64 data) +{ + if (data & 0xF8F8F8F8F8F8F8F8ull) + return false; + /* 0, 1, 4, 5, 6, 7 are valid values. */ + return (data | ((data & 0x0202020202020202ull) << 1)) == data; +} + void kvm_load_guest_xcr0(struct kvm_vcpu *vcpu); void kvm_put_guest_xcr0(struct kvm_vcpu *vcpu); + #endif -- 2.20.1