Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3120243ybt; Mon, 22 Jun 2020 15:45:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxU7t9/H9lDcKEqayacBbvaVyrxT4fcM8GIfhT59RpKRge6MPWCnpGt9S4v6k42x+6KiLoz X-Received: by 2002:a17:906:f1d5:: with SMTP id gx21mr12606253ejb.121.1592865930954; Mon, 22 Jun 2020 15:45:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592865930; cv=none; d=google.com; s=arc-20160816; b=GBYfLhwbUCf78fTIZlJFM9KerbLEVZkDTvAvh6u/rTM2AQrwx814+UXdTCf08kQIa0 xNbye9F+xXi1ybe+ovk82NkTexvKfKcCNZ+nv7k0YWUlAx9eJiZeS+UZ+KxrtxaTGSF/ 5o1KZWR12k6QmSgpjA+sq823KYwm23GavNqufpG37qX24RlkOnI2609g7WO8aV2UxZUI GqvVv89wEcsre+O+5MGoF52GL0/liIYrvX7TBt4UjZCRbU3Mc2AJzmg03K0QQEOuru3T SJdarhToujI5QuUAXoqv0apZaRzrakdL8KxoGyCrx73Fuygv7TUUOYMRX7hBajz2ASAq LZ9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=K9teciFhSuXhrdpjeO3GQpI8neX9mkxcFZ8/6Sx+riQ=; b=ToVb/PvBWqj/BV1Wc6t5guKz1B4KOfJiRgOuOynXnsRUI65dVka33y0cPoyQb3ikfW QsJmR5zft3TRYyv+tdtrYRc/SQcioBkKbjxV+dERk2e6CfzB6WA7VQk4b9M5qoWjm09R w08EGETdr+B52nbbrJ2tVmKXYpvMSTQDB3PDalWT/j5wYEg72DXLIvbhkhGczLs1dAPN a7vItbnFf1BJKmNo0ODcYhTJm55Dcill6tCEVH9Evi7ugnQQn8WtqNDGQyoJQnrFwG4c cbkU3nI6CmtTFJMCV9BvtlvEhd6Vdfnvxxsb2dVyth7lHKHjRP554+4+NaXygqndRr5w exmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j7si10448180eja.519.2020.06.22.15.45.08; Mon, 22 Jun 2020 15:45:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731301AbgFVWnL (ORCPT + 99 others); Mon, 22 Jun 2020 18:43:11 -0400 Received: from mga18.intel.com ([134.134.136.126]:27425 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731257AbgFVWnD (ORCPT ); Mon, 22 Jun 2020 18:43:03 -0400 IronPort-SDR: BK4wVfy6VI4xy6hiq4aFkiBX2tN6zZOeoF2q0IhcFY+PhjkqXlsnD7JrL0bgwzedZL5zj8BFQX Vb7m2h8+MWrw== X-IronPort-AV: E=McAfee;i="6000,8403,9660"; a="131303581" X-IronPort-AV: E=Sophos;i="5.75,268,1589266800"; d="scan'208";a="131303581" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jun 2020 15:42:56 -0700 IronPort-SDR: yUjHnqK5JTkgowcRt++MR9EaaYSccOy3UC0ftAPH/xvR5GHLMP/c39MAb9DR0L30VDKdDcguLk 4iJaIiK628VQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,268,1589266800"; d="scan'208";a="264634948" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.152]) by fmsmga008.fm.intel.com with ESMTP; 22 Jun 2020 15:42:56 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 15/15] KVM: VMX: Rename vmx_uret_msr's "index" to "slot" Date: Mon, 22 Jun 2020 15:42:49 -0700 Message-Id: <20200622224249.29562-16-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200622224249.29562-1-sean.j.christopherson@intel.com> References: <20200622224249.29562-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rename "index" to "slot" in struct vmx_uret_msr to align with the terminology used by common x86's kvm_user_return_msrs, and to avoid conflating "MSR's ECX index" with "MSR's index into an array". No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/kvm/vmx/vmx.c | 8 ++++---- arch/x86/kvm/vmx/vmx.h | 2 +- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index e958c911dcf8..b335296ca02d 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -630,7 +630,7 @@ static inline int __vmx_find_uret_msr(struct vcpu_vmx *vmx, u32 msr) int i; for (i = 0; i < vmx->nr_uret_msrs; ++i) - if (vmx_uret_msrs_list[vmx->guest_uret_msrs[i].index] == msr) + if (vmx_uret_msrs_list[vmx->guest_uret_msrs[i].slot] == msr) return i; return -1; } @@ -654,7 +654,7 @@ static int vmx_set_guest_uret_msr(struct vcpu_vmx *vmx, msr->data = data; if (msr - vmx->guest_uret_msrs < vmx->nr_active_uret_msrs) { preempt_disable(); - ret = kvm_set_user_return_msr(msr->index, msr->data, msr->mask); + ret = kvm_set_user_return_msr(msr->slot, msr->data, msr->mask); preempt_enable(); if (ret) msr->data = old_msr_data; @@ -1151,7 +1151,7 @@ void vmx_prepare_switch_to_guest(struct kvm_vcpu *vcpu) if (!vmx->guest_uret_msrs_loaded) { vmx->guest_uret_msrs_loaded = true; for (i = 0; i < vmx->nr_active_uret_msrs; ++i) - kvm_set_user_return_msr(vmx->guest_uret_msrs[i].index, + kvm_set_user_return_msr(vmx->guest_uret_msrs[i].slot, vmx->guest_uret_msrs[i].data, vmx->guest_uret_msrs[i].mask); @@ -6900,7 +6900,7 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu) if (wrmsr_safe(index, data_low, data_high) < 0) continue; - vmx->guest_uret_msrs[j].index = i; + vmx->guest_uret_msrs[j].slot = i; vmx->guest_uret_msrs[j].data = 0; switch (index) { case MSR_IA32_TSX_CTRL: diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h index 338469fcd8cf..57027072e21f 100644 --- a/arch/x86/kvm/vmx/vmx.h +++ b/arch/x86/kvm/vmx/vmx.h @@ -34,7 +34,7 @@ struct vmx_msrs { }; struct vmx_uret_msr { - unsigned index; + unsigned int slot; /* The MSR's slot in kvm_user_return_msrs. */ u64 data; u64 mask; }; -- 2.26.0