Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2073763pxa; Sun, 16 Aug 2020 22:58:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwnW68f/X2iA7s/HSVENVwR4EkHNdivGFRLnzTb2tpJ/ydksoGfEmQEI+ipykXBw57MMjKY X-Received: by 2002:a50:fc82:: with SMTP id f2mr13396133edq.53.1597643933781; Sun, 16 Aug 2020 22:58:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597643933; cv=none; d=google.com; s=arc-20160816; b=JGPXA6T2VwSDm411esAfq2w/i3NRvGQKfOvmodr4m+DPgGFbOLtWJygjd2Zhya4RAY z/8L1i2MoRQY/GE1AkHtLo7N7zI94RoJg5UbPKFZMdmF8AS2RijMQVdTbNtTXBPTFHWX rHNfoVGIeIhNnzaVEuGznAXd5UYLpXPW9QgJb1xHDk90cppA+3jHzDSt6XyggXXydzrz g5g1IM2Cr5wU0QpWAldYglJIanMpTV9337jesiHofO56cwUWGAA301fyl81ByftMjP6n 9avJ1d2xMEvfq3r0pQuXCe/I2ZUXlylsZxxmsOmNPTPPNG1OdSBX1DooEOAj1Lvs2qrU YdPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=r3LIcxiIt9C/soXxl8fcYZNndavML1qSdcwMkkVTXP8=; b=yGFNhbFN0AcALK2U+qHLFH327bDDPUHQnMCsGA46wLDuymhvlP/OZJGCauVnSwK3/x uc5Kt2uTrmtzqQ6DLPhu+XmdgnxX+7n6rmfpisRPGT3eTRGpOD0F0mhU09iZokHa1Yzx 1AdUMYT/glWy2Q24MJTPgqGSB8tGJStnHD0zYM/eVwGG8YJLV54+poX2kGFxUPa+4/Hb 5HYrpYimi3tJWlkq6CzCIIDjRpt4yRO1J5bq7RdO/Ym6Kwo022WlSbnFT+55KyVi/2fN GDqzPdKPfCzDG/VXZnkvP8XuuKzlFgmrCpyUY8suZGWCJ9bMoB71Jz6LOT5CGt/gMvSy nRQA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e1si10315387edn.361.2020.08.16.22.58.29; Sun, 16 Aug 2020 22:58:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726437AbgHQF5z (ORCPT + 99 others); Mon, 17 Aug 2020 01:57:55 -0400 Received: from out30-130.freemail.mail.aliyun.com ([115.124.30.130]:37592 "EHLO out30-130.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726235AbgHQF5y (ORCPT ); Mon, 17 Aug 2020 01:57:54 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R171e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04397;MF=zelin.deng@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0U5z1wNG_1597643859; Received: from localhost(mailfrom:zelin.deng@linux.alibaba.com fp:SMTPD_---0U5z1wNG_1597643859) by smtp.aliyun-inc.com(127.0.0.1); Mon, 17 Aug 2020 13:57:39 +0800 From: Zelin Deng To: Paolo Bonzini , Thomas Gleixner Cc: Brijesh Singh , Artie Ding , Caspar Zhang , Zelin Deng , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] KVM: x86: kvmclock_init_mem() should be called any way Date: Mon, 17 Aug 2020 13:57:39 +0800 Message-Id: <20200817055739.9994-1-zelin.deng@linux.alibaba.com> X-Mailer: git-send-email 2.20.1.2432.ga663e714 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org pvclock data pointers of vCPUs >= HVC_BOOT_ARRAY_SIZE (64) are stored in hvclock_mem wihch is initialized in kvmclock_init_mem(). Here're 3 scenarios in current implementation: - no-kvmclock is set in cmdline. kvm pv clock driver is disabled, no impact. - no-kvmclock-vsyscall is set in cmdline. kvmclock_init_mem() won't be called. No memory for storing pvclock data of vCPUs >= 64, vCPUs >= 64 can not be online or hotpluged. - tsc unstable. kvmclock_init_mem() won't be called. vCPUs >= 64 can not be online or hotpluged. It's not reasonable that vCPUs hotplug have been impacted by last 2 scenarios. Hence move kvmclock_init_mem() to front, in case hvclock_mem can not be initialized unexpectedly. Fixes: 6a1cac56f41f9 (x86/kvm: Use __bss_decrypted attribute in shared variables) Signed-off-by: Zelin Deng --- arch/x86/kernel/kvmclock.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/kvmclock.c b/arch/x86/kernel/kvmclock.c index 34b18f6eeb2c..1abbda25e037 100644 --- a/arch/x86/kernel/kvmclock.c +++ b/arch/x86/kernel/kvmclock.c @@ -271,7 +271,14 @@ static int __init kvm_setup_vsyscall_timeinfo(void) { #ifdef CONFIG_X86_64 u8 flags; +#endif + + if (!kvmclock) + return 0; + + kvmclock_init_mem(); +#ifdef CONFIG_X86_64 if (!per_cpu(hv_clock_per_cpu, 0) || !kvmclock_vsyscall) return 0; @@ -282,8 +289,6 @@ static int __init kvm_setup_vsyscall_timeinfo(void) kvm_clock.vdso_clock_mode = VDSO_CLOCKMODE_PVCLOCK; #endif - kvmclock_init_mem(); - return 0; } early_initcall(kvm_setup_vsyscall_timeinfo); -- 2.20.1