Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp607974pxk; Wed, 23 Sep 2020 11:08:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwtA3hEtSwEz0kAdYH2V6aIneoKaCQIBv4cxnY98qK+fBiCKbH8PRDWGyOTZiBVpypH9CEC X-Received: by 2002:a05:6402:3192:: with SMTP id di18mr619646edb.116.1600884524166; Wed, 23 Sep 2020 11:08:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600884524; cv=none; d=google.com; s=arc-20160816; b=We3etHls7eNSeSeGaNBmxF/bIaxsPRRrGmhYMGPcAVJaO4Qxl7423CWZPQGRM4GLmN 6rffJZoTv7JsR18jZe992JFJvnKS2rl1SKGdvrryjF5r5v4REhFmLFi4QvGi/EHi994u qw7UcEwSFDcX5WvolXHXfx774IQqd+a0zBHWmla9BW6B/HCkEEokdO658tZShtadMbJc CWiKgsfQ1LN7XohaIbd/GDg5+nVTS7uTs21BwEjB7/K/JQc7tO6OZW8q3PHWXltAUflX YnKhOeznkUBqPjbME/ep7vbmLEP1/Oj2Go+IPa1XjfM+JEDd9nnq2gDXT/R9pqD7+1TL 2VVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=1NmEpWBGQwu6+p/SyaWEL2lAbGU7pKPp7OrQEbSpkI4=; b=BA6cV7hhEgQuysmvYSlphB62WQAXPI3V8GSfdddHm1ZKGsWznPYm7dXBhGZ12Tavgd gvUITZK8MkscZMAMXlZ88aP6RUNDOTFSQieKc2ZjKgcYzEGvHDmqYkVBFWSyqVVEQTG6 Hfv4koom1JN509/Uq7ZKF0/qgIwXEw6pgBU26tspuh0DROSG0p7SRDpNj3HIC+eQP9Hx 4zBDxgepDrmZxdAh5xPuIkcKZ+Fe1wcuSRow7h6E1MyYgxR/4Q/MsCEUEizYb5S9vKAV KCgGp0dYu0bou/1Trks8GOk8a0uzLLHXf8vmGlAey4dT2i/zoUIMtJlUAcfddKeP9tbY 5CIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b19si395008edw.155.2020.09.23.11.08.20; Wed, 23 Sep 2020 11:08:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726942AbgIWSFC (ORCPT + 99 others); Wed, 23 Sep 2020 14:05:02 -0400 Received: from mga02.intel.com ([134.134.136.20]:16539 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726689AbgIWSES (ORCPT ); Wed, 23 Sep 2020 14:04:18 -0400 IronPort-SDR: Sd0FSX5fcIe5S+frgXhcG3KlW5KkBkX+pl9AzOnyrm8hkCPZEaOp+wR8KEF4JmUF4Ptd+jFXDY JCWZoceeGazQ== X-IronPort-AV: E=McAfee;i="6000,8403,9753"; a="148637144" X-IronPort-AV: E=Sophos;i="5.77,293,1596524400"; d="scan'208";a="148637144" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Sep 2020 11:04:13 -0700 IronPort-SDR: 5J8M97EN4wdj4ucaUoP6XAimPZMGo5DmbffAS5NBO0o6+Pth89ERiLGt3V2gZJP1a9GL3AYHL4 WVfwEZ5xl+hA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,293,1596524400"; d="scan'208";a="322670299" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by orsmga002.jf.intel.com with ESMTP; 23 Sep 2020 11:04:11 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 12/15] KVM: VMX: Rename "find_msr_entry" to "vmx_find_uret_msr" Date: Wed, 23 Sep 2020 11:04:06 -0700 Message-Id: <20200923180409.32255-13-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200923180409.32255-1-sean.j.christopherson@intel.com> References: <20200923180409.32255-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rename "find_msr_entry" to scope it to VMX and to associate it with guest_uret_msrs. Drop the "entry" so that the function name pairs with the existing __vmx_find_uret_msr(), which intentionally uses a double underscore prefix instead of appending "index" or "slot" as those names are already claimed by other pieces of the user return MSR stack. No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/kvm/vmx/nested.c | 2 +- arch/x86/kvm/vmx/vmx.c | 10 +++++----- arch/x86/kvm/vmx/vmx.h | 2 +- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index a275eb94280c..4de147553778 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -4271,7 +4271,7 @@ static inline u64 nested_vmx_get_vmcs01_guest_efer(struct vcpu_vmx *vmx) return vmx->msr_autoload.guest.val[i].value; } - efer_msr = find_msr_entry(vmx, MSR_EFER); + efer_msr = vmx_find_uret_msr(vmx, MSR_EFER); if (efer_msr) return efer_msr->data; diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 93cf86672764..3b4fb9ef511d 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -633,7 +633,7 @@ static inline int __vmx_find_uret_msr(struct vcpu_vmx *vmx, u32 msr) return -1; } -struct vmx_uret_msr *find_msr_entry(struct vcpu_vmx *vmx, u32 msr) +struct vmx_uret_msr *vmx_find_uret_msr(struct vcpu_vmx *vmx, u32 msr) { int i; @@ -1927,7 +1927,7 @@ static int vmx_get_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) goto find_uret_msr; default: find_uret_msr: - msr = find_msr_entry(vmx, msr_info->index); + msr = vmx_find_uret_msr(vmx, msr_info->index); if (msr) { msr_info->data = msr->data; break; @@ -2201,7 +2201,7 @@ static int vmx_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) default: find_uret_msr: - msr = find_msr_entry(vmx, msr_index); + msr = vmx_find_uret_msr(vmx, msr_index); if (msr) ret = vmx_set_guest_msr(vmx, msr, data); else @@ -2833,7 +2833,7 @@ static void enter_rmode(struct kvm_vcpu *vcpu) void vmx_set_efer(struct kvm_vcpu *vcpu, u64 efer) { struct vcpu_vmx *vmx = to_vmx(vcpu); - struct vmx_uret_msr *msr = find_msr_entry(vmx, MSR_EFER); + struct vmx_uret_msr *msr = vmx_find_uret_msr(vmx, MSR_EFER); if (!msr) return; @@ -7237,7 +7237,7 @@ static void vmx_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu) if (boot_cpu_has(X86_FEATURE_RTM)) { struct vmx_uret_msr *msr; - msr = find_msr_entry(vmx, MSR_IA32_TSX_CTRL); + msr = vmx_find_uret_msr(vmx, MSR_IA32_TSX_CTRL); if (msr) { bool enabled = guest_cpuid_has(vcpu, X86_FEATURE_RTM); vmx_set_guest_msr(vmx, msr, enabled ? 0 : TSX_CTRL_RTM_DISABLE); diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h index f90de1fd6319..05c81fcd184e 100644 --- a/arch/x86/kvm/vmx/vmx.h +++ b/arch/x86/kvm/vmx/vmx.h @@ -350,7 +350,7 @@ bool vmx_interrupt_blocked(struct kvm_vcpu *vcpu); bool vmx_get_nmi_mask(struct kvm_vcpu *vcpu); void vmx_set_nmi_mask(struct kvm_vcpu *vcpu, bool masked); void vmx_set_virtual_apic_mode(struct kvm_vcpu *vcpu); -struct vmx_uret_msr *find_msr_entry(struct vcpu_vmx *vmx, u32 msr); +struct vmx_uret_msr *vmx_find_uret_msr(struct vcpu_vmx *vmx, u32 msr); void pt_update_intercept_for_msr(struct vcpu_vmx *vmx); void vmx_update_host_rsp(struct vcpu_vmx *vmx, unsigned long host_rsp); int vmx_find_loadstore_msr_slot(struct vmx_msrs *m, u32 msr); -- 2.28.0