Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp608247pxk; Wed, 23 Sep 2020 11:09:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbD66GF5khlsUXduzcenuSaJFYefpp8fMuaYdW5XN8NLeIttRGujDj6Zz12il3K0FtE0vK X-Received: by 2002:a17:906:4a53:: with SMTP id a19mr955819ejv.56.1600884546700; Wed, 23 Sep 2020 11:09:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600884546; cv=none; d=google.com; s=arc-20160816; b=EBy4Kvfgt5zpPA7s4SiFZWPEWebpiGbGSzpmA53c7od7ubVKFSK03rtFFypcOCRv3d 9ZCdj7rg6J+a89nqrkDQHqwA7PBDmTpsx1vOZQheW5e3AqYNK+WMV/Z/DiJ0Foexg1O+ kjHSoBA5eV0RsPhuTEe+VCi9xTKB4d0fCI1bCpy6Tn6EBk0oANU/c8phsjSYUy0yvsWX 5KHZ3ad8JV2hm619vCqE7ctOqXhC2gPFLY5h9zZcoIuy2Dn+/e09cvp3kDR03tl/XmXZ WmGpMTrLfrKoTQidVgFdyHF/o/c3wM45eHsDp+vkfx9Sp4AXd70nyPIlrPuCcIu/AleW i+bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=GPL85eLNd3Zo7NEb83n/cc87cCL0ICDYadhbzJs1HXI=; b=r7qjGryphGgoIrx4QfZLP2cI7XIzs8Z6DZzFGLgHA02WA/9XLKyS91Kimpvcxdjt1m YNlknhCneJRTPgo3izwbH41R93GYgpGF1/rq+9R6ckND/rByjKxOB00qqzgUdNuuJpIB NLoUG0OcB85cffeQKq0Ro2RbPG2RCv3SxW9iowTOshSKQzWIHtvaAe20ut2K5g/TORid 5WHWzph0JxCy9zNIBaOy6hcOTL5BoLxlCrZv6vqyOAFxR+eu6nFqLhC7BarZHLOUjvkv 9sbbD7GlNYV9voH7d3gppYF/hABaFpFPOjn4EJSTSfFdxh+vlOpYNv2xwdeMs0ItIEfc KXTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d22si452850edz.234.2020.09.23.11.08.43; Wed, 23 Sep 2020 11:09:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726746AbgIWSEU (ORCPT + 99 others); Wed, 23 Sep 2020 14:04:20 -0400 Received: from mga02.intel.com ([134.134.136.20]:16539 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726515AbgIWSEP (ORCPT ); Wed, 23 Sep 2020 14:04:15 -0400 IronPort-SDR: VA5B9L2Wi9k1kx/5iW7sXtddes48J4KNZDFkzMakATmBdV55wpLp+pTMQGDqsMg2COxHJo5ZWv PtJX/b+gVy7A== X-IronPort-AV: E=McAfee;i="6000,8403,9753"; a="148637132" X-IronPort-AV: E=Sophos;i="5.77,293,1596524400"; d="scan'208";a="148637132" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Sep 2020 11:04:12 -0700 IronPort-SDR: sKc6i9xmmqIuVhZ3si5gRFb+BMJ0cPoNXW9hJhMvR0IJ11Gaw6N2XawuQY4hTAhhqqAAolctjQ 5+sT8VvMvX1w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,293,1596524400"; d="scan'208";a="322670277" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by orsmga002.jf.intel.com with ESMTP; 23 Sep 2020 11:04:11 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 06/15] KVM: VMX: Rename vcpu_vmx's "save_nmsrs" to "nr_active_uret_msrs" Date: Wed, 23 Sep 2020 11:04:00 -0700 Message-Id: <20200923180409.32255-7-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200923180409.32255-1-sean.j.christopherson@intel.com> References: <20200923180409.32255-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add "uret" into the name of "save_nmsrs" to explicitly associate it with the guest_uret_msrs array, and replace "save" with "active" (for lack of a better word) to better describe what is being tracked. While "save" is more or less accurate when viewed as a literal description of the field, e.g. it holds the number of MSRs that were saved into the array the last time setup_msrs() was invoked, it can easily be misinterpreted by the reader, e.g. as meaning the number of MSRs that were saved from hardware at some point in the past, or as the number of MSRs that need to be saved at some point in the future, both of which are wrong. No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/kvm/vmx/vmx.c | 22 +++++++++++----------- arch/x86/kvm/vmx/vmx.h | 2 +- 2 files changed, 12 insertions(+), 12 deletions(-) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 6048d0e35d11..eefd1c991615 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -649,7 +649,7 @@ static int vmx_set_guest_msr(struct vcpu_vmx *vmx, struct vmx_uret_msr *msr, u64 u64 old_msr_data = msr->data; msr->data = data; - if (msr - vmx->guest_uret_msrs < vmx->save_nmsrs) { + if (msr - vmx->guest_uret_msrs < vmx->nr_active_uret_msrs) { preempt_disable(); ret = kvm_set_user_return_msr(msr->index, msr->data, msr->mask); preempt_enable(); @@ -1142,7 +1142,7 @@ void vmx_prepare_switch_to_guest(struct kvm_vcpu *vcpu) */ if (!vmx->guest_msrs_ready) { vmx->guest_msrs_ready = true; - for (i = 0; i < vmx->save_nmsrs; ++i) + for (i = 0; i < vmx->nr_active_uret_msrs; ++i) kvm_set_user_return_msr(vmx->guest_uret_msrs[i].index, vmx->guest_uret_msrs[i].data, vmx->guest_uret_msrs[i].mask); @@ -1699,9 +1699,9 @@ static void move_msr_up(struct vcpu_vmx *vmx, int from, int to) */ static void setup_msrs(struct vcpu_vmx *vmx) { - int save_nmsrs, index; + int nr_active_uret_msrs, index; - save_nmsrs = 0; + nr_active_uret_msrs = 0; #ifdef CONFIG_X86_64 /* * The SYSCALL MSRs are only needed on long mode guests, and only @@ -1710,26 +1710,26 @@ static void setup_msrs(struct vcpu_vmx *vmx) if (is_long_mode(&vmx->vcpu) && (vmx->vcpu.arch.efer & EFER_SCE)) { index = __find_msr_index(vmx, MSR_STAR); if (index >= 0) - move_msr_up(vmx, index, save_nmsrs++); + move_msr_up(vmx, index, nr_active_uret_msrs++); index = __find_msr_index(vmx, MSR_LSTAR); if (index >= 0) - move_msr_up(vmx, index, save_nmsrs++); + move_msr_up(vmx, index, nr_active_uret_msrs++); index = __find_msr_index(vmx, MSR_SYSCALL_MASK); if (index >= 0) - move_msr_up(vmx, index, save_nmsrs++); + move_msr_up(vmx, index, nr_active_uret_msrs++); } #endif index = __find_msr_index(vmx, MSR_EFER); if (index >= 0 && update_transition_efer(vmx, index)) - move_msr_up(vmx, index, save_nmsrs++); + move_msr_up(vmx, index, nr_active_uret_msrs++); index = __find_msr_index(vmx, MSR_TSC_AUX); if (index >= 0 && guest_cpuid_has(&vmx->vcpu, X86_FEATURE_RDTSCP)) - move_msr_up(vmx, index, save_nmsrs++); + move_msr_up(vmx, index, nr_active_uret_msrs++); index = __find_msr_index(vmx, MSR_IA32_TSX_CTRL); if (index >= 0) - move_msr_up(vmx, index, save_nmsrs++); + move_msr_up(vmx, index, nr_active_uret_msrs++); - vmx->save_nmsrs = save_nmsrs; + vmx->nr_active_uret_msrs = nr_active_uret_msrs; vmx->guest_msrs_ready = false; if (cpu_has_vmx_msr_bitmap()) diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h index e9cd01868389..202487d8dc28 100644 --- a/arch/x86/kvm/vmx/vmx.h +++ b/arch/x86/kvm/vmx/vmx.h @@ -220,7 +220,7 @@ struct vcpu_vmx { struct vmx_uret_msr guest_uret_msrs[MAX_NR_USER_RETURN_MSRS]; int nr_uret_msrs; - int save_nmsrs; + int nr_active_uret_msrs; bool guest_msrs_ready; #ifdef CONFIG_X86_64 u64 msr_host_kernel_gs_base; -- 2.28.0