Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp251103pxb; Thu, 12 Nov 2020 02:56:48 -0800 (PST) X-Google-Smtp-Source: ABdhPJxS/dZZu4crB6fTqU5l1AJrYZorsBFVkfZhzu9HoUD7+9n/PhXs/H2koNIoJGwEpIVMawPm X-Received: by 2002:aa7:d514:: with SMTP id y20mr4339824edq.384.1605178608272; Thu, 12 Nov 2020 02:56:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605178608; cv=none; d=google.com; s=arc-20160816; b=I9WmpYaDSe8pi4ZDR/ZebZgYXK4/eIanEWyc17HGdO5ERi3/Ins7FoOiovRcXD1yyV aGMJX18DtJytivXD1SdqsYMF2z7VxQeWhau4eP/Xn2SF0o9W8KanyNIFqfuH1ZqWbRom 1SqAd1859tfLhI/TVgPW4Bzwg4DpyUSdt7Row+3O5+MH2Y6s9a40UjE285cC2DHjh62H j1K0JzYX+Es7u4Yqv9PXvY2ZfwNyHOD4CsUUWwLd2eU/UPlI8zeflLRprMbqmSjoF2JJ z0gBC/+/QH8gAqNZ5PJxBKIZUNvGSb9w2v7NLHgAQD/bWSM1mUecK+ZYuJUEjsxGGVpx eEzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=KWLkvdYu5qBPyXknUznFKfkiFcfGzsGeIMaYr3uaes8=; b=mvA4A6k3rPeR6YxWZwTKvM2gZwcgrzsWwJl6eenIwDX3shpGbc3IEDLa0gibsxt1mz 6UxGg2TLk+KfAfANw49nRl1R0joJTr0eoamM6xuUid767sAzacqZ65pEnxQv7xfZ4DQj TeqIPCJ6+5yEx2ss0ictSAnQMlraUnaN3ZbHYx3GFzmfh4pndzWzTNi24je+2Yw8t0Uh JDWg8wRCqgpCiR/kwQ2hLyElswhEoURNodVI7NqlpD2nxzqnTdxrQHubhs/Xf8bOiBFA Gfc+zd5SxjloEbIPPkkxNIFWFu5ZkjOAIXnDHj/bC4T209hfz6HzFfLTaFsB+s/0qYnt 9MTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="BP/Yi1UU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u11si3659503edx.602.2020.11.12.02.56.24; Thu, 12 Nov 2020 02:56:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="BP/Yi1UU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727986AbgKLKwq (ORCPT + 99 others); Thu, 12 Nov 2020 05:52:46 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:26879 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727946AbgKLKwo (ORCPT ); Thu, 12 Nov 2020 05:52:44 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1605178363; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=KWLkvdYu5qBPyXknUznFKfkiFcfGzsGeIMaYr3uaes8=; b=BP/Yi1UUv5Evb/8B8RDgt4h7doGd35+Et7kJMXl9uZmF7+Zvj/uaywTIeAVnVmxeZwsD+2 TOli5wDqfg/wBBsydXPMTvjiNn5Ozo2g8nA/fxEe3U+zI1UFN+yr6obrwM842z+hDWh/hJ E7J1qtbmC2FVkUblHeO8Zdvk616F7IY= Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-135-jPbg_UYeO0SN6ENBW4KvbA-1; Thu, 12 Nov 2020 05:52:41 -0500 X-MC-Unique: jPbg_UYeO0SN6ENBW4KvbA-1 Received: by mail-wm1-f70.google.com with SMTP id u9so1610381wmb.2 for ; Thu, 12 Nov 2020 02:52:41 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=KWLkvdYu5qBPyXknUznFKfkiFcfGzsGeIMaYr3uaes8=; b=Y8qWt52V9Jo6n17UPRzvcV7XgYihixaWixvwhkNLwVg/8XH6d3pP5sq8+/nuqhXNtL ng09XD9Onk15JGKOauTWUwwhOhGNjvAVG7s2PZrOdrCDWZdNt+ja5kFQD7LMhUbt/mdl Pffp6vpfDMGXUQNmac3NgH7W4FARIBSo0a2BLDdBfAxuV764r8VwxbyEG4PLAsGuig3q rHL+deuGBG/YsF9oagW3ZbZmvJYqUdBof4vuYLdc94LdM/aVY8Sq8ZUubzUuKnqe9U6G 7eScDg/JQBnopH+PBhFxgVFC3KVxPjMCssIW7wXUTDZVbTQSzC6c1YjP1JKa3ip/FSiE waOA== X-Gm-Message-State: AOAM533lSRJsDY44HKqKCfo9cqYveKjr8CknyCpOgmywRVKtmXMvL2Ss YxQ91wf1F8+4HQ2imrQi9+1qwvpcGKPm6O741l6YxeT6ugRk9wXfGw2T2eeI+djwVRwDylxeoew HBDZFxNaXUix4ldM4GYjiC+CqNyt80M6fe2zTbtWTKch+gy72Ma8UXZTdpD8vIsJ/L8Z3UseWcy HK X-Received: by 2002:a5d:4349:: with SMTP id u9mr34344563wrr.319.1605178360398; Thu, 12 Nov 2020 02:52:40 -0800 (PST) X-Received: by 2002:a5d:4349:: with SMTP id u9mr34344537wrr.319.1605178360165; Thu, 12 Nov 2020 02:52:40 -0800 (PST) Received: from vitty.brq.redhat.com (g-server-2.ign.cz. [91.219.240.2]) by smtp.gmail.com with ESMTPSA id o10sm6281915wma.47.2020.11.12.02.52.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 12 Nov 2020 02:52:39 -0800 (PST) From: Vitaly Kuznetsov To: Sean Christopherson Cc: Paolo Bonzini , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 09/11] KVM: VMX: Define Hyper-V paravirt TLB flush fields iff Hyper-V is enabled In-Reply-To: <20201027212346.23409-10-sean.j.christopherson@intel.com> References: <20201027212346.23409-1-sean.j.christopherson@intel.com> <20201027212346.23409-10-sean.j.christopherson@intel.com> Date: Thu, 12 Nov 2020 11:52:38 +0100 Message-ID: <87361ezw21.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sean Christopherson writes: > Ifdef away the Hyper-V specific fields in structs kvm_vmx and vcpu_vmx > as each field has only a single reference outside of the struct itself > that isn't already wrapped in ifdeffery (and both are initialization). > > vcpu_vmx.ept_pointer in particular should be wrapped as it is valid if > and only if Hyper-v is active, i.e. non-Hyper-V code cannot rely on it > to actually track the current EPTP (without additional code changes). > > Signed-off-by: Sean Christopherson > --- > arch/x86/kvm/vmx/vmx.c | 5 ++++- > arch/x86/kvm/vmx/vmx.h | 4 ++++ > 2 files changed, 8 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > index b684f45d6a78..5b7c5b2fd2c7 100644 > --- a/arch/x86/kvm/vmx/vmx.c > +++ b/arch/x86/kvm/vmx/vmx.c > @@ -6955,8 +6955,9 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu) > vmx->pi_desc.nv = POSTED_INTR_VECTOR; > vmx->pi_desc.sn = 1; > > +#if IS_ENABLED(CONFIG_HYPERV) > vmx->ept_pointer = INVALID_PAGE; > - > +#endif > return 0; > > free_vmcs: > @@ -6973,7 +6974,9 @@ static int vmx_create_vcpu(struct kvm_vcpu *vcpu) > > static int vmx_vm_init(struct kvm *kvm) > { > +#if IS_ENABLED(CONFIG_HYPERV) > spin_lock_init(&to_kvm_vmx(kvm)->ept_pointer_lock); > +#endif > > if (!ple_gap) > kvm->arch.pause_in_guest = true; > diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h > index cecc2a641e19..2bd86d8b2f4b 100644 > --- a/arch/x86/kvm/vmx/vmx.h > +++ b/arch/x86/kvm/vmx/vmx.h > @@ -276,7 +276,9 @@ struct vcpu_vmx { > */ > u64 msr_ia32_feature_control; > u64 msr_ia32_feature_control_valid_bits; > +#if IS_ENABLED(CONFIG_HYPERV) > u64 ept_pointer; > +#endif > > struct pt_desc pt_desc; > > @@ -295,8 +297,10 @@ struct kvm_vmx { > bool ept_identity_pagetable_done; > gpa_t ept_identity_map_addr; > > +#if IS_ENABLED(CONFIG_HYPERV) > hpa_t hv_tlb_eptp; > spinlock_t ept_pointer_lock; > +#endif > }; > > bool nested_vmx_allowed(struct kvm_vcpu *vcpu); Reviewed-by: Vitaly Kuznetsov -- Vitaly