Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp3578093pxp; Tue, 8 Mar 2022 17:56:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJxqJCFyNvedGK0avxtPklzsQVgB1y8AwI6uZuxaMNhE65sDOI2uSxJASvSZjZlOI1msUmt/ X-Received: by 2002:a17:902:db02:b0:151:cf55:83de with SMTP id m2-20020a170902db0200b00151cf5583demr20329109plx.69.1646790986840; Tue, 08 Mar 2022 17:56:26 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1646790986; cv=pass; d=google.com; s=arc-20160816; b=S22Km0woIFyERPZXHtm3lMrChpRUP+6Krek4TFdQyjDqsxEIEXF4wXf+xj9jArHomY bIU+MkHGyimSU6rR6vkmM9Y5I5creFJdJF7bUOBjPQMKHj4vaEmckWwhSyk2phWp9g6t QksBYFmplFr77PhdUfdaXX0Iioqa6+jT2U8iztbsCRZaJH7kGN6IEaa1SFHos1fPh26h OglQyGAk30zYQYzPyovmpkhz4GNmjtsihNbSvXXmnSZg5CFJzs9H6Od/iyIkJVSadWGw 3RmQHWkp3sZZgbNpKO77WI3c3y0aO+0EUA51ptp2Rhol/uz6JvCBbnGXJjWqnqhQs+SK N6jg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=GUFgz13zFDjSz5KztnJdjnxed2lXWM/5d+PCCB29jbQ=; b=O8+jMuY8YrMA8bLQ6nEJbM0C+vs3SR3ztD5Tlb1B0PiHQE7vs3rZbZ6MQZv8ihQvnf pG6tgcmHle/P+LU/L/HVOVMMsTnj2QU5zqvK8nfSPisjb9+LRnGYEh1aBJvIG5MzIU4+ mxCfCrIX6ZH2nkTAaSDgcodlMS+TZ0rwrQdE/XJ9Fow3yrDX7L0Hh9bKy9HubNXGhr6Q rnaCMtCAfuvGZqZimefj4lkGDdRqkn6hUukK8RfCj/XH/2TQOiGxN+0plwTYA/u/VgnF Hej8l2s8LQ0qJ2JF3w+mqtvMzF0CR6+aMwmj6pBOnMkyW5yMExNOqk+gP+C87E/e/8vi BQMw== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=ig0LlQ8F; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id bg23-20020a056a001f9700b004f6d362bf6dsi445957pfb.11.2022.03.08.17.56.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Mar 2022 17:56:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=ig0LlQ8F; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 4576F2036F6; Tue, 8 Mar 2022 16:30:55 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348604AbiCHQlQ (ORCPT + 99 others); Tue, 8 Mar 2022 11:41:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38358 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348480AbiCHQkx (ORCPT ); Tue, 8 Mar 2022 11:40:53 -0500 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2084.outbound.protection.outlook.com [40.107.243.84]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1BAE0517EF; Tue, 8 Mar 2022 08:39:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g7SYGxiSTcCEe1zWHlU7NoMXkPEyxDaAzOUk3NuiEKosP1REop6MCqrq3KlXhZodcm3acxEo1LisObLkReyQll4D719KC7lyfKS9L/+JPcB+BIoSrHqGb4iYjjTclZQbocuIg5R8crwF6TOtnfKz6Y6jCMCkZOmzW0fF1sX7W+47YTxXYH+jfTZddZ2OwYbcOvYY1F17uO91GF19f8srJ6xKlu+wAY20nAG5CO1nVz//cTTsZHkW01mzNviHLUkzPfp+q4LmrCsSsFFTF2PitSq4kSnNcRcGBEtPvly2aXXChEd+Wk1ApsaGdomAOB0PrZaScqo9qH+VTqjKDBxuwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GUFgz13zFDjSz5KztnJdjnxed2lXWM/5d+PCCB29jbQ=; b=a46rKTjdq0WK4C1JH2I4ZpCccfsZO0BoLblwmLyrB6WCcquzlNVOxB88y4Xgz/3BgeF7Uz8PEYLWKfIEO+Th346/N/fwbmPO24JTJQ455cS18EN4AgdAiSPa7wJ78303t9YWmXiRoiNegmyag8/n9p9IDZmfKzkF+rhZsPCiM58Xmh8HQz8mUU9oi1hk3REdrCyqJEJkpyWaqW7AKHcHUDch1Zzq+9qa/x10LGCtygBEguljnXUNjQIS/wm/E+PejG5xh4hh8m622AH0DTSqw0zCgXiVOnBGw2TG9nJq/d8y5eQCkaGviBdUIyhEitV1r6rI0y1f6jeFd4uBWU8ZWQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GUFgz13zFDjSz5KztnJdjnxed2lXWM/5d+PCCB29jbQ=; b=ig0LlQ8Fku2w7+HfdKvZFIE7HR/uNhqxhA+4aIfzrDpGmaWXVTzCCZ+xVGKS81LDPbg2GOxUqnvvPgkuImDHAnkAUAz2LOdCIli4EB5mpop7eGgMQze73Hq723d6vtEVuHFhiA8tT/vf52fnuTKEJEOIu1cV4a7FLf0P2TlVdyw= Received: from BN9PR03CA0844.namprd03.prod.outlook.com (2603:10b6:408:13d::9) by MN2PR12MB3232.namprd12.prod.outlook.com (2603:10b6:208:ab::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar 2022 16:39:51 +0000 Received: from BN8NAM11FT060.eop-nam11.prod.protection.outlook.com (2603:10b6:408:13d:cafe::6c) by BN9PR03CA0844.outlook.office365.com (2603:10b6:408:13d::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 16:39:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; Received: from SATLEXMB04.amd.com (165.204.84.17) by BN8NAM11FT060.mail.protection.outlook.com (10.13.177.211) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 16:39:51 +0000 Received: from sp5-759chost.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.18; Tue, 8 Mar 2022 10:39:47 -0600 From: Suravee Suthikulpanit To: , CC: , , , , , , , Suravee Suthikulpanit , kernel test robot Subject: [RFCv2 PATCH 10/12] KVM: SVM: Introduce helper functions to (de)activate AVIC and x2AVIC Date: Tue, 8 Mar 2022 10:39:24 -0600 Message-ID: <20220308163926.563994-11-suravee.suthikulpanit@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220308163926.563994-1-suravee.suthikulpanit@amd.com> References: <20220308163926.563994-1-suravee.suthikulpanit@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 6be2f169-c93f-4a51-cebc-08da01224463 X-MS-TrafficTypeDiagnostic: MN2PR12MB3232:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(86362001)(26005)(508600001)(6666004)(82310400004)(47076005)(1076003)(186003)(16526019)(36860700001)(426003)(356005)(81166007)(336012)(83380400001)(2616005)(70586007)(7696005)(5660300002)(8936002)(4326008)(70206006)(8676002)(36756003)(44832011)(2906002)(110136005)(54906003)(40460700003)(316002)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:39:51.3472 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6be2f169-c93f-4a51-cebc-08da01224463 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT060.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB3232 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Refactor the current logic for (de)activate AVIC into helper functions, and also add logic for (de)activate x2AVIC. The helper function are used when initializing AVIC and switching from AVIC to x2AVIC mode (handled by svm_refresh_spicv_exec_ctrl()). When an AVIC-enabled guest switches from APIC to x2APIC mode during runtime, the SVM driver needs to perform the following steps: 1. Set the x2APIC mode bit for AVIC in VMCB along with the maximum APIC ID support for each mode accodingly. 2. Disable x2APIC MSRs interception in order to allow the hardware to virtualize x2APIC MSRs accesses. Reported-by: kernel test robot Signed-off-by: Suravee Suthikulpanit --- arch/x86/include/asm/svm.h | 1 + arch/x86/kvm/svm/avic.c | 48 ++++++++++++++++++++++++++++++++++---- 2 files changed, 44 insertions(+), 5 deletions(-) diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index 681a348a9365..f5337022104d 100644 --- a/arch/x86/include/asm/svm.h +++ b/arch/x86/include/asm/svm.h @@ -248,6 +248,7 @@ enum avic_ipi_failure_cause { AVIC_IPI_FAILURE_INVALID_BACKING_PAGE, }; +#define AVIC_PHYSICAL_MAX_INDEX_MASK GENMASK_ULL(9, 0) /* * For AVIC, the max index allowed for physical APIC ID diff --git a/arch/x86/kvm/svm/avic.c b/arch/x86/kvm/svm/avic.c index 53559b8dfa52..b8d6bf6b6ed5 100644 --- a/arch/x86/kvm/svm/avic.c +++ b/arch/x86/kvm/svm/avic.c @@ -66,6 +66,45 @@ struct amd_svm_iommu_ir { void *data; /* Storing pointer to struct amd_ir_data */ }; +static inline void avic_set_x2apic_msr_interception(struct vcpu_svm *svm, bool disable) +{ + int i; + + for (i = 0x800; i <= 0x8ff; i++) + set_msr_interception(&svm->vcpu, svm->msrpm, i, + !disable, !disable); +} + +static void avic_activate_vmcb(struct vcpu_svm *svm) +{ + struct vmcb *vmcb = svm->vmcb01.ptr; + + vmcb->control.int_ctl &= ~(AVIC_ENABLE_MASK | X2APIC_MODE_MASK); + vmcb->control.avic_physical_id &= ~AVIC_PHYSICAL_MAX_INDEX_MASK; + + vmcb->control.int_ctl |= AVIC_ENABLE_MASK; + if (apic_x2apic_mode(svm->vcpu.arch.apic)) { + vmcb->control.int_ctl |= X2APIC_MODE_MASK; + vmcb->control.avic_physical_id |= X2AVIC_MAX_PHYSICAL_ID; + /* Disabling MSR intercept for x2APIC registers */ + avic_set_x2apic_msr_interception(svm, false); + } else { + vmcb->control.avic_physical_id |= AVIC_MAX_PHYSICAL_ID; + /* Enabling MSR intercept for x2APIC registers */ + avic_set_x2apic_msr_interception(svm, true); + } +} + +static void avic_deactivate_vmcb(struct vcpu_svm *svm) +{ + struct vmcb *vmcb = svm->vmcb01.ptr; + + vmcb->control.int_ctl &= ~(AVIC_ENABLE_MASK | X2APIC_MODE_MASK); + vmcb->control.avic_physical_id &= ~AVIC_PHYSICAL_MAX_INDEX_MASK; + + /* Enabling MSR intercept for x2APIC registers */ + avic_set_x2apic_msr_interception(svm, true); +} /* Note: * This function is called from IOMMU driver to notify @@ -183,13 +222,12 @@ void avic_init_vmcb(struct vcpu_svm *svm) vmcb->control.avic_backing_page = bpa & AVIC_HPA_MASK; vmcb->control.avic_logical_id = lpa & AVIC_HPA_MASK; vmcb->control.avic_physical_id = ppa & AVIC_HPA_MASK; - vmcb->control.avic_physical_id |= AVIC_MAX_PHYSICAL_ID; vmcb->control.avic_vapic_bar = APIC_DEFAULT_PHYS_BASE & VMCB_AVIC_APIC_BAR_MASK; if (kvm_apicv_activated(svm->vcpu.kvm)) - vmcb->control.int_ctl |= AVIC_ENABLE_MASK; + avic_activate_vmcb(svm); else - vmcb->control.int_ctl &= ~AVIC_ENABLE_MASK; + avic_deactivate_vmcb(svm); } static u64 *avic_get_physical_id_entry(struct kvm_vcpu *vcpu, @@ -703,9 +741,9 @@ void svm_refresh_apicv_exec_ctrl(struct kvm_vcpu *vcpu) * accordingly before re-activating. */ avic_post_state_restore(vcpu); - vmcb->control.int_ctl |= AVIC_ENABLE_MASK; + avic_activate_vmcb(svm); } else { - vmcb->control.int_ctl &= ~AVIC_ENABLE_MASK; + avic_deactivate_vmcb(svm); } vmcb_mark_dirty(vmcb, VMCB_AVIC); -- 2.25.1