Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp43311iog; Tue, 14 Jun 2022 18:30:58 -0700 (PDT) X-Google-Smtp-Source: AGRyM1t2SK+yqyfm8ACLn6TW0HzUkB2YAS7mcV9V8Xp04ye1k5+Sn43Q0pkrkB/pcExKKjX8j3oj X-Received: by 2002:a17:90b:4c4a:b0:1e3:3b3:8800 with SMTP id np10-20020a17090b4c4a00b001e303b38800mr7628045pjb.6.1655256657868; Tue, 14 Jun 2022 18:30:57 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1655256657; cv=pass; d=google.com; s=arc-20160816; b=n38CmIlmim6wvBxGB7U+drQ9DW5o8c3CtNo21R+fqiPygnSOTyfYCkMHKMpkPHCPKt hLp2Rr70bVFPi6h7svPvF0y87Tr3n/oNcUY83FsiFBugGjk4AlSIQIpzHqLXppA9NG0U tLo/pbF9D3pza10H7HVCkh6lOVNqGwFx7LVjU5PIzEEnFEmPSpmTKmJrL6QfKup3Xavl WIxYjwdxoBaHSbbxoZFA/+Sa4pNdhG+BTta8Q5EhMuxKzgvZsaCnrMpI2IXDQHoq40Qd z0w7/ZLoiiOzWWuwnA2XzHMErn1DQcaxUFBhYAf4loQc/8OvgPCuZJNsI3Kdc62RcqPC vCGg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=GIwLnEbVk8hlZfhkVEeyots2gpBoQWKS5Xh6mUr26Og=; b=MRV6GR5tNHgxRKipwgZL6hzJxpDsKjrRlxHaRnR/MBrbTRkyHVy8x+DTPKrfdinKJ5 +44pXEVE29RHWziQtYwK4iwHf0JPoXxmIQ1nH0HQIKW5NIHEYnHLCn+8LFTdmqapKZ6p r+4fHmcBSM3Dt2sE2jhoaIvg51OpBjXgoFz7ZeFKKi9JSrp05gjb2wp8IHMYREs78vke W3wA22ODgb3SA+H1xwoR1hTgG+fvYrySqll7YZOU85513wEoknmJp+P0hXm6C8vvCAHC G7e2r36Itejc3aqcUi8hTZRZGq5Uf7+WWNA7RYL2+d1bVJJq9s7ncp40exFhwco5Mm64 2Luw== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=rAAep5TW; arc=pass (i=1 spf=pass spfdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mq7-20020a17090b380700b001e073312c32si1119238pjb.8.2022.06.14.18.30.46; Tue, 14 Jun 2022 18:30:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=rAAep5TW; arc=pass (i=1 spf=pass spfdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238274AbiFOBRS (ORCPT + 99 others); Tue, 14 Jun 2022 21:17:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50018 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233876AbiFOBRO (ORCPT ); Tue, 14 Jun 2022 21:17:14 -0400 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2066.outbound.protection.outlook.com [40.107.223.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3FF532A720; Tue, 14 Jun 2022 18:17:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LXEW1jtCmlUxkDXm2Nf6EOXgMv2cSB64ihHXiNQ+0zr9zNtvTbQOZ82h0dBtKinUboqM6JMyl8SAqNBuIW7FmpsG905LqLAf2Px3m83Ww5Uxk1V4jy3utfaFT2AKUhLDa/+0EGP+9Js7jEIBh7t7zSfHht8DWpCiF7p3d4AjazgxT0y3g3iWyMwmxdNgS79WXvspuQ/jJkgcKDOCTjaQdtx6gnNMHBC5TnIU7e74B4at017+phaK5RweGgTUP1x4WLnXQlG7TIm1MaYvhPdZpGNcLZF9sGau1ENFUSvFjkS0dSr82jDkWSU/gk66ONdpGkuMiAE9l/Lhqx1Iv6x8AA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GIwLnEbVk8hlZfhkVEeyots2gpBoQWKS5Xh6mUr26Og=; b=Jljun276cLaxPZvYL9DAyfKA1X6hO8zo8PVDJsU2oLlz2B0VbvkyEfSw0oIMmaF34ymDGtOmy75wm9WGdzqnoiozJSTR66ipCXMIRHXl38bVo2IszBdR2xqmo2Vua/kmYg3Sxtu9Ge9ixsC3XeIMkqAZgEV72L/OAOvkjjB5BvkYcwoaKV2VWfJpiL4KBD+nJtZu89oKWZlwPf8ARpPfnBT0xhOSU5jYZJ5UPYnUeMvx2ANvh7xTggM/01moZdK07eXHUr8B/42y0jBMjiFjogN61Kd4fE4IH0fsBOH6FGrsyTJGQxCALapduuK01YriX1IFQ1IVnuQg8YHzR4wtww== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 12.22.5.234) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GIwLnEbVk8hlZfhkVEeyots2gpBoQWKS5Xh6mUr26Og=; b=rAAep5TWCNqYMArnDqxwb+QdWCKX/pPyQ14igazFlV4bLutWbUWg6mOCnkjdu8clkFyZ12J/C+fGGYrj4LvBQN6zzfaeL5tikRRq7MbQY/+gbEqi+ubiNkvO/4iPossGKQjN0w8/o4wSc51FQHkYzruKJNZixq6zZH2ykU4DAyvq86JuuAUq7LPin3Nc7nAEfI9Qvjpa+/381RIAk8dtUO4p4nnAxCFKsak1vH8N8xaKtxGJFxGqL9G7wK5FtG8BMQIbADQVuuTbRmcLfI0ssd8hpMyi9t97bYlPI0XPOwikmETWxHSd0ZAPlThekYdMG7anScABX6Ches7NiKZ9fg== Received: from DS7PR03CA0042.namprd03.prod.outlook.com (2603:10b6:5:3b5::17) by PH0PR12MB5404.namprd12.prod.outlook.com (2603:10b6:510:d7::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5332.13; Wed, 15 Jun 2022 01:17:11 +0000 Received: from DM6NAM11FT036.eop-nam11.prod.protection.outlook.com (2603:10b6:5:3b5:cafe::4f) by DS7PR03CA0042.outlook.office365.com (2603:10b6:5:3b5::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5332.22 via Frontend Transport; Wed, 15 Jun 2022 01:17:11 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 12.22.5.234) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 12.22.5.234 as permitted sender) receiver=protection.outlook.com; client-ip=12.22.5.234; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (12.22.5.234) by DM6NAM11FT036.mail.protection.outlook.com (10.13.172.64) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.5332.12 via Frontend Transport; Wed, 15 Jun 2022 01:17:11 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by DRHQMAIL101.nvidia.com (10.27.9.10) with Microsoft SMTP Server (TLS) id 15.0.1497.32; Wed, 15 Jun 2022 01:17:10 +0000 Received: from foundations-user-AS-2114GT-DNR-C1-NC24B.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.22; Tue, 14 Jun 2022 18:17:09 -0700 From: Kechen Lu To: , , CC: , , , Subject: [RFC PATCH v3 1/7] KVM: x86: only allow exits disable before vCPUs created Date: Tue, 14 Jun 2022 18:16:16 -0700 Message-ID: <20220615011622.136646-2-kechenl@nvidia.com> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20220615011622.136646-1-kechenl@nvidia.com> References: <20220615011622.136646-1-kechenl@nvidia.com> MIME-Version: 1.0 X-NVConfidentiality: public Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail202.nvidia.com (10.129.68.7) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2f8b7306-e234-4708-f8c8-08da4e6cc620 X-MS-TrafficTypeDiagnostic: PH0PR12MB5404:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:12.22.5.234;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:InfoNoRecords;CAT:NONE;SFS:(13230016)(4636009)(36840700001)(40470700004)(46966006)(2906002)(2616005)(8936002)(508600001)(70206006)(4326008)(8676002)(26005)(83380400001)(70586007)(54906003)(186003)(86362001)(6666004)(47076005)(336012)(1076003)(426003)(40460700003)(356005)(7696005)(82310400005)(5660300002)(16526019)(36860700001)(316002)(110136005)(36756003)(81166007)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Jun 2022 01:17:11.2736 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2f8b7306-e234-4708-f8c8-08da4e6cc620 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[12.22.5.234];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT036.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR12MB5404 X-Spam-Status: No, score=-2.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson Since VMX and SVM both would never update the control bits if exits are disable after vCPUs are created, only allow setting exits disable flag before vCPU creation. Fixes: 4d5422cea3b6 ("KVM: X86: Provide a capability to disable MWAIT intercepts") Signed-off-by: Sean Christopherson Signed-off-by: Kechen Lu --- Documentation/virt/kvm/api.rst | 1 + arch/x86/kvm/x86.c | 6 ++++++ 2 files changed, 7 insertions(+) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 11e00a46c610..d0d8749591a8 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -6933,6 +6933,7 @@ branch to guests' 0x200 interrupt vector. :Architectures: x86 :Parameters: args[0] defines which exits are disabled :Returns: 0 on success, -EINVAL when args[0] contains invalid exits + or if any vCPU has already been created Valid bits in args[0] are:: diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 158b2e135efc..3ac6329e6d43 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -6006,6 +6006,10 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, if (cap->args[0] & ~KVM_X86_DISABLE_VALID_EXITS) break; + mutex_lock(&kvm->lock); + if (kvm->created_vcpus) + goto disable_exits_unlock; + if ((cap->args[0] & KVM_X86_DISABLE_EXITS_MWAIT) && kvm_can_mwait_in_guest()) kvm->arch.mwait_in_guest = true; @@ -6016,6 +6020,8 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, if (cap->args[0] & KVM_X86_DISABLE_EXITS_CSTATE) kvm->arch.cstate_in_guest = true; r = 0; +disable_exits_unlock: + mutex_unlock(&kvm->lock); break; case KVM_CAP_MSR_PLATFORM_INFO: kvm->arch.guest_can_read_msr_platform_info = cap->args[0]; -- 2.32.0