Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp455092imi; Fri, 22 Jul 2022 02:45:25 -0700 (PDT) X-Google-Smtp-Source: AGRyM1smuE7o+C392pE7inyFKayDGAMFqlDYvInh/yj0xKG5HeOiTvubTMSJWVs7hduCrAOcDeuY X-Received: by 2002:a17:90b:1e03:b0:1f2:518a:8f78 with SMTP id pg3-20020a17090b1e0300b001f2518a8f78mr937408pjb.217.1658483124872; Fri, 22 Jul 2022 02:45:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658483124; cv=none; d=google.com; s=arc-20160816; b=upILqjOR6lt4s417LHJec7DHNKD3cKl983PWRjaQ4OHJp7lMaPmtfjsDKKljS2yU9/ TZRBmPDZqKrTYJJkZA2fQpBLJNnPhrB1kLaAGdy8xp6tWn3dXCmFy7633EwhbRyYKyfZ PrzHBAOG9XQ3+naczAkGjGVwJCgbyuf6wAIef5qWDmCqHHjSe1UmIcbL1MW9rRQ1HEOD yCwJ1JZll+oWy3h4Kgb9e6r7rNu/gH2xUEMJZNLrKy+0Kn+fW6TLbYn8nMcHPJNRcep3 7onNJiLPPWt18kXdDeIlvW+YPLIeMc5McbOjx9hPpkh3l00haNXYcXBWSbvPOmhEdSRI QZcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+Gc/NaeL/UgImyzSw7pQUqjUk4UWBDjUmjJG7OpmLcM=; b=PgWrxgDvgcHAvBt1vRUvMn60DfqUH5ut8fOdNKGTkcHsurTdwqEgyOWe6Bo/5fXXWy QN8hT454448hK3UnPtCEMfmSHjvR8Z+USH2iCFU4nfA/8tC70GREQ0H6SjNSlTdAM49o unhktvDtL20NDU8ut3wu1qww9n0t2TfuWbmWnQoDcFyw1zy6BgFz1z9QjoK9FoFhaWMv bgCUOwD1D3sF1bG55xyls1/f7gJXKfMPjgzVI6B7IMK3+bXkmnrM6/iW4kukNFEIZJ1e 4Y54+/T7MR2+1XO8KbY7lk0rzgQvPkNZq3Lmfw2wWvdLiGjkIdIMBGIlr2kpTr5qGsPb JRwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rpGr1fOQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g8-20020a170902740800b0016382c70069si5066937pll.150.2022.07.22.02.45.09; Fri, 22 Jul 2022 02:45:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rpGr1fOQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236126AbiGVJVk (ORCPT + 99 others); Fri, 22 Jul 2022 05:21:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34172 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235848AbiGVJVB (ORCPT ); Fri, 22 Jul 2022 05:21:01 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A2E0FBDA26; Fri, 22 Jul 2022 02:14:01 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id C3429B827B7; Fri, 22 Jul 2022 09:13:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 22788C341C6; Fri, 22 Jul 2022 09:13:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1658481238; bh=JJSNyrfNibeUqygLpJNgYwMGm3xzO2AiaKKXC6Kdh18=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rpGr1fOQT1eV9vfTCP5Ubap0aOVoE4paxYDxp9NuaTN3K11p7T2AdrpWVDe96VN0Y vBhR2812rCyq4nr/SX0bzUt41QjD7xpm2RBaZ0CIzSj/YBi1KGXND8iqgRteXaWZwW k/LstyeI85HU0+eBWH58UNMk2fZFv5tU/c4nX264= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Peter Zijlstra (Intel)" , Borislav Petkov , Thadeu Lima de Souza Cascardo Subject: [PATCH 5.15 24/89] x86/kvm/vmx: Make noinstr clean Date: Fri, 22 Jul 2022 11:10:58 +0200 Message-Id: <20220722091134.722506985@linuxfoundation.org> X-Mailer: git-send-email 2.37.1 In-Reply-To: <20220722091133.320803732@linuxfoundation.org> References: <20220722091133.320803732@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Peter Zijlstra commit 742ab6df974ae8384a2dd213db1a3a06cf6d8936 upstream. The recent mmio_stale_data fixes broke the noinstr constraints: vmlinux.o: warning: objtool: vmx_vcpu_enter_exit+0x15b: call to wrmsrl.constprop.0() leaves .noinstr.text section vmlinux.o: warning: objtool: vmx_vcpu_enter_exit+0x1bf: call to kvm_arch_has_assigned_device() leaves .noinstr.text section make it all happy again. Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Borislav Petkov Signed-off-by: Thadeu Lima de Souza Cascardo Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/vmx/vmx.c | 6 +++--- arch/x86/kvm/x86.c | 4 ++-- include/linux/kvm_host.h | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-) --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -380,9 +380,9 @@ static __always_inline void vmx_disable_ if (!vmx->disable_fb_clear) return; - rdmsrl(MSR_IA32_MCU_OPT_CTRL, msr); + msr = __rdmsr(MSR_IA32_MCU_OPT_CTRL); msr |= FB_CLEAR_DIS; - wrmsrl(MSR_IA32_MCU_OPT_CTRL, msr); + native_wrmsrl(MSR_IA32_MCU_OPT_CTRL, msr); /* Cache the MSR value to avoid reading it later */ vmx->msr_ia32_mcu_opt_ctrl = msr; } @@ -393,7 +393,7 @@ static __always_inline void vmx_enable_f return; vmx->msr_ia32_mcu_opt_ctrl &= ~FB_CLEAR_DIS; - wrmsrl(MSR_IA32_MCU_OPT_CTRL, vmx->msr_ia32_mcu_opt_ctrl); + native_wrmsrl(MSR_IA32_MCU_OPT_CTRL, vmx->msr_ia32_mcu_opt_ctrl); } static void vmx_update_fb_clear_dis(struct kvm_vcpu *vcpu, struct vcpu_vmx *vmx) --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -12179,9 +12179,9 @@ void kvm_arch_end_assignment(struct kvm } EXPORT_SYMBOL_GPL(kvm_arch_end_assignment); -bool kvm_arch_has_assigned_device(struct kvm *kvm) +bool noinstr kvm_arch_has_assigned_device(struct kvm *kvm) { - return atomic_read(&kvm->arch.assigned_device_count); + return arch_atomic_read(&kvm->arch.assigned_device_count); } EXPORT_SYMBOL_GPL(kvm_arch_has_assigned_device); --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -1233,7 +1233,7 @@ static inline void kvm_arch_end_assignme { } -static inline bool kvm_arch_has_assigned_device(struct kvm *kvm) +static __always_inline bool kvm_arch_has_assigned_device(struct kvm *kvm) { return false; }