Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp4116419rwe; Tue, 30 Aug 2022 05:04:58 -0700 (PDT) X-Google-Smtp-Source: AA6agR5eb+GtyrR6vPQ/oyyuQZj2+gYbEeVTw1qEFkcDY2foR0VLYHjg45pDgqGtnNf1mj5nbqFb X-Received: by 2002:a17:903:22cf:b0:174:a5cd:31e0 with SMTP id y15-20020a17090322cf00b00174a5cd31e0mr10841703plg.23.1661861097598; Tue, 30 Aug 2022 05:04:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661861097; cv=none; d=google.com; s=arc-20160816; b=s1iPEUk4GTUwUsCnOXeeDqrzyWC3cQlPVafKbREWBUCRKqlPbIqht2Bxeg7JTEdRSJ jqgi7thb7SJcdrvU3LYyA15HsuKxVMupRxOq5ywAsl1aqPSkYey7h/41SKOF/ccuueqM 2pve6pOf329j4tmONsGQRVfviGJfHxae6WfehFNAiqCe3w53lqiLK53Wn2h96ymsUT/T vq26CQXVg8tZX0iV+WK39HNETEm2AFBzJQE7kQkNSA5RBryI7nKu+R4FaZ2s3Q0VCKgG ExvyknoGF1kWkeDP/s9mzplAmOWZ6LS2gazbDvOBDD/6GGtgJcHUf4B3zZdwGWaPziIi jkVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=s68Y3OhhG0IrayDsJJFc/dcRnjMVL4M0533WZK4+Vu8=; b=GrdEeWZM3UqYz+dZgY2rdgnmOWsf/ZQeJ0rxpeSirYa79rPfKlBhgFDy/7uFEUNGyA Os/rUFJPPF2P+s1/qwKIx3pyfTJ2ys7gCvuULrE+M8UnzvoW4WnLsCetWTtF7Uo+P380 am7whwnvma69gM6RAVlPmeu9UNXY5vIeTNpQ9026OXf4oD7z9qSNrUtSQ+izQHGB37AE im5By/b2W1bP0HmCKvic6K8fltrxiYEe4Jkrgu89F8O8zOV1DnDoQqbx+skuCFhmhEUx XM2716jScJmbyT8RDopUzHXSOhqK51Ejfdu14TMFU9v7hA2J/+i/oQCRkuoLqFZUZvS1 qrXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=htcnDZrp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x14-20020a63db4e000000b0042b93a2aa07si2062951pgi.315.2022.08.30.05.04.45; Tue, 30 Aug 2022 05:04:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=htcnDZrp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230120AbiH3MCD (ORCPT + 99 others); Tue, 30 Aug 2022 08:02:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229658AbiH3MB5 (ORCPT ); Tue, 30 Aug 2022 08:01:57 -0400 Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 88B75E396B; Tue, 30 Aug 2022 05:01:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1661860916; x=1693396916; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=8uxTMc931N62LSyYSZec4Q6h4MH1p09mPLFpxJiMDMs=; b=htcnDZrp5URoAp8QDKtTiQlZGHq+fQPV+dU3Bx7JEQ/t8b+LavSICrd/ 3OovxlfgIAIWL4RZNAMdSCibnj+eIxcMlHrhSzO4SehOz0bgR5YneNWkp Qrg0muydE+tdWciBQKT9oBM0IVI7hHudpnX88CqYarGsFU+J9C16dzWRI v9A/sJCjJZLpl9J56RUawsHyLRSHrPfpyQDeaHjTwYcjcvg/CoCmB3Hz0 FpW5kPH1vQ/nPdpiLj8aNl2m0z7JuME/h8t2BkDuv5LgUy+HKpY6NkHoM bhQ/KeZdG3M/gYx1E3gI/vYFVe36galuyZWjSL/mmzxNtLSwZsxOEq0jK A==; X-IronPort-AV: E=McAfee;i="6500,9779,10454"; a="356870954" X-IronPort-AV: E=Sophos;i="5.93,274,1654585200"; d="scan'208";a="356870954" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Aug 2022 05:01:54 -0700 X-IronPort-AV: E=Sophos;i="5.93,274,1654585200"; d="scan'208";a="787469608" Received: from ls.sc.intel.com (HELO localhost) ([143.183.96.54]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Aug 2022 05:01:54 -0700 From: isaku.yamahata@intel.com To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com, Paolo Bonzini , Sean Christopherson , Kai Huang , Chao Gao , Will Deacon Subject: [PATCH v2 01/19] KVM: x86: Drop kvm_user_return_msr_cpu_online() Date: Tue, 30 Aug 2022 05:01:16 -0700 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Isaku Yamahata KVM/X86 uses user return notifier to switch MSR for guest or user space. Snapshot host values on CPU online, change MSR values for guest, and restore them on returning to user space. The current code abuses kvm_arch_hardware_enable() which is called on kvm module initialization or CPU online. Remove such the abuse of kvm_arch_hardware_enable by capturing the host value on the first change of the MSR value to guest VM instead of CPU online. Suggested-by: Sean Christopherson Signed-off-by: Isaku Yamahata --- arch/x86/kvm/x86.c | 43 ++++++++++++++++++++++++------------------- 1 file changed, 24 insertions(+), 19 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 205ebdc2b11b..16104a2f7d8e 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -200,6 +200,7 @@ struct kvm_user_return_msrs { struct kvm_user_return_msr_values { u64 host; u64 curr; + bool initialized; } values[KVM_MAX_NR_USER_RETURN_MSRS]; }; @@ -363,6 +364,10 @@ static void kvm_on_user_return(struct user_return_notifier *urn) local_irq_restore(flags); for (slot = 0; slot < kvm_nr_uret_msrs; ++slot) { values = &msrs->values[slot]; + /* + * No need to check values->initialized because host = curr = 0 + * by __GFP_ZERO when !values->initialized. + */ if (values->host != values->curr) { wrmsrl(kvm_uret_msrs_list[slot], values->host); values->curr = values->host; @@ -409,34 +414,30 @@ int kvm_find_user_return_msr(u32 msr) } EXPORT_SYMBOL_GPL(kvm_find_user_return_msr); -static void kvm_user_return_msr_cpu_online(void) -{ - unsigned int cpu = smp_processor_id(); - struct kvm_user_return_msrs *msrs = per_cpu_ptr(user_return_msrs, cpu); - u64 value; - int i; - - for (i = 0; i < kvm_nr_uret_msrs; ++i) { - rdmsrl_safe(kvm_uret_msrs_list[i], &value); - msrs->values[i].host = value; - msrs->values[i].curr = value; - } -} - int kvm_set_user_return_msr(unsigned slot, u64 value, u64 mask) { unsigned int cpu = smp_processor_id(); struct kvm_user_return_msrs *msrs = per_cpu_ptr(user_return_msrs, cpu); + struct kvm_user_return_msr_values *values = &msrs->values[slot]; int err; - value = (value & mask) | (msrs->values[slot].host & ~mask); - if (value == msrs->values[slot].curr) + if (unlikely(!values->initialized)) { + u64 host_value; + + rdmsrl_safe(kvm_uret_msrs_list[slot], &host_value); + values->host = host_value; + values->curr = host_value; + values->initialized = true; + } + + value = (value & mask) | (values->host & ~mask); + if (value == values->curr) return 0; err = wrmsrl_safe(kvm_uret_msrs_list[slot], value); if (err) return 1; - msrs->values[slot].curr = value; + values->curr = value; if (!msrs->registered) { msrs->urn.on_user_return = kvm_on_user_return; user_return_notifier_register(&msrs->urn); @@ -9212,7 +9213,12 @@ int kvm_arch_init(void *opaque) return -ENOMEM; } - user_return_msrs = alloc_percpu(struct kvm_user_return_msrs); + /* + * __GFP_ZERO to ensure user_return_msrs.values[].{host, curr} match. + * See kvm_on_user_return() + */ + user_return_msrs = alloc_percpu_gfp(struct kvm_user_return_msrs, + GFP_KERNEL | __GFP_ZERO); if (!user_return_msrs) { printk(KERN_ERR "kvm: failed to allocate percpu kvm_user_return_msrs\n"); r = -ENOMEM; @@ -11836,7 +11842,6 @@ int kvm_arch_hardware_enable(void) u64 max_tsc = 0; bool stable, backwards_tsc = false; - kvm_user_return_msr_cpu_online(); ret = static_call(kvm_x86_hardware_enable)(); if (ret != 0) return ret; -- 2.25.1