Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp4116979rwe; Tue, 30 Aug 2022 05:05:22 -0700 (PDT) X-Google-Smtp-Source: AA6agR7XvnHJwBH751XdSCCe0l5+chpOAt4r8hVQoz2JK+uAPeYGGbHrFydGU5qT3Ds8WPMBHbb7 X-Received: by 2002:a17:90b:1c8e:b0:1f7:5250:7b44 with SMTP id oo14-20020a17090b1c8e00b001f752507b44mr23399270pjb.212.1661861122582; Tue, 30 Aug 2022 05:05:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661861122; cv=none; d=google.com; s=arc-20160816; b=DCeIHTqB/RiKyoXsHahKOGwQckce9vVZbFuE//xQzLiLbhcW3hqwm8IlPxfHs5bO4k bSZaSHQ478UNGIm3UaTpRqFjJBgE3DPwFo85UaPk2KqgspoYnaYxuqy409D30MzAS0MS 1s0awS1rPPkvixBzvdmDPp5BZsm+9DGYNCD719QCrRB27HhlvVToZIOD9fMPJ215rc0v YlVYia+HW168rkJHVKgtrwStZZ0wQlsX6f+U61aC8M7Lut5s5Zq4rhQyRK6tI5R08/l/ CB92CAk0Tn3xXCBGX+TsH2iGHxdD88Z/xzT6QOlxKAy2heeUpSyvimJMewPtPzULuM3t yJJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=54HBHhq+fzs8QS/pM33RgEm5oZW3QPW7E0fWwf4vXPc=; b=BPozFFjyRPG0Sp40/PvUwk/XyQHgKprXwIRKjj48K5otIb//q962E2Qd1UkWGKKTdA QvpnJL8JBqHlWt06Kgv6Yt+JcQGbzs8r/OvoOopuO01e/9E9DD3OPwrRi+XgdTNQRibh WiTGZkxrXa5QBluNIzwJMdtwwZCkmoVKWv3kZg84ItaQ5W1Yt7/U2jBEZDVg39c+3c4o 4tkH0dyQAUcwd4wLBRT6fyxnQbhucFovmEJN34Nxx4mFaVidAXLOWOpNwtHA4GiHLd/5 BdgIXK9XMQuzNlaSWbzwyMfn8BiF+SVkqy2O9QQo2c5IGjDooF4juGsCFFrgBYpLa4Dg bZAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=D0C8PHcT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pf4-20020a17090b1d8400b001fdaee0dfa0si7874689pjb.172.2022.08.30.05.05.10; Tue, 30 Aug 2022 05:05:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=D0C8PHcT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229959AbiH3MCc (ORCPT + 99 others); Tue, 30 Aug 2022 08:02:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38226 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230092AbiH3MCB (ORCPT ); Tue, 30 Aug 2022 08:02:01 -0400 Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 677E4E68D7; Tue, 30 Aug 2022 05:01:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1661860919; x=1693396919; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=a+33dowbF5ovlUSliqsdgglFT7NjLciyOWmwB2FWMt8=; b=D0C8PHcTCLmaJwExTCmSVYftx705TWQQ9Qg18n56BBVVtdccLPEVKj7D WwZvssaVOnZgTyowMTuD13W9KwqSAXYM8rtSnQJLZHz+ZgIzfqAXlh4o8 i5pus+zDXUGXGR1u5mKZBHzokBWy70Sjkcf5slXh6iId5/Wcg8EYpyI4Q sUgmjfW2XCl0BZl8CorsbHZZxJQx4SL7E9EZ6OFGE96vD5aYv/HKMXzMg xYvwXg+/WifMiwsX1MvHUwinngt7k/RvRUi74wLGv6YZMZ0+7x+nAfNW8 muwKJQqAEnoqnUywmCXb9RmU7bZnAalKo3IUPQkYRfLEkKQAaZafXKmdI A==; X-IronPort-AV: E=McAfee;i="6500,9779,10454"; a="356870972" X-IronPort-AV: E=Sophos;i="5.93,274,1654585200"; d="scan'208";a="356870972" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Aug 2022 05:01:57 -0700 X-IronPort-AV: E=Sophos;i="5.93,274,1654585200"; d="scan'208";a="787469637" Received: from ls.sc.intel.com (HELO localhost) ([143.183.96.54]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Aug 2022 05:01:57 -0700 From: isaku.yamahata@intel.com To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com, Paolo Bonzini , Sean Christopherson , Kai Huang , Chao Gao , Will Deacon Subject: [PATCH v2 09/19] KVM: Add arch hook when VM is added/deleted Date: Tue, 30 Aug 2022 05:01:24 -0700 Message-Id: <8474b0ec8c70e7791dfa77bc720672549f19c397.1661860550.git.isaku.yamahata@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Isaku Yamahata and pass kvm_usage_count with kvm_lock. Move kvm_arch_post_init_vm() under kvm_arch_add_vm(). Later kvm_arch_post_init_vm() is deleted once x86 overrides kvm_arch_add_vm(). Suggested-by: Sean Christopherson Signed-off-by: Isaku Yamahata --- include/linux/kvm_host.h | 2 ++ virt/kvm/kvm_arch.c | 12 +++++++++++- virt/kvm/kvm_main.c | 21 +++++++++++++++++---- 3 files changed, 30 insertions(+), 5 deletions(-) diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index dd2a6d98d4de..f78364e01ca9 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -1445,6 +1445,8 @@ int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu); bool kvm_arch_dy_runnable(struct kvm_vcpu *vcpu); bool kvm_arch_dy_has_pending_interrupt(struct kvm_vcpu *vcpu); int kvm_arch_post_init_vm(struct kvm *kvm); +int kvm_arch_add_vm(struct kvm *kvm, int usage_count); +int kvm_arch_del_vm(int usage_count); void kvm_arch_pre_destroy_vm(struct kvm *kvm); int kvm_arch_create_vm_debugfs(struct kvm *kvm); diff --git a/virt/kvm/kvm_arch.c b/virt/kvm/kvm_arch.c index 4748a76bcb03..0eac996f4981 100644 --- a/virt/kvm/kvm_arch.c +++ b/virt/kvm/kvm_arch.c @@ -10,11 +10,21 @@ #include +__weak int kvm_arch_post_init_vm(struct kvm *kvm) +{ + return 0; +} + /* * Called after the VM is otherwise initialized, but just before adding it to * the vm_list. */ -__weak int kvm_arch_post_init_vm(struct kvm *kvm) +__weak int kvm_arch_add_vm(struct kvm *kvm, int usage_count) +{ + return kvm_arch_post_init_vm(kvm); +} + +__weak int kvm_arch_del_vm(int usage_count) { return 0; } diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index de336fba902b..5b9dc6d6ee28 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -145,6 +145,7 @@ static int kvm_no_compat_open(struct inode *inode, struct file *file) static int hardware_enable_all(void); static void hardware_disable_all(void); static void hardware_disable_nolock(void *junk); +static void kvm_del_vm(void); static void kvm_io_bus_destroy(struct kvm_io_bus *bus); @@ -1215,11 +1216,12 @@ static struct kvm *kvm_create_vm(unsigned long type, const char *fdname) if (r) goto out_err_no_debugfs; - r = kvm_arch_post_init_vm(kvm); - if (r) - goto out_err; - mutex_lock(&kvm_lock); + r = kvm_arch_add_vm(kvm, kvm_usage_count); + if (r) { + mutex_unlock(&kvm_lock); + goto out_err; + } list_add(&kvm->vm_list, &vm_list); mutex_unlock(&kvm_lock); @@ -1239,6 +1241,7 @@ static struct kvm *kvm_create_vm(unsigned long type, const char *fdname) #endif out_err_no_mmu_notifier: hardware_disable_all(); + kvm_del_vm(); out_err_no_disable: kvm_arch_destroy_vm(kvm); out_err_no_arch_destroy_vm: @@ -1319,6 +1322,7 @@ static void kvm_destroy_vm(struct kvm *kvm) kvm_arch_free_vm(kvm); preempt_notifier_dec(); hardware_disable_all(); + kvm_del_vm(); mmdrop(mm); module_put(kvm_chardev_ops.owner); } @@ -5078,6 +5082,15 @@ static void hardware_disable_all(void) cpus_read_unlock(); } +static void kvm_del_vm(void) +{ + cpus_read_lock(); + mutex_lock(&kvm_lock); + kvm_arch_del_vm(kvm_usage_count); + mutex_unlock(&kvm_lock); + cpus_read_unlock(); +} + static int hardware_enable_all(void) { int r = 0; -- 2.25.1