Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp4824471rwe; Tue, 30 Aug 2022 18:27:59 -0700 (PDT) X-Google-Smtp-Source: AA6agR7IOdZMlYqdpKTk6k8zmuACmnWKnHhc1+zji7ZXIt3ibXaoIxlMdwbYvkZzfpmlkBs0WGB6 X-Received: by 2002:a05:6a00:10d3:b0:4fe:5d:75c8 with SMTP id d19-20020a056a0010d300b004fe005d75c8mr24321510pfu.6.1661909279398; Tue, 30 Aug 2022 18:27:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661909279; cv=none; d=google.com; s=arc-20160816; b=SVcOmZ+Z6JzL5pzaIyYbAPjXtIGP+WgLPQ4iwfe17lA2NnHZJcqhjW/CUB67YqLVs7 rTfsO9wMAIPhSoTZM/1k4i8CuqZpfOj2TmXynuI3X98YK572AZrJZlj7ia5SM0MOrNBY IZUh9vEs6tSqWxzZUOZd+KXefpA6I+5RZ1m6hYQdN7nwysLX1DTz+DJfz2/OoKYlbQxQ 7z3ZoIv/G4XPrJOS7rl9x++/yhj4gS4UpAdo/G58R4b6+EBXcpF9fD8qDjBuxvH30i+e NLqyyVwFvsyZjPt0aP0NUV83S8vSWklyk7sXsrVU5pe0CkqKFUV0AzK+4rcscdBElV3z G2dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:reply-to:dkim-signature; bh=g3L7Nx3h3Wnl/8etnteeOlF7DoJAlFFq718LJDW6wr4=; b=Jedf02TJZbW7hewZtMJeUsfNf4dKW4lwRORJYdTDNdvzKW6dRYO99CtdEFfZso7nIU 12nltJJfMdcDV38+Uc8WMeIAiHsgIxBXEc9pmJwMVQvCacnuKsO4G7zKQGjQpvWHR687 aBI0hG9HcSOBuwJ5xd44CbAYR9xa6R3Tj9TlXpuMC7Pl+q7q0OlAdcBYyN94wUDq4ZbT L4Al8sgKuvsm6VAFR3BVnm6q3EFVxjvyohbG703qMI9fkSbkwR9uVLmajCDay/WGx7vk plsIM+cnWTvbwNCqhiTpQR0SwzZAKj+S2dF9bHo8864sUmq4pVL38bf+CDc3J4fmdu+5 nDVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=kHswN3zB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t23-20020a056a00139700b0052acba35ae1si14160945pfg.135.2022.08.30.18.27.48; Tue, 30 Aug 2022 18:27:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=kHswN3zB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232101AbiHaAiw (ORCPT + 99 others); Tue, 30 Aug 2022 20:38:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51820 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232191AbiHaAh7 (ORCPT ); Tue, 30 Aug 2022 20:37:59 -0400 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7BAF4AE9C2 for ; Tue, 30 Aug 2022 17:36:36 -0700 (PDT) Received: by mail-pl1-x64a.google.com with SMTP id k3-20020a170902c40300b001743aafd6c6so8982943plk.20 for ; Tue, 30 Aug 2022 17:36:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc; bh=g3L7Nx3h3Wnl/8etnteeOlF7DoJAlFFq718LJDW6wr4=; b=kHswN3zBoCOnCESvdwJre0Gz76boSxHrEIE7McE2aLOB8cZBTx6/AOmoq/hpHwNehr 9MLuP6xXxV4a6kEZQ3Pi1RJkh7q945nZFyA0X9XicVd/K3e0HY2qVaI6EYIgqw+naog/ Gk7pV0I1xV1BX0elxQdq/of5qSDLSv5JqIem2idLS+gijibV2w9WVZbBk/ZseUk+7wiO BCIdFOyt1us80s1YhqIA4wJt8EJZTq9EspRP6s2j2zC9/5VDD0P6Ne7NveM4tnaPoW7G sxcNB6CprsftG1WKLyg6iwXkpXlAEOc5QVrGvFCDTMVyM2UXz0Mk8nlTsJneDFBWy3tQ ivOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc; bh=g3L7Nx3h3Wnl/8etnteeOlF7DoJAlFFq718LJDW6wr4=; b=TKq26HFqi4lNyltxzV8SG/PVU59er04/K22QvdPJjdgqTnm4bqgL4in11Cwq604AEA zfp4yFgS7Nf2xtxXAlXvlpN7G9wZnLka1SzrQeiepOSEMGfAsC1zgBSaQDjYjwIV1aH5 1ihkDPGfTEhzRVgWAkozBPaB/COONk+6Ehoh89GM+qgCr3AVLicsQIRTutgyOnmkAlV5 HCyo2OJbP2KWesIhs0fNA2+bUkEWuzCH0ZN+7zG1SzD5nlyEIZcIitKLiPrAT5WR9ViW ZFQa2xQVHbZDXxUHOcAu9XF++75Cic6pOR+pnWc+Frx4QGOvTOya3gZVUEyJWnMjcouO 4Llw== X-Gm-Message-State: ACgBeo3Ubyzdv/3YgoIVGE3UkYKXTt2g0dMz/MmtgRMDGGYAt84ZJCxc KmYIqn91e4IbaB4e5jpY+9hsO12lDJw= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:902:9308:b0:174:9dff:716b with SMTP id bc8-20020a170902930800b001749dff716bmr14644974plb.75.1661906141530; Tue, 30 Aug 2022 17:35:41 -0700 (PDT) Reply-To: Sean Christopherson Date: Wed, 31 Aug 2022 00:35:06 +0000 In-Reply-To: <20220831003506.4117148-1-seanjc@google.com> Mime-Version: 1.0 References: <20220831003506.4117148-1-seanjc@google.com> X-Mailer: git-send-email 2.37.2.672.g94769d06f0-goog Message-ID: <20220831003506.4117148-20-seanjc@google.com> Subject: [PATCH 19/19] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu" From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Suravee Suthikulpanit , Maxim Levitsky , Li RongQing Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Turns out that some warnings exist for good reasons. Restore the warning in avic_vcpu_load() that guards against calling avic_vcpu_load() on a running vCPU now that KVM avoids doing so when switching between x2APIC and xAPIC. The entire point of the WARN is to highlight that KVM should not be reloading an AVIC. Opportunistically convert the WARN_ON() to WARN_ON_ONCE() to avoid spamming the kernel if it does fire. This reverts commit c0caeee65af3944b7b8abbf566e7cc1fae15c775. Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/avic.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/svm/avic.c b/arch/x86/kvm/svm/avic.c index b2033a56010c..3c300113d40b 100644 --- a/arch/x86/kvm/svm/avic.c +++ b/arch/x86/kvm/svm/avic.c @@ -1080,6 +1080,7 @@ void avic_vcpu_load(struct kvm_vcpu *vcpu, int cpu) return; entry = READ_ONCE(*(svm->avic_physical_id_cache)); + WARN_ON_ONCE(entry & AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK); entry &= ~AVIC_PHYSICAL_ID_ENTRY_HOST_PHYSICAL_ID_MASK; entry |= (h_physical_id & AVIC_PHYSICAL_ID_ENTRY_HOST_PHYSICAL_ID_MASK); -- 2.37.2.672.g94769d06f0-goog