Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp447222rwb; Fri, 2 Sep 2022 17:40:08 -0700 (PDT) X-Google-Smtp-Source: AA6agR4uVbDOWc0wxjoc2gPC1Rfq5JU4d9NEGf1rW3V1rDMgfWEDYT4POK83+ihxm8U1VzVwaoik X-Received: by 2002:a05:6402:1388:b0:447:a3a4:6152 with SMTP id b8-20020a056402138800b00447a3a46152mr34819217edv.13.1662165608114; Fri, 02 Sep 2022 17:40:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662165608; cv=none; d=google.com; s=arc-20160816; b=h3KZl1wj3DcNfisXbLy4icEh82MCi+9V5krJNxq/gcCiBu64jDzl6c0FKlYq2tlbHQ 2AiqBuX9BS4GBdlnLEEs8OUPs3HDfyz0HR09BIErDvlQh4DYSwVKlVCkJiUsUmmLJf+1 mON1x9z2/j1inWL91QKYCE7N5jgN0Vp54Q1wj1dw0QfV2JydYPvaMe9Ffsm+U4f0wT30 OOujnBoeMTXd71qb0AzbDg2GiaEKFtHvmNw0e5Ujr4jELTLsKvx8G7wz/d/zURGXNEEI vELREKsJf+YaT2Gf/ctXRCYh3O/YRyexqyfF4hr6SHyO/PCxvaJNzdd7wwXtN99igPoI 9QSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:reply-to:dkim-signature; bh=Kx3IG3ZoWEJ93nwNVzD3nD++UrihjFhzPKMLEK+k0c8=; b=qub0lEYWq1KciYiVP4UbiHa2R9QYdYEc2PrjuJDr4HoPLj6IDts58tf0YDphpwgesK 7LlfRgSaVKa1f7v1KEhrvz5v03zJpRbw8bYOEcgAytniwEMa323rx3Nc5qQHeuLMhtMJ rbAcx74RfPBO+H/ESGwqQH/AcFd0xX5BpwKmoxVEGx1aSVkwcnLwLPOmakFD4Uliw9Sp B0Cogp9ryhKipgcYxVxzIMq5nx0r+RVNggVSuztZIYVX4sdMx81HNSDa5rV27Sf6apCg eGUSmGNdlMUZeXldciUeqr2ov391MsQXnjmCnKV7QEvzrNhD9RBOBF4MsinNmw/j+mCD tvNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Eq+2HWdo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y61-20020a50bb43000000b00445f9c5ea88si1182368ede.294.2022.09.02.17.39.42; Fri, 02 Sep 2022 17:40:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Eq+2HWdo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231459AbiICAXc (ORCPT + 99 others); Fri, 2 Sep 2022 20:23:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53670 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231344AbiICAXO (ORCPT ); Fri, 2 Sep 2022 20:23:14 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 18EF8F72C1 for ; Fri, 2 Sep 2022 17:23:10 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id y21-20020a056a001c9500b0053817f57e8dso1721859pfw.6 for ; Fri, 02 Sep 2022 17:23:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date; bh=Kx3IG3ZoWEJ93nwNVzD3nD++UrihjFhzPKMLEK+k0c8=; b=Eq+2HWdocGwiCPEnjoFBfKuQEtWfIrv4jJlrD4dm47o7bKopijIRIw7Er0dRFK+k+H Tltwof+sBHYKD1XGoToZbji8bukdmJrsQoJnlW4oWBjWfa+nd4ot+i19xSSkW7LERWhg axaIL/DFSVEcT/HN+cMGqF49hivO9/yQ2nEHn68lCGGPvqd7ouHsxqP0HOV2600KzrXr 7A7l0HQqEn79+I3iAE2usc49JMVhMxIgJDGhlz82NYPbYc3lhzHf/1+36E3EqXmPFajZ YILJlUtsy0Lf29YiEB4dBIQPDIVMPfE4obNWjhpf0/i5L8haQqsZpzvY9diZVdDURHY/ knvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date; bh=Kx3IG3ZoWEJ93nwNVzD3nD++UrihjFhzPKMLEK+k0c8=; b=SibuBCBv8/N5xNGXMojQrB7RRSFq6e/yvJ6HvEp7fuTt5JkTGr3kmN36ns7u2Gy7df 8Yqm2XR1o59zUcdWXA+wGFl6kz4tazDdmInujbPXAbw0zUkojzVA8JDADgTn6PfBeWCQ y1tbJoINSoILmhaqgmj1ZRFGoCHpaqERIs9Pb6Vx+2vIh62O7lJyUFKY3Hu0E+pOaqoM 0uLSpx00Ks/awa9YeiOADk7TBXXTS+XKNkQIyCJvpSjliP1zzPwFuHhym70MXwTbT9vm wKMgKD00Wg7gNFMgPQg5M0Ls8qUJUyFA8a5Jzdy/8FqgTO+/ja4wDFtNgbNAR8W12TS5 TS4w== X-Gm-Message-State: ACgBeo2HN8Lrkmr8kJFX4Tp11rrQbVaAs95pSSD5HqY7Wp5v7Y8iF7rH GhfK8IjI9ILO8vGdqDO+tbq2socYjqc= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:902:8503:b0:173:368b:dce3 with SMTP id bj3-20020a170902850300b00173368bdce3mr38018382plb.104.1662164589610; Fri, 02 Sep 2022 17:23:09 -0700 (PDT) Reply-To: Sean Christopherson Date: Sat, 3 Sep 2022 00:22:37 +0000 In-Reply-To: <20220903002254.2411750-1-seanjc@google.com> Mime-Version: 1.0 References: <20220903002254.2411750-1-seanjc@google.com> X-Mailer: git-send-email 2.37.2.789.g6183377224-goog Message-ID: <20220903002254.2411750-7-seanjc@google.com> Subject: [PATCH v2 06/23] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Suravee Suthikulpanit , Maxim Levitsky , Li RongQing Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Replace the "avic_mode" enum with a single bool to track whether or not x2AVIC is enabled. KVM already has "apicv_enabled" that tracks if any flavor of AVIC is enabled, i.e. AVIC_MODE_NONE and AVIC_MODE_X1 are redundant and unnecessary noise. No functional change intended. Signed-off-by: Sean Christopherson Reviewed-by: Maxim Levitsky --- arch/x86/kvm/svm/avic.c | 46 +++++++++++++++++++---------------------- arch/x86/kvm/svm/svm.c | 2 +- arch/x86/kvm/svm/svm.h | 9 +------- 3 files changed, 23 insertions(+), 34 deletions(-) diff --git a/arch/x86/kvm/svm/avic.c b/arch/x86/kvm/svm/avic.c index de7fcb3a544b..3022a135c060 100644 --- a/arch/x86/kvm/svm/avic.c +++ b/arch/x86/kvm/svm/avic.c @@ -53,7 +53,7 @@ static DEFINE_HASHTABLE(svm_vm_data_hash, SVM_VM_DATA_HASH_BITS); static u32 next_vm_id = 0; static bool next_vm_id_wrapped = 0; static DEFINE_SPINLOCK(svm_vm_data_hash_lock); -enum avic_modes avic_mode; +bool x2avic_enabled; /* * This is a wrapper of struct amd_iommu_ir_data. @@ -79,8 +79,7 @@ static void avic_activate_vmcb(struct vcpu_svm *svm) * (prevents mapping it into the guest) if any vCPU has x2APIC enabled, * thus enabling AVIC activates only the doorbell mechanism. */ - if (apic_x2apic_mode(svm->vcpu.arch.apic) && - avic_mode == AVIC_MODE_X2) { + if (x2avic_enabled && apic_x2apic_mode(svm->vcpu.arch.apic)) { vmcb->control.int_ctl |= X2APIC_MODE_MASK; vmcb->control.avic_physical_id |= X2AVIC_MAX_PHYSICAL_ID; /* Disabling MSR intercept for x2APIC registers */ @@ -247,8 +246,8 @@ static u64 *avic_get_physical_id_entry(struct kvm_vcpu *vcpu, u64 *avic_physical_id_table; struct kvm_svm *kvm_svm = to_kvm_svm(vcpu->kvm); - if ((avic_mode == AVIC_MODE_X1 && index > AVIC_MAX_PHYSICAL_ID) || - (avic_mode == AVIC_MODE_X2 && index > X2AVIC_MAX_PHYSICAL_ID)) + if ((!x2avic_enabled && index > AVIC_MAX_PHYSICAL_ID) || + (index > X2AVIC_MAX_PHYSICAL_ID)) return NULL; avic_physical_id_table = page_address(kvm_svm->avic_physical_id_table_page); @@ -295,8 +294,8 @@ static int avic_init_backing_page(struct kvm_vcpu *vcpu) int id = vcpu->vcpu_id; struct vcpu_svm *svm = to_svm(vcpu); - if ((avic_mode == AVIC_MODE_X1 && id > AVIC_MAX_PHYSICAL_ID) || - (avic_mode == AVIC_MODE_X2 && id > X2AVIC_MAX_PHYSICAL_ID)) + if ((!x2avic_enabled && id > AVIC_MAX_PHYSICAL_ID) || + (id > X2AVIC_MAX_PHYSICAL_ID)) return -EINVAL; if (!vcpu->arch.apic->regs) @@ -1094,10 +1093,7 @@ void avic_refresh_virtual_apic_mode(struct kvm_vcpu *vcpu) struct vcpu_svm *svm = to_svm(vcpu); struct vmcb *vmcb = svm->vmcb01.ptr; - if (!lapic_in_kernel(vcpu) || avic_mode == AVIC_MODE_NONE) - return; - - if (!enable_apicv) + if (!lapic_in_kernel(vcpu) || !enable_apicv) return; if (kvm_vcpu_apicv_active(vcpu)) { @@ -1173,32 +1169,32 @@ bool avic_hardware_setup(struct kvm_x86_ops *x86_ops) if (!npt_enabled) return false; + /* AVIC is a prerequisite for x2AVIC. */ + if (!boot_cpu_has(X86_FEATURE_AVIC) && !force_avic) { + if (boot_cpu_has(X86_FEATURE_X2AVIC)) { + pr_warn(FW_BUG "Cannot support x2AVIC due to AVIC is disabled"); + pr_warn(FW_BUG "Try enable AVIC using force_avic option"); + } + return false; + } + if (boot_cpu_has(X86_FEATURE_AVIC)) { - avic_mode = AVIC_MODE_X1; pr_info("AVIC enabled\n"); } else if (force_avic) { /* * Some older systems does not advertise AVIC support. * See Revision Guide for specific AMD processor for more detail. */ - avic_mode = AVIC_MODE_X1; pr_warn("AVIC is not supported in CPUID but force enabled"); pr_warn("Your system might crash and burn"); } /* AVIC is a prerequisite for x2AVIC. */ - if (boot_cpu_has(X86_FEATURE_X2AVIC)) { - if (avic_mode == AVIC_MODE_X1) { - avic_mode = AVIC_MODE_X2; - pr_info("x2AVIC enabled\n"); - } else { - pr_warn(FW_BUG "Cannot support x2AVIC due to AVIC is disabled"); - pr_warn(FW_BUG "Try enable AVIC using force_avic option"); - } - } + x2avic_enabled = boot_cpu_has(X86_FEATURE_X2AVIC); + if (x2avic_enabled) + pr_info("x2AVIC enabled\n"); - if (avic_mode != AVIC_MODE_NONE) - amd_iommu_register_ga_log_notifier(&avic_ga_log_notifier); + amd_iommu_register_ga_log_notifier(&avic_ga_log_notifier); - return !!avic_mode; + return true; } diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index 2aa5069bafb2..709f0b3e7a48 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -821,7 +821,7 @@ void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept) if (intercept == svm->x2avic_msrs_intercepted) return; - if (avic_mode != AVIC_MODE_X2 || + if (!x2avic_enabled || !apic_x2apic_mode(svm->vcpu.arch.apic)) return; diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h index 7a95f50e80e7..29c334a932c3 100644 --- a/arch/x86/kvm/svm/svm.h +++ b/arch/x86/kvm/svm/svm.h @@ -35,14 +35,7 @@ extern u32 msrpm_offsets[MSRPM_OFFSETS] __read_mostly; extern bool npt_enabled; extern int vgif; extern bool intercept_smi; - -enum avic_modes { - AVIC_MODE_NONE = 0, - AVIC_MODE_X1, - AVIC_MODE_X2, -}; - -extern enum avic_modes avic_mode; +extern bool x2avic_enabled; /* * Clean bits in VMCB. -- 2.37.2.789.g6183377224-goog