Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp104254rwb; Fri, 30 Sep 2022 18:17:39 -0700 (PDT) X-Google-Smtp-Source: AMsMyM740m0rBe5eJvnQU6g3Pi6q8pX0ovSnRAH02kU/X1pfvi0RQrvbQ2CfU16heeaFgL5kx/j2 X-Received: by 2002:a05:6402:370a:b0:456:d006:6948 with SMTP id ek10-20020a056402370a00b00456d0066948mr9974464edb.90.1664587058823; Fri, 30 Sep 2022 18:17:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664587058; cv=none; d=google.com; s=arc-20160816; b=oobu5m0bmwX8ZTP8WWnUjzbb06rXSyP9ci4GhRIKvbnBe9h39w8AkS5qmN3U3SXDZH 3HRx6dYlSyvxnjaun+HyEBtlM1aJexNIKBO6MId8cAT8QALKtS4W/HqcTkfXfD3gSlkL fhVO00QJv5zEM1fcdhSpzel9GCk1YKoX2+WSHEjJz6aWIFtHxSm4AI7GNofDqUZVdZK3 hbmDYm99nRQ+nV2TEw430v6G6LYvx2SuOjOnzQerOpzt8TLmSweXKmUIqMML1OaMSPhd QgMwswEdbmjLfvxxfX7uAAGeidYB4sGFos3fD/UHj0A5BZrmfL0v88GxvC5xgEUJ84U2 f13g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:reply-to:dkim-signature; bh=+WScKi0/mMhleZMiFA5QnxX58HadmgDv+cqGuX0Jda4=; b=zA9Rc8nQrFpNaHmF1QSrJnl7FI6ZUdSJ74l9CbsirQJEbBKXDvaZS98YD6AUSTYAK2 EWXrLYxmpzRyFtSzXInLDxMJ1aqzNJukEIQhtyU23opbtnX+eBWtUFwQWrWDHLnJaAr4 2IFxfBGZlshZiNEKaMN8kLMw2S95aP65gSpuKXPQxj9/7t77Zw35QgafFv4QfzlbAzDS iWCnvdnKlIUBwth69tfBih0onakMYMpF/oioxSJuzImVbEwtt5rVxqVfLeQrI6ea78PU VjbWBsU19s4a+usaN2pZ9Iznf3iqD5uMpAp4B2p5WdRiDSJ/KENGukYwYIchNtcrfyce +Chg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=cAugleHN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x10-20020a05640225ca00b0044f441d2372si3037527edb.88.2022.09.30.18.17.13; Fri, 30 Sep 2022 18:17:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=cAugleHN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233195AbiJABDs (ORCPT + 99 others); Fri, 30 Sep 2022 21:03:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39908 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233030AbiJABCr (ORCPT ); Fri, 30 Sep 2022 21:02:47 -0400 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C9998170B07 for ; Fri, 30 Sep 2022 18:00:28 -0700 (PDT) Received: by mail-pl1-x64a.google.com with SMTP id u5-20020a170902e80500b00178944c46aaso4239388plg.4 for ; Fri, 30 Sep 2022 18:00:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date; bh=+WScKi0/mMhleZMiFA5QnxX58HadmgDv+cqGuX0Jda4=; b=cAugleHNQ/u7kS9PbZqNOStNuoBnqWLdeRydC5oHYD6JR02YZNq1eDEucHpVKHM8Wq tGdN/HOt+VhcwOQxW8s/Lrkkb+ygvfbU2nPFoCAgY0YK6sy46d9SrxNy8QyuzloPp4SB Qte7oIgg70A1twdSvSKt+PQamrh/zqaEX2Iu+ZOTLHCm1nVBzwMiqmlz8ZKh14Q52fFk QhdW0mAxKsLrrWYq1ndHWpZFMZv6JwaVKEfwWvy73+TFhBF2DZIfapMR2W+vt+pcV6yi +yfuls6iOwO5KNWn6wuVzvR0mQPcdT767HWWTHqM8KBp3KQ+nWwrfC/d+oYn3KBuXUv/ 1BFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date; bh=+WScKi0/mMhleZMiFA5QnxX58HadmgDv+cqGuX0Jda4=; b=sJKCQdikhF77RDbZ4ffF2ttOYq8zeJrlPHhyI2n2vDtJv3AcrvcUQutSHUtlPidM4/ yhAZt1dIHj45h4UdxKN38qC4m+tZ3W1nHVDHNs+mkDimQuJP0cri1LjQbr1Y1JWWgz8q 3mK+L7pabVU4wuL4jRIZkz1UbK+YzUmtiA0yKkIyGyXv25Td3T1u34DBKlbkuGseD/eC kOdc0lBUKEmakniWpiDBMCiHIlBiljgRyZgIV/kUUr9GAkMa7mBKnJGf6vTKdvqOf9JF UBt5ZwX9vq6g4E44QD0R9FkUI+AojjYBdR0inJ9nOqlWENAmFzqKdTO0xmJy4tJjJUUC PHPQ== X-Gm-Message-State: ACrzQf0tTIrKQ9aj5OEMXCD0EiyqZYnBJoFqxBmoJzXibHoLBL2yryhn 5R71/FNAQsP7ERQnNljxGvVZua+3n1g= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:90a:641:b0:202:8568:4180 with SMTP id q1-20020a17090a064100b0020285684180mr988078pje.227.1664586010770; Fri, 30 Sep 2022 18:00:10 -0700 (PDT) Reply-To: Sean Christopherson Date: Sat, 1 Oct 2022 00:59:14 +0000 In-Reply-To: <20221001005915.2041642-1-seanjc@google.com> Mime-Version: 1.0 References: <20221001005915.2041642-1-seanjc@google.com> X-Mailer: git-send-email 2.38.0.rc1.362.ged0d419d3c-goog Message-ID: <20221001005915.2041642-32-seanjc@google.com> Subject: [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu" From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Alejandro Jimenez , Suravee Suthikulpanit , Maxim Levitsky , Li RongQing Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Turns out that some warnings exist for good reasons. Restore the warning in avic_vcpu_load() that guards against calling avic_vcpu_load() on a running vCPU now that KVM avoids doing so when switching between x2APIC and xAPIC. The entire point of the WARN is to highlight that KVM should not be reloading an AVIC. Opportunistically convert the WARN_ON() to WARN_ON_ONCE() to avoid spamming the kernel if it does fire. This reverts commit c0caeee65af3944b7b8abbf566e7cc1fae15c775. Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/avic.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/svm/avic.c b/arch/x86/kvm/svm/avic.c index 953b1fd14b6d..35b0ef877e53 100644 --- a/arch/x86/kvm/svm/avic.c +++ b/arch/x86/kvm/svm/avic.c @@ -1038,6 +1038,7 @@ void avic_vcpu_load(struct kvm_vcpu *vcpu, int cpu) return; entry = READ_ONCE(*(svm->avic_physical_id_cache)); + WARN_ON_ONCE(entry & AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK); entry &= ~AVIC_PHYSICAL_ID_ENTRY_HOST_PHYSICAL_ID_MASK; entry |= (h_physical_id & AVIC_PHYSICAL_ID_ENTRY_HOST_PHYSICAL_ID_MASK); -- 2.38.0.rc1.362.ged0d419d3c-goog