From patchwork Thu Dec 1 23:26:53 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sean Christopherson X-Patchwork-Id: 28604 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp542642wrr; Thu, 1 Dec 2022 15:34:07 -0800 (PST) X-Google-Smtp-Source: AA0mqf6rXK4pTDsEjYVctvUkQsqO+jGmoK9p5U9eyhNoYxnVT2pX/HweORFvDVvMEpvwa6ni0d5w X-Received: by 2002:a05:6402:1802:b0:461:72cb:e5d with SMTP id g2-20020a056402180200b0046172cb0e5dmr53371445edy.410.1669937647812; Thu, 01 Dec 2022 15:34:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669937647; cv=none; d=google.com; s=arc-20160816; b=wYZzV/+7TflrSqAKs/rRt25wAhTdd4L2vkk14ib9eZGqqNof31yU7FRjiRk0i5ojsW BR0XZmP5dYu3JF2IDOAhjK6BXPxSwxkS5eYR8kWtfTQidPeyzxqiNIyR3XUlugywmP/K P0YmP2C55KG2g3hse6LTIpr2/x/O+gqaeK72hANvU/PcHJIL3XTWy5M2pvRU2PED+vro MmcZRg1SuT/q7qBRgnxckRPsgqO46UrEO5r+XT2eYzeMPEaKl3r9OEhKgWiAgg+QLwQb zrU+DOxUIVxDX8acmZ77ekp6VnnzMRhtZrYSUi0kGaOgcnAUVAn6yW2yaX44EnP73BJm +DIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:reply-to:dkim-signature; bh=nVLXdYejrcua3wTUeNkWgCThb6Lpcy1BgMQmZ5bZe4M=; b=foqHuLE5IvTZVIoDHRdnNRKj0B9esRpvEyyK5C6iJHXYK2Fr/mmV7fF51F/xGpviQK 4q4NHIRvgiKbjlwEaoOlUunn91ucKX5BlGGkuNl1Qxd0+DtNXlzkFJ9bMGkrhku/Dfxh cLFz1gyqwnssQ9aOuCg7sbfDtrEV+B6BSs/2ysYBzrkEyXI4gCZc4f9EQIbwOYGDH6DC g7P8ac35+lMVJkpFoNP0p4IFkHgVM6FQ+Ep78nFxJEGwsuQpxqTSl/DR1Cykif2qOlsY IMX0hZ8uHEy5xernHwRacGbOMHvcQE4qDvf4W9HGHJoeT0bf/ePgbAwWJlUgZ4Hi/E6Q K/nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=TXHeUjjb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h7-20020a0564020e0700b00459b51c2b25si4914998edh.438.2022.12.01.15.33.42; Thu, 01 Dec 2022 15:34:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=TXHeUjjb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232025AbiLAX3B (ORCPT + 99 others); Thu, 1 Dec 2022 18:29:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58590 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232018AbiLAX2Y (ORCPT ); Thu, 1 Dec 2022 18:28:24 -0500 Received: from mail-pj1-x1049.google.com (mail-pj1-x1049.google.com [IPv6:2607:f8b0:4864:20::1049]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4A06DCF789 for ; Thu, 1 Dec 2022 15:27:28 -0800 (PST) Received: by mail-pj1-x1049.google.com with SMTP id pa16-20020a17090b265000b0020a71040b4cso2938985pjb.6 for ; Thu, 01 Dec 2022 15:27:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=nVLXdYejrcua3wTUeNkWgCThb6Lpcy1BgMQmZ5bZe4M=; b=TXHeUjjbugM+AmeKkD4B4A3KLhdcZ7ljZbuQPNSoSb87JxUqp1NIhswkLLphZ3dmRr je0ZhrVi9Hut4hTXSzT7WdZHjdMuefJJxUXxpiHwA3Q601WSolyJ7lPedgVPpW9I+kDC k4IAhc/4NGIK7Q6MlszXT4wyv1nbj45C/2D/QgdBf1s4QCAPZBh9BKj1uGvs5DRy9Jn2 5WXmKEgNxxFQXPzhOsEKBbhvMESFoaQhEgV5gU4NgA85/3WeDtQ03LrjYgXfkr9eebgG 7Eyf/fQ4jQXDYtUSUKjp8MTJf1NuHk9CrM02Rm7kI4G0RlYe1jDQ9ERXRYZ0Qa8pACR6 c+nw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=nVLXdYejrcua3wTUeNkWgCThb6Lpcy1BgMQmZ5bZe4M=; b=xdX/kS8QqSP70R4pYtu9NbEY7VkjTFzA46ntcxQZLcdixhxu21Qzdoxml8PD+Mxyoo gEkzAsOc+e6bu1jhXOE5MtSMqobLLSK/t1iqjBFJdf8i/0x4t4sEKqJQGkDE3ulPmem5 ligqxZ+JNsDENP0cCbgNPrs7J1nItC3AvRFbFThOfHAzDrALkWh+BI+9MfmPrxaQoiCN Gp7fvPliHN8rrZXR8UWXVGe9ZgrLM2RcsNS4AsscaUVvB6umIJ67GYrZbTAIbNEOvkAd tkvYNFlBr8m2dC3hW2yXyA4PiR/QEQ21gWgnO0IolEA83QsVCWivMw3KKP6MuBMcec54 nvdQ== X-Gm-Message-State: ANoB5pn3qm9803klwRkxzBKbqiL0OyJdyd7TnuLHVpggH7Hqi/qOzUg8 rbW4361K/EsKC/ofx0wDpRTGP2MNli4= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a62:52c4:0:b0:576:e21:8a32 with SMTP id g187-20020a6252c4000000b005760e218a32mr6732194pfb.46.1669937245736; Thu, 01 Dec 2022 15:27:25 -0800 (PST) Reply-To: Sean Christopherson Date: Thu, 1 Dec 2022 23:26:53 +0000 In-Reply-To: <20221201232655.290720-1-seanjc@google.com> Mime-Version: 1.0 References: <20221201232655.290720-1-seanjc@google.com> X-Mailer: git-send-email 2.39.0.rc0.267.gcb52ba06e7-goog Message-ID: <20221201232655.290720-15-seanjc@google.com> Subject: [PATCH 14/16] x86/virt: KVM: Move "disable SVM" helper into KVM SVM From: Sean Christopherson To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, Sean Christopherson , Paolo Bonzini Cc: "H. Peter Anvin" , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Andrew Cooper X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1751056538996450092?= X-GMAIL-MSGID: =?utf-8?q?1751056538996450092?= Move cpu_svm_disable() into KVM proper now that all hardware virtualization management is routed through KVM. Remove the now-empty virtext.h. No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/include/asm/virtext.h | 47 ---------------------------------- arch/x86/kvm/svm/svm.c | 25 +++++++++++++++--- 2 files changed, 22 insertions(+), 50 deletions(-) delete mode 100644 arch/x86/include/asm/virtext.h diff --git a/arch/x86/include/asm/virtext.h b/arch/x86/include/asm/virtext.h deleted file mode 100644 index 683d20411335..000000000000 --- a/arch/x86/include/asm/virtext.h +++ /dev/null @@ -1,47 +0,0 @@ -/* SPDX-License-Identifier: GPL-2.0-only */ -/* CPU virtualization extensions handling - * - * This should carry the code for handling CPU virtualization extensions - * that needs to live in the kernel core. - * - * Author: Eduardo Habkost - * - * Copyright (C) 2008, Red Hat Inc. - * - * Contains code from KVM, Copyright (C) 2006 Qumranet, Inc. - */ -#ifndef _ASM_X86_VIRTEX_H -#define _ASM_X86_VIRTEX_H - -#include - -#include -#include -#include - -/* - * SVM functions: - */ -/** Disable SVM on the current CPU - */ -static inline void cpu_svm_disable(void) -{ - uint64_t efer; - - wrmsrl(MSR_VM_HSAVE_PA, 0); - rdmsrl(MSR_EFER, efer); - if (efer & EFER_SVME) { - /* - * Force GIF=1 prior to disabling SVM, e.g. to ensure INIT and - * NMI aren't blocked. Eat faults on STGI, as it #UDs if SVM - * isn't enabled and SVM can be disabled by an NMI callback. - */ - asm_volatile_goto("1: stgi\n\t" - _ASM_EXTABLE(1b, %l[fault]) - ::: "memory" : fault); -fault: - wrmsrl(MSR_EFER, efer & ~EFER_SVME); - } -} - -#endif /* _ASM_X86_VIRTEX_H */ diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index ba281651dee4..2aec27b34487 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -41,7 +41,6 @@ #include #include -#include #include "trace.h" #include "svm.h" @@ -571,9 +570,29 @@ void __svm_write_tsc_multiplier(u64 multiplier) preempt_enable(); } +static inline void kvm_cpu_svm_disable(void) +{ + uint64_t efer; + + wrmsrl(MSR_VM_HSAVE_PA, 0); + rdmsrl(MSR_EFER, efer); + if (efer & EFER_SVME) { + /* + * Force GIF=1 prior to disabling SVM, e.g. to ensure INIT and + * NMI aren't blocked. Eat faults on STGI, as it #UDs if SVM + * isn't enabled and SVM can be disabled by an NMI callback. + */ + asm_volatile_goto("1: stgi\n\t" + _ASM_EXTABLE(1b, %l[fault]) + ::: "memory" : fault); +fault: + wrmsrl(MSR_EFER, efer & ~EFER_SVME); + } +} + static void svm_emergency_disable(void) { - cpu_svm_disable(); + kvm_cpu_svm_disable(); } static void svm_hardware_disable(void) @@ -582,7 +601,7 @@ static void svm_hardware_disable(void) if (tsc_scaling) __svm_write_tsc_multiplier(SVM_TSC_RATIO_DEFAULT); - cpu_svm_disable(); + kvm_cpu_svm_disable(); amd_pmu_disable_virt(); }