From patchwork Fri Feb 16 09:37:57 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: WANG Xuerui X-Patchwork-Id: 202013 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:c619:b0:108:e6aa:91d0 with SMTP id hn25csp399789dyb; Fri, 16 Feb 2024 01:39:04 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWE22gwV4XF2jLVSiuoMZe+4g1dOERyK+ApmJM0tdCMb3PPpdMZour8mfGBDjRgtIACTkgV3SxiNN/qmO5+q1Q2C8R0ZA== X-Google-Smtp-Source: AGHT+IFUWcGDejLm8yN/zedIITGrvIEvegKzi5BWVb0eHnOZy2DcCYooJKbwBmby3PzlJqEKU5og X-Received: by 2002:a05:622a:294:b0:42c:71ea:9b25 with SMTP id z20-20020a05622a029400b0042c71ea9b25mr5295376qtw.32.1708076344215; Fri, 16 Feb 2024 01:39:04 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708076344; cv=pass; d=google.com; s=arc-20160816; b=pSVW4zDkbqRksiHcW97KN9vEhethdU7RqznkdrAi44uadKHJmmS3u+p2Q9xK94TUb5 tYQKcT2Vm/ZegjPTK2SMzywhFdOG/1GcO+6Fa5bVZNpLwbIKGh0XH84lBII+hqE2Ov0i NVRpFCzwFqnmxy2q8SE1DkhzK3X2BZb3h5ztjZpItyHeuR88ksy4xyy/aqOAlaoRMEX2 5wImUH/Ger5OlQ5+hXc5yKW6qIX4uokkUiB8oTYXhXdyOaQUCV6jPuBAUqMxipbAUnyz RMYbrjOBzoQ55J3Y0fi4bpYiWF7/hu1k3M4Nq5cQMGMOdXMrsNPf0sANAVKRXCZNxFmY KrLQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=EwxUMdKoScppYPca4hV09qldrxR2eZBSW0jiAm+oMNY=; fh=mBf034bH8hBnsBxAupk5xQQrUQuaJjqEyteqgdDSbfg=; b=0yXNoWD67emhbkwwAGV44GlaR5iV2G8kWDgSAT/ccoke+QnK0essSHb+l2NJdOnbet Fq+56zuIvUrPxf5OzGX432J15Zp/xTR7KWTKQsr+UDLCGP3syYvwl2A8SDmhzKopWaxP 9AFN1ncoNVVA/Cz/aIu8VnBs4XKvGEb2sE9XdvCtqtoRxDVWFpyFpWYsMZp8yC6DYyEG SxMQcGTtjB8wparNhwijbJRUFcdPWHJx9c5NHemdrmnvPGq/wWCR6J0ivTCW8hkwkC0G t02FV9G++zN8ZTmglfxOzHMJsjb/+YBLMDHM0CJ2HM1489RBznR0ZPhxdtb9dVmnp4Lw zIZg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@xen0n.name header.s=mail header.b="NQ1/7q7u"; arc=pass (i=1 spf=pass spfdomain=xen0n.name dkim=pass dkdomain=xen0n.name); spf=pass (google.com: domain of linux-kernel+bounces-68341-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68341-ouuuleilei=gmail.com@vger.kernel.org" Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id d24-20020ac86698000000b0042c50a0ffb2si3375518qtp.752.2024.02.16.01.39.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 01:39:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-68341-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@xen0n.name header.s=mail header.b="NQ1/7q7u"; arc=pass (i=1 spf=pass spfdomain=xen0n.name dkim=pass dkdomain=xen0n.name); spf=pass (google.com: domain of linux-kernel+bounces-68341-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68341-ouuuleilei=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 07DD11C2188E for ; Fri, 16 Feb 2024 09:39:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CEF041CA8C; Fri, 16 Feb 2024 09:38:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=xen0n.name header.i=@xen0n.name header.b="NQ1/7q7u" Received: from mailbox.box.xen0n.name (mail.xen0n.name [115.28.160.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 781411BF40; Fri, 16 Feb 2024 09:38:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.28.160.31 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708076296; cv=none; b=kQJ6gKTe/p/Zf3suVwapeVIv3BrAiP5ZOtEqZ8p8xsLs07Rpw3UCOlJjI3YcW88EAHMlX7xZcEB79XOBSi81YMHt85Nqp8TXzRPaPMhfRlLk5mW66tUL6Pd8zqqo29PYEwFn59YHIaggS2Q7Tz5QvLfShj6T5rUGnhpR3rmZPvc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708076296; c=relaxed/simple; bh=KEo5ilDJKrGL6duLt4MyGNOdrIywH1ExG4tjw1tnX/4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=kjtFcfe5/+KsClkEFeZ6Xa5p7UaX9PH6Mo53amdmiV6hhiOfqmvDghF5K5XZetctc9A9JeTqWTNqSMz0AimN1Qtlaebm5T50yusHRJSe0a7BIVWuRyD6Be5L8Q//LaO8rjIEKga+Nkxl504gfMX75LZnkBufZtf3iQnsqCpecLU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=xen0n.name; spf=pass smtp.mailfrom=xen0n.name; dkim=pass (1024-bit key) header.d=xen0n.name header.i=@xen0n.name header.b=NQ1/7q7u; arc=none smtp.client-ip=115.28.160.31 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=xen0n.name Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=xen0n.name DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xen0n.name; s=mail; t=1708076291; bh=KEo5ilDJKrGL6duLt4MyGNOdrIywH1ExG4tjw1tnX/4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NQ1/7q7uSGVHU4We9uGyGdzhLq/3K1/JU3w/6E52uIgPcCumeo6VJCq/QkwmHJviz HBIW1zDjUEFBcjXrXOsFDvwFk7ARQZ8dDH6k9EF2cDuu8h5Z1szne7EiakOVmCtEqg e7XG3oCgOwM8HwQJydv/Vf6rdfv48x3H7ZsYGExc= Received: from ld50.lan (unknown [IPv6:240e:388:8d00:6500:cda4:aa27:b0f6:1748]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailbox.box.xen0n.name (Postfix) with ESMTPSA id 76E1560114; Fri, 16 Feb 2024 17:38:11 +0800 (CST) From: WANG Xuerui To: Paolo Bonzini , Huacai Chen Cc: Tianrui Zhao , Bibo Mao , kvm@vger.kernel.org, loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, WANG Xuerui Subject: [PATCH RESEND for-6.8 v3 1/3] LoongArch: KVM: Fix input validation of _kvm_get_cpucfg and kvm_check_cpucfg Date: Fri, 16 Feb 2024 17:37:57 +0800 Message-ID: <20240216093759.3038760-2-kernel@xen0n.name> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240216093759.3038760-1-kernel@xen0n.name> References: <20240216093759.3038760-1-kernel@xen0n.name> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791047860530140671 X-GMAIL-MSGID: 1791047860530140671 From: WANG Xuerui The range check for the CPUCFG ID is wrong (should have been a || instead of &&); it is conceptually simpler to just express the check as another case of the switch statement on the ID. As it turns out to be the case, the userland (currently only the QEMU/KVM target code) expects to set CPUCFG IDs 0 to 20 inclusive, but only CPUCFG2 values are being validated. Furthermore, the juggling of the temp return value is unnecessary, because it is semantically equivalent and more readable to just return at every switch case's end. This is done too to avoid potential bugs in the future related to the unwanted complexity. Also, the return value of _kvm_get_cpucfg is meant to be checked, but this was not done, so bad CPUCFG IDs wrongly fall back to the default case and 0 is incorrectly returned; check the return value to fix the UAPI behavior. While at it, also remove the redundant range check in kvm_check_cpucfg, because out-of-range CPUCFG IDs are already rejected by the -EINVAL as returned by _kvm_get_cpucfg. Fixes: db1ecca22edf ("LoongArch: KVM: Add LSX (128bit SIMD) support") Fixes: 118e10cd893d ("LoongArch: KVM: Add LASX (256bit SIMD) support") Signed-off-by: WANG Xuerui --- arch/loongarch/kvm/vcpu.c | 35 ++++++++++++++++------------------- 1 file changed, 16 insertions(+), 19 deletions(-) diff --git a/arch/loongarch/kvm/vcpu.c b/arch/loongarch/kvm/vcpu.c index 27701991886d..124cd7a75061 100644 --- a/arch/loongarch/kvm/vcpu.c +++ b/arch/loongarch/kvm/vcpu.c @@ -300,11 +300,6 @@ static int _kvm_setcsr(struct kvm_vcpu *vcpu, unsigned int id, u64 val) static int _kvm_get_cpucfg(int id, u64 *v) { - int ret = 0; - - if (id < 0 && id >= KVM_MAX_CPUCFG_REGS) - return -EINVAL; - switch (id) { case 2: /* Return CPUCFG2 features which have been supported by KVM */ @@ -324,32 +319,34 @@ static int _kvm_get_cpucfg(int id, u64 *v) if (cpu_has_lasx) *v |= CPUCFG2_LASX; - break; + return 0; + case 0 ... 1: + case 3 ... KVM_MAX_CPUCFG_REGS - 1: + /* no restrictions on other CPUCFG IDs' values */ + *v = U64_MAX; + return 0; default: - ret = -EINVAL; - break; + return -EINVAL; } - return ret; } static int kvm_check_cpucfg(int id, u64 val) { - u64 mask; - int ret = 0; - - if (id < 0 && id >= KVM_MAX_CPUCFG_REGS) - return -EINVAL; + u64 mask = 0; + int ret; - if (_kvm_get_cpucfg(id, &mask)) + ret = _kvm_get_cpucfg(id, &mask); + if (ret) return ret; + if (val & ~mask) + /* Unsupported features should not be set */ + return -EINVAL; + switch (id) { case 2: /* CPUCFG2 features checking */ - if (val & ~mask) - /* The unsupported features should not be set */ - ret = -EINVAL; - else if (!(val & CPUCFG2_LLFTP)) + if (!(val & CPUCFG2_LLFTP)) /* The LLFTP must be set, as guest must has a constant timer */ ret = -EINVAL; else if ((val & CPUCFG2_FP) && (!(val & CPUCFG2_FPSP) || !(val & CPUCFG2_FPDP))) From patchwork Fri Feb 16 09:37:58 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: WANG Xuerui X-Patchwork-Id: 202015 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:c619:b0:108:e6aa:91d0 with SMTP id hn25csp400466dyb; Fri, 16 Feb 2024 01:41:06 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVXAtEnQj9ftgE6tQvQixdg3CWS0rz3CyaYp7V3fEscpbthzMKkebI72CMCrxiTJSMnqaAYdj2McfQ3ip34SaYKkc7s0g== X-Google-Smtp-Source: AGHT+IG5BptFLsDnCTRCNn4pnTNAzjjvVCdHluM/GQuuo67BfMtPn3fw4e3kZSZDk2HyJ4HsuCAb X-Received: by 2002:a05:6a20:94c4:b0:19e:487e:39e7 with SMTP id ht4-20020a056a2094c400b0019e487e39e7mr7075454pzb.16.1708076466642; Fri, 16 Feb 2024 01:41:06 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708076466; cv=pass; d=google.com; s=arc-20160816; b=j1EbwbV1I5gsKRMreR36ZdtwE+Os+cHlJCU+3DcKs2Ylub4cRQ5olD8N0hV3wc+Xt5 9py0fFPbJ+dA3+/ckv1nabFY789Lqqvs91uINfFt02sKGTeYO3/p6qnZgDgmuNR/4APt VipS8+WqdsQPqJcnRPlnKJeeDsNpPOm2YjOXNBpszHKmuz/Vm3/w/POZvPodnLk+H6b+ ZXC3So/Ir1zJocq9QH88QSeIq8N0iMA7uuRbZzPDYfOA+WWvOUJ9w0RV8dkF1zTenXZm oJz3iqGHKZSToDScRfXXiWUBp8xIpkMex5eR16vsqMOcmHtj/BQuhTFnaeED+2tE4z6/ V7ww== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=URrTWB3RZXs3TvqdoUZj743iiVYmCnop4gfoxoLRxZ4=; fh=mBf034bH8hBnsBxAupk5xQQrUQuaJjqEyteqgdDSbfg=; b=biwKtI7DAhkpjYngBR4Jm17Ijv38oso+2BTbgMSVEwdxQKDgV0rIYcj8qNK6UJ3hqQ J0z0B3Rsvy0kVi7Z4f1Jqz+XDh1G3UeoZUuCrXXi2zNH12fSsKdfBPiM4MyXLYOOJ0uc 47Uf1VVYKrMi7344DCdSGJVQw579BEYnJ2IVfkTqUPkBXYpdDIo58iRP2RPde3Saq9iH 0Dy2WaRlWOD2x6gx7tjBaaKELvJlBEy2FbIajVrq0ACm2hSVub4m/n8bHbYPz2PY9R/Y PL3xhqHzMw5BEZmMlGsaIVInjex0dqAYkIUi4jY+xFdd23Ho0sSCEPUeTCNBFoIgRZCD QOdQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@xen0n.name header.s=mail header.b=pTrLmwBK; arc=pass (i=1 spf=pass spfdomain=xen0n.name dkim=pass dkdomain=xen0n.name); spf=pass (google.com: domain of linux-kernel+bounces-68340-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68340-ouuuleilei=gmail.com@vger.kernel.org" Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id i134-20020a636d8c000000b005cef24b3015si2678073pgc.219.2024.02.16.01.41.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 01:41:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-68340-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@xen0n.name header.s=mail header.b=pTrLmwBK; arc=pass (i=1 spf=pass spfdomain=xen0n.name dkim=pass dkdomain=xen0n.name); spf=pass (google.com: domain of linux-kernel+bounces-68340-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68340-ouuuleilei=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 99C35B24534 for ; Fri, 16 Feb 2024 09:39:05 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CF05C1CA8D; Fri, 16 Feb 2024 09:38:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=xen0n.name header.i=@xen0n.name header.b="pTrLmwBK" Received: from mailbox.box.xen0n.name (mail.xen0n.name [115.28.160.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 47A691BF3F; Fri, 16 Feb 2024 09:38:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.28.160.31 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708076296; cv=none; b=NReycuoF8nBtCc8+H6VkOZtg77ePrG1j+x1HFcj1C4DmeuSITBpVBxYCxkWJxqz6tT97lRJMHnRcx/waDvUe/t3BDps/ucqS4mZ1sP6bvqD7kK2uoPzDdwqz9cuQYyxM9wXGI+JSNg2tQmql/Ld4qH5LCHGO8PigXeX6i56Lzlg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708076296; c=relaxed/simple; bh=rEiWf82DA18Wx2w8gv0lu+0/shLFZ5W8HKb5RPqBJ7Q=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=EPsrh67aKfhTgHby7zEz1Z007e8KCug0ArXsgpdmPA3loVc7t6dZRtR7kE6CtwgG8Wst+QPMLIPzmur5qylt9VmFRHdw8fIG5Q1ROm+54A3MpHf0Rm/zQVZo/6e0pUwSNrjQefHuCE64TAIk8Lhgz2X17hB0dZ57+5ddBuWwvyA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=xen0n.name; spf=pass smtp.mailfrom=xen0n.name; dkim=pass (1024-bit key) header.d=xen0n.name header.i=@xen0n.name header.b=pTrLmwBK; arc=none smtp.client-ip=115.28.160.31 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=xen0n.name Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=xen0n.name DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xen0n.name; s=mail; t=1708076291; bh=rEiWf82DA18Wx2w8gv0lu+0/shLFZ5W8HKb5RPqBJ7Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pTrLmwBKY5FMRgpMJJ/RZ1TDW9MvxnohZrjBSKIT+aNui7lLW9PmTFV7CQs93mMjX Me1+9Qf7l0KpD+BzrX+11EuiVSnbcL9pNarzKfLvn3yX+y6utgNThy3Yowy4W0L9Js qtcy5HAk8cVmrLOuwG7XpPgStPEs85sYwW4Vr1Io= Received: from ld50.lan (unknown [IPv6:240e:388:8d00:6500:cda4:aa27:b0f6:1748]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailbox.box.xen0n.name (Postfix) with ESMTPSA id C9BE660187; Fri, 16 Feb 2024 17:38:11 +0800 (CST) From: WANG Xuerui To: Paolo Bonzini , Huacai Chen Cc: Tianrui Zhao , Bibo Mao , kvm@vger.kernel.org, loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, WANG Xuerui Subject: [PATCH RESEND for-6.8 v3 2/3] LoongArch: KVM: Rename _kvm_get_cpucfg to _kvm_get_cpucfg_mask Date: Fri, 16 Feb 2024 17:37:58 +0800 Message-ID: <20240216093759.3038760-3-kernel@xen0n.name> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240216093759.3038760-1-kernel@xen0n.name> References: <20240216093759.3038760-1-kernel@xen0n.name> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791047988944199692 X-GMAIL-MSGID: 1791047988944199692 From: WANG Xuerui The function is not actually a getter of guest CPUCFG, but rather validation of the input CPUCFG ID plus information about the supported bit flags of that CPUCFG leaf. So rename it to avoid confusion. Signed-off-by: WANG Xuerui --- arch/loongarch/kvm/vcpu.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/loongarch/kvm/vcpu.c b/arch/loongarch/kvm/vcpu.c index 124cd7a75061..e5acd4c08071 100644 --- a/arch/loongarch/kvm/vcpu.c +++ b/arch/loongarch/kvm/vcpu.c @@ -298,7 +298,7 @@ static int _kvm_setcsr(struct kvm_vcpu *vcpu, unsigned int id, u64 val) return ret; } -static int _kvm_get_cpucfg(int id, u64 *v) +static int _kvm_get_cpucfg_mask(int id, u64 *v) { switch (id) { case 2: @@ -335,7 +335,7 @@ static int kvm_check_cpucfg(int id, u64 val) u64 mask = 0; int ret; - ret = _kvm_get_cpucfg(id, &mask); + ret = _kvm_get_cpucfg_mask(id, &mask); if (ret) return ret; @@ -563,7 +563,7 @@ static int kvm_loongarch_get_cpucfg_attr(struct kvm_vcpu *vcpu, uint64_t val; uint64_t __user *uaddr = (uint64_t __user *)attr->addr; - ret = _kvm_get_cpucfg(attr->attr, &val); + ret = _kvm_get_cpucfg_mask(attr->attr, &val); if (ret) return ret; From patchwork Fri Feb 16 09:37:59 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: WANG Xuerui X-Patchwork-Id: 202014 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:c619:b0:108:e6aa:91d0 with SMTP id hn25csp399918dyb; Fri, 16 Feb 2024 01:39:27 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWYlyaaxUNHnfHfIkt593Ncop0dtGm4NBhRudGeyA//Jkb+usO7WX1NAQhgMyabw+JmGOqw1w0HF0YAjuxaFrNcJdcxPA== X-Google-Smtp-Source: AGHT+IFpBrMNFR1WLYnsUcterrUjA6tNr5dMAkbUdLATn+BzWEgK7AxPWv9SemOc2oQZQOix/iYi X-Received: by 2002:a0c:e0c9:0:b0:68f:390c:270c with SMTP id x9-20020a0ce0c9000000b0068f390c270cmr196702qvk.25.1708076367449; Fri, 16 Feb 2024 01:39:27 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708076367; cv=pass; d=google.com; s=arc-20160816; b=CG7VCApZWxk3mDKl2bOrzHWmY83U6HAaCheUGuDF7C7qdIQqHRFbjPgZnY0cVWji/1 XwDcaqsw+u46TSDnY6vBT5oNm5KlAo/afArm3NFH+PWj14IW/L4BE6vjiQJ+oX7MgxQo LtRiU7BPsnSfkMdai+l9QxW/rGvFyVFpdilUVf7BGoupW1+JSk5yvPzUJt3L/ioijcJi +Xq4vNbwhOlMuuh49CmCFnCO5EnfQzvYJvQJpR3sOogIf6s8fLpSvmRp7Zi/ISo8s2px DlbTMfxKEcXcMZB2RSfrNS8kSaP/I2ofRn04BiQLwFvW5/iJhsgoaTB1mU+oY5EqqT+Z mv5Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=jESQAA1Wm0D96JxsfGJo/zqHnmx+/xZ/pQLMvwErDo0=; fh=mBf034bH8hBnsBxAupk5xQQrUQuaJjqEyteqgdDSbfg=; b=sM7FQwpEKlvDf4YpuBDeAcC8TyalzfiCIKaABAgO+B8tq9wSaHE95H6PzdvhO17beH R5GAF+bZAYpjBaZx9cxVx25Ia+/FMlGlnhlSCv0KALCIP03zYoaO/7uvnaK+/BxcGM77 7CE6ncnB/GTEI7ryAgIQp+Pg+5lkcC+SQLtRecIAFVz+/KnClcyJ5VJxkYo7aMOPvTvu gTfn7zx6j4PHdBeIg1ipFjQPTJ9fyScmXfWhSReP6esU4/x9aE1vtLU3WuN8nRJ+3EbP tCefUWnb4bTHjDVb8Fj8q005TZa1PRxV2vUVYljqwoZd6GXBH0klIaylUWerv6+8GRd9 qj/Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@xen0n.name header.s=mail header.b="Ulvq/xe6"; arc=pass (i=1 spf=pass spfdomain=xen0n.name dkim=pass dkdomain=xen0n.name); spf=pass (google.com: domain of linux-kernel+bounces-68342-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68342-ouuuleilei=gmail.com@vger.kernel.org" Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id hf12-20020a0562140e8c00b0068c728c9dcesi3416004qvb.590.2024.02.16.01.39.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 01:39:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-68342-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@xen0n.name header.s=mail header.b="Ulvq/xe6"; arc=pass (i=1 spf=pass spfdomain=xen0n.name dkim=pass dkdomain=xen0n.name); spf=pass (google.com: domain of linux-kernel+bounces-68342-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68342-ouuuleilei=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 40D951C229D1 for ; Fri, 16 Feb 2024 09:39:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 644881CD1E; Fri, 16 Feb 2024 09:38:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=xen0n.name header.i=@xen0n.name header.b="Ulvq/xe6" Received: from mailbox.box.xen0n.name (mail.xen0n.name [115.28.160.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 805951BF47; Fri, 16 Feb 2024 09:38:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.28.160.31 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708076298; cv=none; b=Ubm4k+EfiTcwstoZWh13wAQ63DZ+z1/ANNMQfZPB8kHTih1X/usC6xSzqKIz80zYl3npsl8yyOizlxQFjkdDc3Q4ehL+FXTGpxgl6iKAGmEB5m+BWPHRjufiRZisE9l0WGl4OBnC97QLOck3Xsvf1X9rMIOuh2KjfSkcMOeF/WY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708076298; c=relaxed/simple; bh=2gDw0o66DflpWYG/Gy8TCph2SB91NzGgN6Z10TivAUU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=bSj2IoCC5Z8/v2unUAO3j3MdEF1teaZw7vvqTRcMU8KU2k6TayUWn5uMFJ48UPU614q1LRj16V0Y/8zOprtdAQeJ8RLFaY73QOSC9zejw0Dt1bWcHG/tzEsVwONhQytrguLba2MCrB1DIPrnAaF3CgMRDZTeI+i+DCD4ty2rQb4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=xen0n.name; spf=pass smtp.mailfrom=xen0n.name; dkim=pass (1024-bit key) header.d=xen0n.name header.i=@xen0n.name header.b=Ulvq/xe6; arc=none smtp.client-ip=115.28.160.31 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=xen0n.name Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=xen0n.name DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xen0n.name; s=mail; t=1708076292; bh=2gDw0o66DflpWYG/Gy8TCph2SB91NzGgN6Z10TivAUU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ulvq/xe6cFTI8BwAFq0qNG5RRJDH/Y5KfG0hNR+0SLrn7PeldaNl13frJGtctTvxa 4abex99Is7H4g0WLJHBr7sO2yztEjCnTxSTTWCJWuRiC2Hmeuk3QL5eAju+X7vqhcE Oe03bg/ZhJUVxnEmXcqf8lksMfnmNCfeJdWG7T/Q= Received: from ld50.lan (unknown [IPv6:240e:388:8d00:6500:cda4:aa27:b0f6:1748]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailbox.box.xen0n.name (Postfix) with ESMTPSA id 9404E601C2; Fri, 16 Feb 2024 17:38:12 +0800 (CST) From: WANG Xuerui To: Paolo Bonzini , Huacai Chen Cc: Tianrui Zhao , Bibo Mao , kvm@vger.kernel.org, loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, WANG Xuerui Subject: [PATCH RESEND for-6.8 v3 3/3] LoongArch: KVM: Streamline kvm_check_cpucfg and improve comments Date: Fri, 16 Feb 2024 17:37:59 +0800 Message-ID: <20240216093759.3038760-4-kernel@xen0n.name> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240216093759.3038760-1-kernel@xen0n.name> References: <20240216093759.3038760-1-kernel@xen0n.name> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791047885155777163 X-GMAIL-MSGID: 1791047885155777163 From: WANG Xuerui All the checks currently done in kvm_check_cpucfg can be realized with early returns, so just do that to avoid extra cognitive burden related to the return value handling. While at it, clean up comments of _kvm_get_cpucfg_mask and kvm_check_cpucfg, by removing comments that are merely restatement of the code nearby, and paraphrasing the rest so they read more natural for English speakers (that likely are not familiar with the actual Chinese-influenced grammar). No functional changes intended. Signed-off-by: WANG Xuerui --- arch/loongarch/kvm/vcpu.c | 42 +++++++++++++++++++-------------------- 1 file changed, 20 insertions(+), 22 deletions(-) diff --git a/arch/loongarch/kvm/vcpu.c b/arch/loongarch/kvm/vcpu.c index e5acd4c08071..a241db6d77a6 100644 --- a/arch/loongarch/kvm/vcpu.c +++ b/arch/loongarch/kvm/vcpu.c @@ -302,20 +302,16 @@ static int _kvm_get_cpucfg_mask(int id, u64 *v) { switch (id) { case 2: - /* Return CPUCFG2 features which have been supported by KVM */ + /* CPUCFG2 features unconditionally supported by KVM */ *v = CPUCFG2_FP | CPUCFG2_FPSP | CPUCFG2_FPDP | CPUCFG2_FPVERS | CPUCFG2_LLFTP | CPUCFG2_LLFTPREV | CPUCFG2_LAM; /* - * If LSX is supported by CPU, it is also supported by KVM, - * as we implement it. + * For the ISA extensions listed below, if one is supported + * by the host, then it is also supported by KVM. */ if (cpu_has_lsx) *v |= CPUCFG2_LSX; - /* - * if LASX is supported by CPU, it is also supported by KVM, - * as we implement it. - */ if (cpu_has_lasx) *v |= CPUCFG2_LASX; @@ -345,24 +341,26 @@ static int kvm_check_cpucfg(int id, u64 val) switch (id) { case 2: - /* CPUCFG2 features checking */ if (!(val & CPUCFG2_LLFTP)) - /* The LLFTP must be set, as guest must has a constant timer */ - ret = -EINVAL; - else if ((val & CPUCFG2_FP) && (!(val & CPUCFG2_FPSP) || !(val & CPUCFG2_FPDP))) - /* Single and double float point must both be set when enable FP */ - ret = -EINVAL; - else if ((val & CPUCFG2_LSX) && !(val & CPUCFG2_FP)) - /* FP should be set when enable LSX */ - ret = -EINVAL; - else if ((val & CPUCFG2_LASX) && !(val & CPUCFG2_LSX)) - /* LSX, FP should be set when enable LASX, and FP has been checked before. */ - ret = -EINVAL; - break; + /* Guests must have a constant timer */ + return -EINVAL; + if ((val & CPUCFG2_FP) && (!(val & CPUCFG2_FPSP) || !(val & CPUCFG2_FPDP))) + /* Single and double float point must both be set when FP is enabled */ + return -EINVAL; + if ((val & CPUCFG2_LSX) && !(val & CPUCFG2_FP)) + /* LSX architecturally implies FP but val does not satisfy that */ + return -EINVAL; + if ((val & CPUCFG2_LASX) && !(val & CPUCFG2_LSX)) + /* LASX architecturally implies LSX and FP but val does not satisfy that */ + return -EINVAL; + return 0; default: - break; + /* + * Values for the other CPUCFG IDs are not being further validated + * besides the mask check above. + */ + return 0; } - return ret; } static int kvm_get_one_reg(struct kvm_vcpu *vcpu,