Re: [PATCH] KVM/VMX/SVM: Move kvm_machine_check function to x86.h

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ping.  This relatively simple patch didn't receive any feedback.

Uros.

On Thu, Oct 29, 2020 at 2:56 PM Uros Bizjak <ubizjak@xxxxxxxxx> wrote:
>
> Move kvm_machine_check to x86.h to avoid two exact copies
> of the same function in kvm.c and svm.c.
>
> Cc: Paolo Bonzini <pbonzini@xxxxxxxxxx>
> Cc: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
> Signed-off-by: Uros Bizjak <ubizjak@xxxxxxxxx>
> ---
>  arch/x86/kvm/svm/svm.c | 20 --------------------
>  arch/x86/kvm/vmx/vmx.c | 20 --------------------
>  arch/x86/kvm/x86.h     | 20 ++++++++++++++++++++
>  3 files changed, 20 insertions(+), 40 deletions(-)
>
> diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
> index 2f32fd09e259..f2ad59d19040 100644
> --- a/arch/x86/kvm/svm/svm.c
> +++ b/arch/x86/kvm/svm/svm.c
> @@ -33,7 +33,6 @@
>  #include <asm/debugreg.h>
>  #include <asm/kvm_para.h>
>  #include <asm/irq_remapping.h>
> -#include <asm/mce.h>
>  #include <asm/spec-ctrl.h>
>  #include <asm/cpu_device_id.h>
>
> @@ -1929,25 +1928,6 @@ static bool is_erratum_383(void)
>         return true;
>  }
>
> -/*
> - * Trigger machine check on the host. We assume all the MSRs are already set up
> - * by the CPU and that we still run on the same CPU as the MCE occurred on.
> - * We pass a fake environment to the machine check handler because we want
> - * the guest to be always treated like user space, no matter what context
> - * it used internally.
> - */
> -static void kvm_machine_check(void)
> -{
> -#if defined(CONFIG_X86_MCE)
> -       struct pt_regs regs = {
> -               .cs = 3, /* Fake ring 3 no matter what the guest ran on */
> -               .flags = X86_EFLAGS_IF,
> -       };
> -
> -       do_machine_check(&regs);
> -#endif
> -}
> -
>  static void svm_handle_mce(struct vcpu_svm *svm)
>  {
>         if (is_erratum_383()) {
> diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
> index 0f390c748b18..0329f09a2ca6 100644
> --- a/arch/x86/kvm/vmx/vmx.c
> +++ b/arch/x86/kvm/vmx/vmx.c
> @@ -40,7 +40,6 @@
>  #include <asm/irq_remapping.h>
>  #include <asm/kexec.h>
>  #include <asm/perf_event.h>
> -#include <asm/mce.h>
>  #include <asm/mmu_context.h>
>  #include <asm/mshyperv.h>
>  #include <asm/mwait.h>
> @@ -4714,25 +4713,6 @@ static int handle_rmode_exception(struct kvm_vcpu *vcpu,
>         return 1;
>  }
>
> -/*
> - * Trigger machine check on the host. We assume all the MSRs are already set up
> - * by the CPU and that we still run on the same CPU as the MCE occurred on.
> - * We pass a fake environment to the machine check handler because we want
> - * the guest to be always treated like user space, no matter what context
> - * it used internally.
> - */
> -static void kvm_machine_check(void)
> -{
> -#if defined(CONFIG_X86_MCE)
> -       struct pt_regs regs = {
> -               .cs = 3, /* Fake ring 3 no matter what the guest ran on */
> -               .flags = X86_EFLAGS_IF,
> -       };
> -
> -       do_machine_check(&regs);
> -#endif
> -}
> -
>  static int handle_machine_check(struct kvm_vcpu *vcpu)
>  {
>         /* handled by vmx_vcpu_run() */
> diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h
> index 3900ab0c6004..e1bde3f3f2d5 100644
> --- a/arch/x86/kvm/x86.h
> +++ b/arch/x86/kvm/x86.h
> @@ -3,6 +3,7 @@
>  #define ARCH_X86_KVM_X86_H
>
>  #include <linux/kvm_host.h>
> +#include <asm/mce.h>
>  #include <asm/pvclock.h>
>  #include "kvm_cache_regs.h"
>  #include "kvm_emulate.h"
> @@ -366,6 +367,25 @@ static inline bool kvm_dr6_valid(u64 data)
>         return !(data >> 32);
>  }
>
> +/*
> + * Trigger machine check on the host. We assume all the MSRs are already set up
> + * by the CPU and that we still run on the same CPU as the MCE occurred on.
> + * We pass a fake environment to the machine check handler because we want
> + * the guest to be always treated like user space, no matter what context
> + * it used internally.
> + */
> +static inline void kvm_machine_check(void)
> +{
> +#if defined(CONFIG_X86_MCE)
> +       struct pt_regs regs = {
> +               .cs = 3, /* Fake ring 3 no matter what the guest ran on */
> +               .flags = X86_EFLAGS_IF,
> +       };
> +
> +       do_machine_check(&regs);
> +#endif
> +}
> +
>  void kvm_load_guest_xsave_state(struct kvm_vcpu *vcpu);
>  void kvm_load_host_xsave_state(struct kvm_vcpu *vcpu);
>  int kvm_spec_ctrl_test_value(u64 value);
> --
> 2.26.2
>



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux