Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1357351ybz; Wed, 22 Apr 2020 19:28:25 -0700 (PDT) X-Google-Smtp-Source: APiQypIYZJ58HQo6gMKvzlAscqZcR7YMcyPQdxU5rmf6sPQiUpE+OyQlD9wa9881Tl4jvqFc05Ig X-Received: by 2002:aa7:db0b:: with SMTP id t11mr1043367eds.304.1587608904942; Wed, 22 Apr 2020 19:28:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587608904; cv=none; d=google.com; s=arc-20160816; b=Ol6VtMKQ8uLGv+pYnbVbrgjm8xynMz66oY7OKXDCGLknOQs1Ya9u3IiQj3YqHk1RCh tR0EQnC+0zwr1aZQPZVqugBolWnt1iGwpeOqeW7XVfgYXvwS6RQTrZp97tAWGS7mTTn9 H+jjH5c7l4b6RPPL4f7WGluESGQ5zM0Lnben1ynGGuVAhDH3Xc1rPyR27brbBCgACLPp kbPgm28nOlO73yjLYe0+ES12+SnkuEkB0dzzv6hu18xXaq7ZclnztkuLxG3TUUq+J3IT puHAF0gxZhEjFfxHXFjoy32y7+FkSIvAVSe6MIYqL3j+Kj9/a2hRpKiFNE5JYdvX1uQO TvOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=pBiNeWC0T55SMlnl64hi/xAHSYM3NdziWIiEc8DnR7E=; b=DY2XWZtKzhTx+3wsTP33M6MHgK/XHcljWY5QxDN8zC8LGy5/9O8SJWgA24sRqBSGYr /JTQ73YPTCjiC5giVHW3m1j2hzsxTRT0uVN1uyPvYS3JxsxSE3akqIUaBNCkSDY8eFB1 CcFTKVi5WeflU8/MTHfj7iU712uILRIh7t3IvDL7i2/DaDSABxMdHMR0/wGp8o//+K8U VrnlyW9vZRtnCXjRV77BsTdtTulofn+bHDfH1lRE8NO9yn0BQ4Xfu8Su2YGGcVmrqab3 jhIyZs3DsVge/KQgahKI4b1pJEueP7SiakoMI3mJOrMB6kV+xDdur3pBDrsB/44sNGeJ o/pQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n16si493099edv.252.2020.04.22.19.28.02; Wed, 22 Apr 2020 19:28:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726715AbgDWC0f (ORCPT + 99 others); Wed, 22 Apr 2020 22:26:35 -0400 Received: from mga05.intel.com ([192.55.52.43]:43423 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726566AbgDWCZ6 (ORCPT ); Wed, 22 Apr 2020 22:25:58 -0400 IronPort-SDR: 2+yn6XKlbhBdQS6FMbEsWqg7o6buTuxg2T1jynp5suzR+oxkzm//quX/zShXSWp03XrtpCat2H 28VXC/zfTyng== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Apr 2020 19:25:54 -0700 IronPort-SDR: bOGXL2Q6vtAyfC1m2AyNtPmwIxm00w36xy+ihcBTehjipx0n8wB3g2BfYwq6uZi9O+N2vNUGcX 3+R6r5JgOYcA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,305,1583222400"; d="scan'208";a="259273944" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.202]) by orsmga006.jf.intel.com with ESMTP; 22 Apr 2020 19:25:54 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Oliver Upton , Peter Shier Subject: [PATCH 05/13] KVM: nVMX: Move nested_exit_on_nmi() to nested.h Date: Wed, 22 Apr 2020 19:25:42 -0700 Message-Id: <20200423022550.15113-6-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200423022550.15113-1-sean.j.christopherson@intel.com> References: <20200423022550.15113-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Expose nested_exit_on_nmi() for use by vmx_nmi_allowed() in a future patch. No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/kvm/vmx/nested.c | 5 ----- arch/x86/kvm/vmx/nested.h | 5 +++++ 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index 63cf339a13ac..40b2427f35b7 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -698,11 +698,6 @@ static bool nested_exit_intr_ack_set(struct kvm_vcpu *vcpu) VM_EXIT_ACK_INTR_ON_EXIT; } -static bool nested_exit_on_nmi(struct kvm_vcpu *vcpu) -{ - return nested_cpu_has_nmi_exiting(get_vmcs12(vcpu)); -} - static int nested_vmx_check_apic_access_controls(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12) { diff --git a/arch/x86/kvm/vmx/nested.h b/arch/x86/kvm/vmx/nested.h index 1514ff4db77f..7d7475549b9f 100644 --- a/arch/x86/kvm/vmx/nested.h +++ b/arch/x86/kvm/vmx/nested.h @@ -225,6 +225,11 @@ static inline bool nested_cpu_has_save_preemption_timer(struct vmcs12 *vmcs12) VM_EXIT_SAVE_VMX_PREEMPTION_TIMER; } +static inline bool nested_exit_on_nmi(struct kvm_vcpu *vcpu) +{ + return nested_cpu_has_nmi_exiting(get_vmcs12(vcpu)); +} + /* * In nested virtualization, check if L1 asked to exit on external interrupts. * For most existing hypervisors, this will always return true. -- 2.26.0