Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp681793ybk; Fri, 15 May 2020 10:45:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwWwZl41Iki9V+84suOBPp9umek/16wdDmEg4PcTj8TSGCCoPM/xyBD2net5kUjtHEvn61j X-Received: by 2002:a05:6402:14d7:: with SMTP id f23mr4094070edx.187.1589564751481; Fri, 15 May 2020 10:45:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589564751; cv=none; d=google.com; s=arc-20160816; b=TALnPa4iTA1tsd6MB11/eR+m2RJknSh1kOp9czf6b1b5myV4mjL/vJa2ztsmutxk1i uPVtFX88hiHHox9xNo0reLsN57ZqnELvM8Hf14OgeOOvFfBY5HEdj5bZzLs0FBiNCl7Y OC7sio0R8sIGkmydHPrEWw65+mim7R+CJPIYNl+B5Q7Oy80B4wqz6zFLeH0QNCUbn4bY iWQXudtkIKw+E2/WK8XAjJ+4fOV7rf5WsMaFBIuigmXYHBz+XdnJkOEG9S7enP77PH31 ZmEexSCu3OGJ7GSGpLXaepGbhnkg1Fpxwn0/xIaYFCTBrrCP2uLqt18QIAcK/tXJq64w Gphw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=L5glrC7ruHWRvC4BN/6woG/tfXJGi9h4QDq5CC9pJHU=; b=vyTjwSoIJyfBruRSEK+qwdCGx79eQofrpkM6ZV2TvJiaBrREqXsP3vqNQRyyVVCx1A f+PdaGde55oZO6Ru4hXiFoiT1HOLCOYp2VbOUbyM7wKIZ4/9Y8fF6ryi9wzp1AgLEfP1 Hqo9b+D5nCqekGn8dRyoMsuOt5+i0JQ9rEhYx1/JYJvfvVmFQ2R3NubzHT3FEceGOzTG UwihGqVwGLSMjsU5/GgTTjJz4wUYlYOtf09tB6zhfGOnCGJuuKNJNpcubv6nhyKuHoJP AXaiqajZePO1/1VisHUJeD6s51EpsU4KyPKkGM5Rb2ED+Zcv4wIybqK1ai/RzmV0KD+J xwEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=YyRCJCfU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l4si1636196ejr.97.2020.05.15.10.45.28; Fri, 15 May 2020 10:45:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=YyRCJCfU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726653AbgEORl6 (ORCPT + 99 others); Fri, 15 May 2020 13:41:58 -0400 Received: from us-smtp-2.mimecast.com ([205.139.110.61]:44485 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726231AbgEORlz (ORCPT ); Fri, 15 May 2020 13:41:55 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1589564514; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:in-reply-to:in-reply-to:references:references; bh=L5glrC7ruHWRvC4BN/6woG/tfXJGi9h4QDq5CC9pJHU=; b=YyRCJCfUUdUuRb09L25r+dECgVm8QxJmTXDixejxTxnhWy4cSs3gOiAdatmvXDuMhTN6Hc 5dg7rz0abyAjPBo6PjT4FmEdwKIPtheSX1Xu/idgL19RIxWi9zzM+GeAXChMychgYrCw16 lWgV2KVKhxcGp5fG9Of3yLoy6m958lA= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-146-QECq06BkN_SVHAtpJRXoig-1; Fri, 15 May 2020 13:41:49 -0400 X-MC-Unique: QECq06BkN_SVHAtpJRXoig-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id D37781005512; Fri, 15 May 2020 17:41:48 +0000 (UTC) Received: from virtlab701.virt.lab.eng.bos.redhat.com (virtlab701.virt.lab.eng.bos.redhat.com [10.19.152.228]) by smtp.corp.redhat.com (Postfix) with ESMTP id 366D110002CD; Fri, 15 May 2020 17:41:48 +0000 (UTC) From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Cathy Avery , Liran Alon , Jim Mattson Subject: [PATCH 3/7] KVM: SVM: extract preparation of VMCB for nested run Date: Fri, 15 May 2020 13:41:40 -0400 Message-Id: <20200515174144.1727-4-pbonzini@redhat.com> In-Reply-To: <20200515174144.1727-1-pbonzini@redhat.com> References: <20200515174144.1727-1-pbonzini@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Split out filling svm->vmcb.save and svm->vmcb.control before VMRUN. Only the latter will be useful when restoring nested SVM state. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 42 +++++++++++++++++++++++---------------- 1 file changed, 25 insertions(+), 17 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index e79acc852000..7807f6cc01fc 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -246,19 +246,8 @@ static void load_nested_vmcb_control(struct vcpu_svm *svm, struct vmcb *nested_v svm->vcpu.arch.tsc_offset += nested_vmcb->control.tsc_offset; } -void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa, - struct vmcb *nested_vmcb) +static void load_nested_vmcb_save(struct vcpu_svm *svm, struct vmcb *nested_vmcb) { - bool evaluate_pending_interrupts = - is_intercept(svm, INTERCEPT_VINTR) || - is_intercept(svm, INTERCEPT_IRET); - - svm->nested.vmcb = vmcb_gpa; - load_nested_vmcb_control(svm, nested_vmcb); - - if (nested_vmcb->control.nested_ctl & SVM_NESTED_CTL_NP_ENABLE) - nested_svm_init_mmu_context(&svm->vcpu); - /* Load the nested guest state */ svm->vmcb->save.es = nested_vmcb->save.es; svm->vmcb->save.cs = nested_vmcb->save.cs; @@ -276,9 +265,6 @@ void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa, } else (void)kvm_set_cr3(&svm->vcpu, nested_vmcb->save.cr3); - /* Guest paging mode is active - reset mmu */ - kvm_mmu_reset_context(&svm->vcpu); - svm->vmcb->save.cr2 = svm->vcpu.arch.cr2 = nested_vmcb->save.cr2; kvm_rax_write(&svm->vcpu, nested_vmcb->save.rax); kvm_rsp_write(&svm->vcpu, nested_vmcb->save.rsp); @@ -291,6 +277,15 @@ void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa, svm->vmcb->save.dr7 = nested_vmcb->save.dr7; svm->vcpu.arch.dr6 = nested_vmcb->save.dr6; svm->vmcb->save.cpl = nested_vmcb->save.cpl; +} + +static void nested_prepare_vmcb_control(struct vcpu_svm *svm, struct vmcb *nested_vmcb) +{ + if (nested_vmcb->control.nested_ctl & SVM_NESTED_CTL_NP_ENABLE) + nested_svm_init_mmu_context(&svm->vcpu); + + /* Guest paging mode is active - reset mmu */ + kvm_mmu_reset_context(&svm->vcpu); svm_flush_tlb(&svm->vcpu); if (nested_vmcb->control.int_ctl & V_INTR_MASKING_MASK) @@ -321,6 +316,21 @@ void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa, */ recalc_intercepts(svm); + mark_all_dirty(svm->vmcb); +} + +void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa, + struct vmcb *nested_vmcb) +{ + bool evaluate_pending_interrupts = + is_intercept(svm, INTERCEPT_VINTR) || + is_intercept(svm, INTERCEPT_IRET); + + svm->nested.vmcb = vmcb_gpa; + load_nested_vmcb_control(svm, nested_vmcb); + load_nested_vmcb_save(svm, nested_vmcb); + nested_prepare_vmcb_control(svm, nested_vmcb); + /* * If L1 had a pending IRQ/NMI before executing VMRUN, * which wasn't delivered because it was disallowed (e.g. @@ -336,8 +346,6 @@ void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa, enable_gif(svm); if (unlikely(evaluate_pending_interrupts)) kvm_make_request(KVM_REQ_EVENT, &svm->vcpu); - - mark_all_dirty(svm->vmcb); } int nested_svm_vmrun(struct vcpu_svm *svm) -- 2.18.2