Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp576849ybt; Fri, 10 Jul 2020 07:16:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJDA0TVmLK0xVbdtw5xOIef9WJSjt3i0EVHY6uvtYExfX3w8Py+NYsOyY8ufl57/zLD1P3 X-Received: by 2002:a17:906:4e87:: with SMTP id v7mr48803579eju.242.1594390603240; Fri, 10 Jul 2020 07:16:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594390603; cv=none; d=google.com; s=arc-20160816; b=T05PVZwgYMjVFr2tHvJlMIn5JZ6e/Odc9xfW1e1cIGzKThUbvaJg0ZFJGwuAc2EmZP j3Bh7WkvWq9s+RGxIwy0MVv/CwuXawTJxqd5+BDrOAAVZv15DuIIBPBZrus4pm9NLjvi Vw7Hi0XdUs0JhXD8QPcGUR23bUkO6MVaDOeGxf79+yMxA9j9UWxhc5hD0ff9Iy0I/K/E mWF2QRTidj8kR5MKEO30l75Slot899Tx6vu+fGDJPwgCo2yDNjmpeKOdLZ8vTLoSQenC j3l47ac73B/voitQLqlBQs5NmaMArxui+zpotsbT8UpsW2zbXqAc1ekSzjjiMj1qsMDN Rh/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=iY42pDstBtt42lmeDfCO3psdFJJnymF8yHT6i8a7Ssc=; b=aUgPpA8shtCK4X0w9bhG4+Z4XWzvNW9jzECeYHHPsB4C/R2Mf40EPpe7hhpMOund7b OEQFprE0FGzzQT0D9NNWcYH/2Yee5EKHVsafzwRr+H/jz2xIZK1DvGcjAYV3p4gW0BVA dZq1jtizL11Yl2sS0P6h/+2hXfYv5rPFvdKcTfv4cyOIX9SIjHmzMhgbProksbPjLiWJ PkgBKaXAtuDUYC9eLfSXoxD7MszeJRG4wVTIUMwJF/YyOuFCnm/+yOx+iNAIaH+MFvtY zvoP0T+85VdUTwUf7qWI0sITAxu2r+53mABiu9t6ou1flox6c0ZanPqcDf4XPNFdpJwu 5QUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="C/HPrIU0"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j18si3873101eja.217.2020.07.10.07.16.20; Fri, 10 Jul 2020 07:16:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="C/HPrIU0"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728348AbgGJOM4 (ORCPT + 99 others); Fri, 10 Jul 2020 10:12:56 -0400 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:31405 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728197AbgGJOMV (ORCPT ); Fri, 10 Jul 2020 10:12:21 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1594390339; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iY42pDstBtt42lmeDfCO3psdFJJnymF8yHT6i8a7Ssc=; b=C/HPrIU0Qi1lpASiWNZMbWltdbm/H71AUS7rHBDb08SNRWtMvVRCjF/AZ+vDzAcxZUNKzE Blt63PTqFd4gpZeIkoCoiCebQZcozzl8Oro5/HSk7Ee391eS3vaykClO6P2LiY36s1TLKw MaDSGVBFc2uY7dOEPxu+UE3nLr1Bb0s= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-474-xY9-OyuRP4W_vWg8EuSjnw-1; Fri, 10 Jul 2020 10:12:15 -0400 X-MC-Unique: xY9-OyuRP4W_vWg8EuSjnw-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 227B7102C7EC; Fri, 10 Jul 2020 14:12:14 +0000 (UTC) Received: from vitty.brq.redhat.com (unknown [10.40.195.35]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0DC7874F44; Fri, 10 Jul 2020 14:12:11 +0000 (UTC) From: Vitaly Kuznetsov To: kvm@vger.kernel.org, Paolo Bonzini Cc: Sean Christopherson , Wanpeng Li , Jim Mattson , Junaid Shahid , linux-kernel@vger.kernel.org Subject: [PATCH v4 5/9] KVM: nSVM: introduce nested_svm_load_cr3()/nested_npt_enabled() Date: Fri, 10 Jul 2020 16:11:53 +0200 Message-Id: <20200710141157.1640173-6-vkuznets@redhat.com> In-Reply-To: <20200710141157.1640173-1-vkuznets@redhat.com> References: <20200710141157.1640173-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As a preparatory change for implementing nested specifig PGD switch for nSVM (following nVMX' nested_vmx_load_cr3()) instead of relying on kvm_set_cr3() introduce nested_svm_load_cr3(). No functional change intended. Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/svm/nested.c | 21 +++++++++++++++++++-- 1 file changed, 19 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index 5e6c988a4e6b..180929f3dbef 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -311,6 +311,21 @@ static void nested_vmcb_save_pending_event(struct vcpu_svm *svm, nested_vmcb->control.exit_int_info = exit_int_info; } +static inline bool nested_npt_enabled(struct vcpu_svm *svm) +{ + return svm->nested.ctl.nested_ctl & SVM_NESTED_CTL_NP_ENABLE; +} + +/* + * Load guest's cr3 at nested entry. @nested_npt is true if we are + * emulating VM-Entry into a guest with NPT enabled. + */ +static int nested_svm_load_cr3(struct kvm_vcpu *vcpu, unsigned long cr3, + bool nested_npt) +{ + return kvm_set_cr3(vcpu, cr3); +} + static void nested_prepare_vmcb_save(struct vcpu_svm *svm, struct vmcb *nested_vmcb) { /* Load the nested guest state */ @@ -324,7 +339,8 @@ static void nested_prepare_vmcb_save(struct vcpu_svm *svm, struct vmcb *nested_v svm_set_efer(&svm->vcpu, nested_vmcb->save.efer); svm_set_cr0(&svm->vcpu, nested_vmcb->save.cr0); svm_set_cr4(&svm->vcpu, nested_vmcb->save.cr4); - (void)kvm_set_cr3(&svm->vcpu, nested_vmcb->save.cr3); + (void)nested_svm_load_cr3(&svm->vcpu, nested_vmcb->save.cr3, + nested_npt_enabled(svm)); svm->vmcb->save.cr2 = svm->vcpu.arch.cr2 = nested_vmcb->save.cr2; kvm_rax_write(&svm->vcpu, nested_vmcb->save.rax); @@ -343,7 +359,8 @@ static void nested_prepare_vmcb_save(struct vcpu_svm *svm, struct vmcb *nested_v static void nested_prepare_vmcb_control(struct vcpu_svm *svm) { const u32 mask = V_INTR_MASKING_MASK | V_GIF_ENABLE_MASK | V_GIF_MASK; - if (svm->nested.ctl.nested_ctl & SVM_NESTED_CTL_NP_ENABLE) + + if (nested_npt_enabled(svm)) nested_svm_init_mmu_context(&svm->vcpu); /* Guest paging mode is active - reset mmu */ -- 2.25.4