Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp926783ybh; Wed, 15 Jul 2020 20:42:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzoCGw3AoS9GyiPgQ3V6NWGf3+3QiNfq2iRWm6GR9P3qEwUCN3fbnqsT5mUQUnbDrpHYAVz X-Received: by 2002:a17:906:40d7:: with SMTP id a23mr1850004ejk.421.1594870921914; Wed, 15 Jul 2020 20:42:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594870921; cv=none; d=google.com; s=arc-20160816; b=rU653PljVCemLsDd7aXdPRhYVhykF6TnBx87J5d1wauO5tHgdNGHafxsDRTF5kJIzC eWJG2JJ0gA6uNnqPgpMMpbdsOIzEErnc4soCP0iulh4RAz5rTHTymtpuiBXc669VDcC5 sIjjeJybXsTnATCbP0kDqoKOCS3wXYJjNESt4zwEpHbzFUIOu/p7PV+9+39dLSJg6ACX J6KEqWmdH1nkuydCAnXvsaLtISywPv9oO6kUX/OlMQ+/yRP5D5Pe/q178O0vpTYJgyEp zzVc2t5aRgXGq4oHn1K6eibPFyhGeZdgHmKI2Cv/Vm3UVmcZQskX0+ZrONePc4zpcl1M Bbtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=7pZ7Wd/bVCY0Dk91IuBYWd9J2GgmpM6sI+BxvYJ4irk=; b=rtjl1YnlRpOXO1dvdWv0WRMWVhPl1H3Mt47kHCZ0/cY2B1P2OCEsCBJIl+IAUZ+2tL eY7K4epZVhJsC+tV/8IKJE8mdxDrg5z3hGEByD2MfLyNYH9ANTjA87ULR2flkJxDYDge UXP7F+8HATUgoVc1E/vTDNFMXpoA+7hEPlzUfkeYo7yPJmLS/zisExGTPYYAxOtDSAYw rfHy+RGjTuyW1DdXoXLBYkVnyr3HY9T0CPgo4rHDgPzEXPgDpAajTN4xJY1PcuB9HXrY E7EBDtfXyAoTHNXCHUd4UusCbuWPKpBwV3DzkCHx12hwQGS877udpMu5zJeI+Pdp79Go eH3g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bl25si2188339ejb.731.2020.07.15.20.41.38; Wed, 15 Jul 2020 20:42:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728238AbgGPDl3 (ORCPT + 99 others); Wed, 15 Jul 2020 23:41:29 -0400 Received: from mga11.intel.com ([192.55.52.93]:49384 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727825AbgGPDlZ (ORCPT ); Wed, 15 Jul 2020 23:41:25 -0400 IronPort-SDR: o2z56twEMc573M5VCWIdM1T/z81SYz8Ecfgs6kfhJG/X/2qow+B9CJEftnvYhJk7L052vOilyQ d+BlHOes5PZQ== X-IronPort-AV: E=McAfee;i="6000,8403,9683"; a="147310948" X-IronPort-AV: E=Sophos;i="5.75,357,1589266800"; d="scan'208";a="147310948" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jul 2020 20:41:25 -0700 IronPort-SDR: Eq7vSGi50vAzlkVRA/w3Ky5hkrfcwwmwP61S/b/Y2Flz4ni732GYXOvuFaspE6EaL/8OTdMPMP 9v9oo4ejb76Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,357,1589266800"; d="scan'208";a="316905470" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.152]) by orsmga008.jf.intel.com with ESMTP; 15 Jul 2020 20:41:24 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/9] KVM: nSVM: Correctly set the shadow NPT root level in its MMU role Date: Wed, 15 Jul 2020 20:41:14 -0700 Message-Id: <20200716034122.5998-2-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200716034122.5998-1-sean.j.christopherson@intel.com> References: <20200716034122.5998-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Move the initialization of shadow NPT MMU's shadow_root_level into kvm_init_shadow_npt_mmu() and explicitly set the level in the shadow NPT MMU's role to be the TDP level. This ensures the role and MMU levels are synchronized and also initialized before __kvm_mmu_new_pgd(), which consumes the level when attempting a fast PGD switch. Cc: Vitaly Kuznetsov Fixes: 9fa72119b24db ("kvm: x86: Introduce kvm_mmu_calc_root_page_role()") Fixes: a506fdd223426 ("KVM: nSVM: implement nested_svm_load_cr3() and use it for host->guest switch") Signed-off-by: Sean Christopherson --- arch/x86/kvm/mmu/mmu.c | 3 +++ arch/x86/kvm/svm/nested.c | 1 - 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 77810ce66bdb4..678b6209dad50 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -4963,6 +4963,9 @@ void kvm_init_shadow_npt_mmu(struct kvm_vcpu *vcpu, u32 cr0, u32 cr4, u32 efer, union kvm_mmu_role new_role = kvm_calc_shadow_mmu_root_page_role(vcpu, false); + new_role.base.level = vcpu->arch.tdp_level; + context->shadow_root_level = new_role.base.level; + __kvm_mmu_new_pgd(vcpu, nested_cr3, new_role.base, false, false); if (new_role.as_u64 != context->mmu_role.as_u64) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index 61378a3c2ce44..fb68467e60496 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -85,7 +85,6 @@ static void nested_svm_init_mmu_context(struct kvm_vcpu *vcpu) vcpu->arch.mmu->get_guest_pgd = nested_svm_get_tdp_cr3; vcpu->arch.mmu->get_pdptr = nested_svm_get_tdp_pdptr; vcpu->arch.mmu->inject_page_fault = nested_svm_inject_npf_exit; - vcpu->arch.mmu->shadow_root_level = vcpu->arch.tdp_level; reset_shadow_zero_bits_mask(vcpu, vcpu->arch.mmu); vcpu->arch.walk_mmu = &vcpu->arch.nested_mmu; } -- 2.26.0