Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2218698pxb; Mon, 8 Mar 2021 18:24:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyC76ElszBubkCepPOgeWFizHxxnbpri/9i7Z8DokUKgzQXcqQkt5XJV5kvFCo5Coq4g6Gn X-Received: by 2002:aa7:d503:: with SMTP id y3mr1518297edq.142.1615256698166; Mon, 08 Mar 2021 18:24:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615256698; cv=none; d=google.com; s=arc-20160816; b=VFmlH1L7o9TiYnu5ZZC6fQe4QK2nZelX2rDW5SN7WBO/q03TuxuUyHPRM1ZgE+e31L HjiaLue6wbbeqmQmzJJ7PCY28C34sj8OL+w8taMDHMFkKSG/syo5plJ1s6oJAI32jldl y9H6Q5mq5sFRo+3zC3DvhL/uyT8upTRPMTv3vXc7Son+DRZsF3OFlqAcDfGvPIt4sw8x cZl2Y10TWocMjxBOSJU72gVNJnvcdKfFI0GKB19Gdid6h5Jl6OcLC+p0SY3PUKCpcNdP yRiJWILf+zJtLAl29ONQaAppMcoarVYGuP5Sn3gE6dIybt0wmB4WHbC52sNIHzIlfgga hJAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:sender:dkim-signature; bh=jtA7dmTGM016o6c6Ho9LtE/Z/lpkYetz59Bx/2WDcjg=; b=yIoP7Mi6Mof/Sii3IPKkYSX/O4ad90l9skP0fKmn62V7HrVHlm8ORPBhVHGyhcsl85 bXnZizlrJWe6TwyOx7EB/HQlBTxEHWtUvuND94aMEmDPhfz+0dVyDpiUgxr16WxSCbnY I6SfnPHQKw00SPTjpe0+e6HdsgHAFdu61A9DdhmccMKjHkutZcsc6d6Y6x44lSQZ1wMs awOR5GU/Fui7do8T6RB37ZoOgKAL8FKkHqhTyF8p7UI0GIcxmeIgdJ74CNq7UxrCWgf8 AlX+7OZ1WXkcOrJRRYkaPiXKJXVzlFKa6YN7B/ECJQkVfGPLkjeegty/oCRO+2vr1J2E 4vYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=q5QA+Mb1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u4si8297914ejy.298.2021.03.08.18.24.36; Mon, 08 Mar 2021 18:24:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=q5QA+Mb1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231137AbhCICTt (ORCPT + 99 others); Mon, 8 Mar 2021 21:19:49 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41960 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231132AbhCICTf (ORCPT ); Mon, 8 Mar 2021 21:19:35 -0500 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 58066C06174A for ; Mon, 8 Mar 2021 18:19:24 -0800 (PST) Received: by mail-yb1-xb4a.google.com with SMTP id v6so15268317ybk.9 for ; Mon, 08 Mar 2021 18:19:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=jtA7dmTGM016o6c6Ho9LtE/Z/lpkYetz59Bx/2WDcjg=; b=q5QA+Mb1K6pSAOPJxCsSJRwnmdG0iBZJ/0J1vnIa5lqxWbZ6A69GJHEnauZ5IgHygX vXuDNkgMxkFIFhDBCc4ElWddoWjtMz/vpgDQaZs9GO65lSLeft9GFQU6l9c0LCtDqW03 5oix+LVQ8fhx1UVeJYxUWDJnDBkqYjnkpa63NO5UZufKBQIr62P2mBij8iYjV4bDPXW1 0tqExZVsU1jWJ7r5iv8edK7p/ZUBTXVNU3MmgptIbV7Qy/eU3NjmwoIsii7MMh2pUVGg jrUrmZWOuIiP6UL+aprfrks61l6tnKA3a9/uB8SjYPqJKfCyYA8dnK18sFf5fB1+tZj2 NMLQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=jtA7dmTGM016o6c6Ho9LtE/Z/lpkYetz59Bx/2WDcjg=; b=BDZkw80cn84BqLIdQ5kQ8dFa13U+uHwvafe/LkumSnAf4ue1OjkMA6LIQfohomM14d F812qpa77He3prNs3u2h0u8hv69xo49S8XeX36/JFAVZYxXCE5+DJVr1+A78ktCSViqi lPMdt7Lcz4Z9UsKK56Ijdx14LI/oaEo1rNDhY0xdiO7Em8c3b9mCQPBLLdG5cCpnVLLy 4k9977Huo8VQ9TGh3PJhfuJkYedssIFPGY9IiYuW5XEnvk4ngwml9lEB+EcjgsgZdYCh R+cWzPiyKjpDJnIZ4+Y8wfYUsWN23eUEu3zUT70sVJE+T0NnpArxDHuUKQ4VN6VVl/Kz lvPw== X-Gm-Message-State: AOAM530/LZrpkHHr/Q61oEeDlUYiWAGHRuW40yHH6w1KHXC5t9QRz7zR JIRzSThYCVX4ccai6aAkuhL6+0EjmGQ= Sender: "seanjc via sendgmr" X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:f:10:8:847a:d8b5:e2cc]) (user=seanjc job=sendgmr) by 2002:a25:c6cb:: with SMTP id k194mr36721092ybf.27.1615256363614; Mon, 08 Mar 2021 18:19:23 -0800 (PST) Reply-To: Sean Christopherson Date: Mon, 8 Mar 2021 18:18:59 -0800 In-Reply-To: <20210309021900.1001843-1-seanjc@google.com> Message-Id: <20210309021900.1001843-2-seanjc@google.com> Mime-Version: 1.0 References: <20210309021900.1001843-1-seanjc@google.com> X-Mailer: git-send-email 2.30.1.766.gb4fecdf3b7-goog Subject: [PATCH 1/2] KVM: x86: Fixup "Get active PCID only when writing a CR3 value" From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Lendacky Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson Fix SME and PCID, which got horribly mangled on application. Fixes: a16241ae56fa ("KVM: x86: Get active PCID only when writing a CR3 value") Signed-off-by: Sean Christopherson Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/svm.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index 7876ddf896b8..271196400495 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -3907,15 +3907,20 @@ static void svm_load_mmu_pgd(struct kvm_vcpu *vcpu, hpa_t root_hpa, struct vcpu_svm *svm = to_svm(vcpu); unsigned long cr3; - cr3 = __sme_set(root_hpa); if (npt_enabled) { - svm->vmcb->control.nested_cr3 = root_hpa; + svm->vmcb->control.nested_cr3 = __sme_set(root_hpa); vmcb_mark_dirty(svm->vmcb, VMCB_NPT); /* Loading L2's CR3 is handled by enter_svm_guest_mode. */ if (!test_bit(VCPU_EXREG_CR3, (ulong *)&vcpu->arch.regs_avail)) return; cr3 = vcpu->arch.cr3; + } else if (vcpu->arch.mmu->shadow_root_level >= PT64_ROOT_4LEVEL) { + cr3 = __sme_set(root_hpa) | kvm_get_active_pcid(vcpu); + } else { + /* PCID in the guest should be impossible with a 32-bit MMU. */ + WARN_ON_ONCE(kvm_get_active_pcid(vcpu)); + cr3 = root_hpa; } svm->vmcb->save.cr3 = cr3; -- 2.30.1.766.gb4fecdf3b7-goog