Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4927746pxj; Tue, 22 Jun 2021 11:01:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8BAad5h7JGIXSln6JCF6vVWojASIKkPAmbh42i/a4+EhwZZMHSl+FpQkolNmBFT7NoIdy X-Received: by 2002:a92:cdab:: with SMTP id g11mr3570779ild.240.1624384902191; Tue, 22 Jun 2021 11:01:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624384902; cv=none; d=google.com; s=arc-20160816; b=D5sZ03pLV5Gk+Hx2F0dt0qKq0rToVy2aGK82avyC0Ii6xu6HRmASaoAljFIuVNuvjb YBNsKwuumkC+rTk7JcUJu0b3YqM3C+huVDPev6QdSMoIPT963ZvqGvq3Mi+vWM51k1Vq O/f45BIFCdEq5HNdUbbn1I6Af231U5n29VbKjRO1cubwD1TAQNTkvn+AJ8aAj6gFd3TF +KXGd3sslur2QC4HVstOevAR59mscyI+vwYlPQWXJfiwjyDYTSZxxGGw97UFsnixlEQ2 LZvR+swcdsEKDMqSrPR3FmEgSaj8U3+1QHhsS40zhydskoedYXnEHEfTA9Lj15kKN8dA SCIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:dkim-signature; bh=kQmirOy+CFqTjeIK11GchlgwLFqpy8qC6wsHe7x5/AA=; b=mihMn9lDttp1hNURcxhS6hq/BswRlKDHAuag9HTSQeoK92E0BBuo9lznta4Pdc9Y1Z 65svJZV86406j9OLCb14MksBxKuq0eUkfkGMNCMfDvr2hFAKwglY8Eh41g2YXSXFZehp FXbeBtRI7YLpa/uNwsbh2yZWBzcTuVHJFumBZxHPNqSantlW8l1QKTllOjeLXVtM/qYr pJoCy10hleCoT+agW/etBHaoy2e10qE+OyfJK4iRG2whaWvJ7/8S0UbpkZ413T38zTwP M+XkG5a8M2VrdTFmvfC/GA2JnQ/MTL2fUo4K85FfA0fewHBEoy6klJgrfazbEJY5Q+Pq XAkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BbZKxsWT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l16si23505965ion.65.2021.06.22.11.01.27; Tue, 22 Jun 2021 11:01:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BbZKxsWT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232525AbhFVSCm (ORCPT + 99 others); Tue, 22 Jun 2021 14:02:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37646 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232597AbhFVSCN (ORCPT ); Tue, 22 Jun 2021 14:02:13 -0400 Received: from mail-qv1-xf4a.google.com (mail-qv1-xf4a.google.com [IPv6:2607:f8b0:4864:20::f4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 852C7C061156 for ; Tue, 22 Jun 2021 10:58:54 -0700 (PDT) Received: by mail-qv1-xf4a.google.com with SMTP id x13-20020a0cfe0d0000b0290264540cb5d3so2301159qvr.17 for ; Tue, 22 Jun 2021 10:58:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=kQmirOy+CFqTjeIK11GchlgwLFqpy8qC6wsHe7x5/AA=; b=BbZKxsWTRk7inBXx75lpGni6nxDEt9V69Z1I82wmBj1CJBLiwZnnQ15qPdWYB1SVmx xMTpnaMrP70Hy/PeAhw5CkiwfLW6JHcZxDu9IrNI6uIyykS7A98rsHFirRIQ4p1RYYA0 2ZsEZmQW+/uXKyTuuGHMGlk7ix6xBKMC0R/Ae88m9zkCnU4Bpjvh6j1B54mo+d8iACG1 7CMJ5a0058s+16l76A5N2QQmPTPUkUl80KfB9NA6eGfnh4WUEYufhj/jtyPwKZjnKFrU XGr891d+dQbNWW3yoi7kCJUpneLv3phrDiakH7Ik3G7qVXZ82Xyf5xo1fSLa4xoKj9TT laBQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=kQmirOy+CFqTjeIK11GchlgwLFqpy8qC6wsHe7x5/AA=; b=g/adAKIlqyt/JsJysPzVFFIw6VBKUdH3It56at/dhmfPtWtljmLkLQDn3dzTCFKLIQ 5AfUN1zxIf8cwM0lgyoOX+pA+QmSsPLXo7q8ZfgI9m/xrY4PbfSsw1i79qoVDJ5ZBKgg BErTbDnO8ZOsz4c1KB08D2T4X0//XIV7XpwLAyXTUTDG1Dnr8saxhMB6YEnRWHLLcH/4 RsJ189chUdP17buejgk3hEZ/kQGM1n6TM33joy9qBOoqf9lpKMbketcxCJldzon6mCzR WlSMDC4bPz5ZJqrCfUgkzVx1RpWQYNT8PLdEHq9sU968R/988S2oVdjscOwxmYhjvR2M tFHQ== X-Gm-Message-State: AOAM53372Wh20wW66QaBnzuyZiapIKiuqWC1P/SKyQe5CSV3oFTmt/WS JzvuVyy52uX9RRniKiHamyk0/3MqYAI= X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:f:10:5722:92ce:361f:3832]) (user=seanjc job=sendgmr) by 2002:a25:2d55:: with SMTP id s21mr3501239ybe.338.1624384733636; Tue, 22 Jun 2021 10:58:53 -0700 (PDT) Reply-To: Sean Christopherson Date: Tue, 22 Jun 2021 10:57:10 -0700 In-Reply-To: <20210622175739.3610207-1-seanjc@google.com> Message-Id: <20210622175739.3610207-26-seanjc@google.com> Mime-Version: 1.0 References: <20210622175739.3610207-1-seanjc@google.com> X-Mailer: git-send-email 2.32.0.288.g62a8d224e6-goog Subject: [PATCH 25/54] KVM: x86/mmu: Add helpers to query mmu_role bits From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Yu Zhang , Maxim Levitsky Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add helpers via a builder macro for all mmu_role bits that track a CR0, CR4, or EFER bit. Digging out the bits manually is not exactly the most readable code. Future commits will switch to using mmu_role instead of vCPU state to configure the MMU, i.e. there are about to be a large number of users. Signed-off-by: Sean Christopherson --- arch/x86/kvm/mmu/mmu.c | 21 +++++++++++++++++++++ arch/x86/kvm/mmu/paging_tmpl.h | 2 +- 2 files changed, 22 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 7bc5b1a8fca5..be95595b30c7 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -206,6 +206,27 @@ BUILD_MMU_ROLE_REGS_ACCESSOR(cr4, la57, X86_CR4_LA57); BUILD_MMU_ROLE_REGS_ACCESSOR(efer, nx, EFER_NX); BUILD_MMU_ROLE_REGS_ACCESSOR(efer, lma, EFER_LMA); +/* + * The MMU itself (with a valid role) is the single source of truth for the + * MMU. Do not use the regs used to build the MMU/role, nor the vCPU. The + * regs don't account for dependencies, e.g. clearing CR4 bits if CR0.PG=1, + * and the vCPU may be incorrect/irrelevant. + */ +#define BUILD_MMU_ROLE_ACCESSOR(base_or_ext, reg, name) \ +static inline bool is_##reg##_##name(struct kvm_mmu *mmu) \ +{ \ + return !!(mmu->mmu_role. base_or_ext . reg##_##name); \ +} +BUILD_MMU_ROLE_ACCESSOR(ext, cr0, pg); +BUILD_MMU_ROLE_ACCESSOR(base, cr0, wp); +BUILD_MMU_ROLE_ACCESSOR(ext, cr4, pse); +BUILD_MMU_ROLE_ACCESSOR(ext, cr4, pae); +BUILD_MMU_ROLE_ACCESSOR(ext, cr4, smep); +BUILD_MMU_ROLE_ACCESSOR(ext, cr4, smap); +BUILD_MMU_ROLE_ACCESSOR(ext, cr4, pke); +BUILD_MMU_ROLE_ACCESSOR(ext, cr4, la57); +BUILD_MMU_ROLE_ACCESSOR(base, efer, nx); + struct kvm_mmu_role_regs vcpu_to_role_regs(struct kvm_vcpu *vcpu) { struct kvm_mmu_role_regs regs = { diff --git a/arch/x86/kvm/mmu/paging_tmpl.h b/arch/x86/kvm/mmu/paging_tmpl.h index b632606a87d6..5cf36eb96ee2 100644 --- a/arch/x86/kvm/mmu/paging_tmpl.h +++ b/arch/x86/kvm/mmu/paging_tmpl.h @@ -471,7 +471,7 @@ static int FNAME(walk_addr_generic)(struct guest_walker *walker, error: errcode |= write_fault | user_fault; - if (fetch_fault && (mmu->nx || mmu->mmu_role.ext.cr4_smep)) + if (fetch_fault && (mmu->nx || is_cr4_smep(mmu))) errcode |= PFERR_FETCH_MASK; walker->fault.vector = PF_VECTOR; -- 2.32.0.288.g62a8d224e6-goog