Received: by 2002:a05:6520:1682:b0:147:d1a0:b502 with SMTP id ck2csp5596859lkb; Mon, 11 Oct 2021 09:39:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzcLS95cL1FI8aWlCL9D3Y2b3v1wPcpd1NNxfywHxcywieOvzWmMqx/hHTqFvEufJXsfC8Z X-Received: by 2002:aa7:9250:0:b0:44c:27d1:7f0f with SMTP id 16-20020aa79250000000b0044c27d17f0fmr26744137pfp.41.1633970364849; Mon, 11 Oct 2021 09:39:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633970364; cv=none; d=google.com; s=arc-20160816; b=hXi726/lCg0bY8pVuYQ5uwCqK6zh9R05kGVjrbhRMOEFcz9K5xaGe9LsyJAESWuXmj 8DmuiIwHjcuQ5R1iKe0KDi1IlcmZh43tY56VVJM9z6SxhsnHFhMazFcDbMurTLYUdekk CEafM/1TNMyGQgLBkhN9Os5W+lL7Qlxwq/a0NqzQyv/2S5fL5cOHnacFrvSstE5R+Q26 0iCQfsemgvEYIOs/RVU42msStTe5/c+csNoNJapTYrv6dE4Y4HhcxHStnePsUtIlkcGV oL9Qqh6F6YKRdCqfuZwv2SsXcHgPKx85kv+L2oCJg9pBjjAiRx+3RWbYnb5+VJ0BSvKh NF4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=pI271JK1tLgzgAQn9Qgcs3xQQ3veQsyAptYaEm6L4ok=; b=kyN2gp7MkglHPOfoRhK4kCA4vitBdPTQQr3omVKRmdR5Y+PZrUibJ6uwvKxAMMM9cX mOwxa+IgwibKRih8WsqXSo2LqPa3chWHN4KMoEBOOIRrVI6zXtyCOMrLR36MTR1+k0IJ ka/jBc8/n5TIJQ7BV7g+FinxoApwnEtW6+/35RNHBSq1Ol5ZOcHhJkF5wFYYqZTDZv1R isMk7Ghz9CYrzMgq1KBhcEp4x4ldZbVQTlr0coC4z55oy04wno5mHUGGZSCAHMK/VJCS /b82qiSV4Kj402+OVb4OvHhtPTKy288K0w44NnayJbOXT+Y0Mkq2d5KE3DNzP5tmOF/S FH8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UU0PcUke; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d12si12929228pgv.167.2021.10.11.09.39.12; Mon, 11 Oct 2021 09:39:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UU0PcUke; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240635AbhJKOkB (ORCPT + 99 others); Mon, 11 Oct 2021 10:40:01 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:33183 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241867AbhJKOjQ (ORCPT ); Mon, 11 Oct 2021 10:39:16 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1633963036; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pI271JK1tLgzgAQn9Qgcs3xQQ3veQsyAptYaEm6L4ok=; b=UU0PcUkefh0oQpmMRdYPV1mUfihaJh0eKvb/EGIbgKuospB20LR/oj+czzgBzteTpDrSHm /z8H3L1E/8WIr4pzeC4UrMQZdU19c29ETcMKBA4ooSgz2vqh6X/ktTbiZ6iANYDAeFa2iA rqJJK3sjo0TNL4GxFqKpMo5YtNOjd54= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-292-PuYmDxmBPw2sWlQAiUu-oQ-1; Mon, 11 Oct 2021 10:37:15 -0400 X-MC-Unique: PuYmDxmBPw2sWlQAiUu-oQ-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id E4A8D138CA84; Mon, 11 Oct 2021 14:37:13 +0000 (UTC) Received: from virtlab701.virt.lab.eng.bos.redhat.com (virtlab701.virt.lab.eng.bos.redhat.com [10.19.152.228]) by smtp.corp.redhat.com (Postfix) with ESMTP id D0D1C19C59; Mon, 11 Oct 2021 14:37:12 +0000 (UTC) From: Emanuele Giuseppe Esposito To: kvm@vger.kernel.org Cc: Paolo Bonzini , Maxim Levitsky , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , linux-kernel@vger.kernel.org, Emanuele Giuseppe Esposito Subject: [PATCH v3 6/8] nSVM: introduce struct vmcb_ctrl_area_cached Date: Mon, 11 Oct 2021 10:37:00 -0400 Message-Id: <20211011143702.1786568-7-eesposit@redhat.com> In-Reply-To: <20211011143702.1786568-1-eesposit@redhat.com> References: <20211011143702.1786568-1-eesposit@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This structure will replace vmcb_control_area in svm_nested_state, providing only the fields that are actually used by the nested state. This avoids having and copying around uninitialized fields. The cost of this, however, is that all functions (in this case vmcb_is_intercept) expect the old structure, so they need to be duplicated. Introduce also nested_copy_vmcb_cache_to_control(), useful to copy vmcb_ctrl_area_cached fields in vmcb_control_area. This will be used in the next patch. Signed-off-by: Emanuele Giuseppe Esposito --- arch/x86/kvm/svm/nested.c | 32 ++++++++++++++++++++++++++++++++ arch/x86/kvm/svm/svm.h | 31 +++++++++++++++++++++++++++++++ 2 files changed, 63 insertions(+) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index e08f2c31beae..c84cded1dcf6 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -1213,6 +1213,38 @@ int nested_svm_exit_special(struct vcpu_svm *svm) return NESTED_EXIT_CONTINUE; } +/* Inverse operation of nested_copy_vmcb_control_to_cache(). asid is copied too. */ +static void nested_copy_vmcb_cache_to_control(struct vmcb_control_area *dst, + struct vmcb_ctrl_area_cached *from) +{ + unsigned int i; + + for (i = 0; i < MAX_INTERCEPT; i++) + dst->intercepts[i] = from->intercepts[i]; + + dst->iopm_base_pa = from->iopm_base_pa; + dst->msrpm_base_pa = from->msrpm_base_pa; + dst->tsc_offset = from->tsc_offset; + dst->asid = from->asid; + dst->tlb_ctl = from->tlb_ctl; + dst->int_ctl = from->int_ctl; + dst->int_vector = from->int_vector; + dst->int_state = from->int_state; + dst->exit_code = from->exit_code; + dst->exit_code_hi = from->exit_code_hi; + dst->exit_info_1 = from->exit_info_1; + dst->exit_info_2 = from->exit_info_2; + dst->exit_int_info = from->exit_int_info; + dst->exit_int_info_err = from->exit_int_info_err; + dst->nested_ctl = from->nested_ctl; + dst->event_inj = from->event_inj; + dst->event_inj_err = from->event_inj_err; + dst->nested_cr3 = from->nested_cr3; + dst->virt_ext = from->virt_ext; + dst->pause_filter_count = from->pause_filter_count; + dst->pause_filter_thresh = from->pause_filter_thresh; +} + static int svm_get_nested_state(struct kvm_vcpu *vcpu, struct kvm_nested_state __user *user_kvm_nested_state, u32 user_data_size) diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h index 3c950aeca646..78006245e334 100644 --- a/arch/x86/kvm/svm/svm.h +++ b/arch/x86/kvm/svm/svm.h @@ -116,6 +116,31 @@ struct vmcb_save_area_cached { u64 dr6; }; +struct vmcb_ctrl_area_cached { + u32 intercepts[MAX_INTERCEPT]; + u16 pause_filter_thresh; + u16 pause_filter_count; + u64 iopm_base_pa; + u64 msrpm_base_pa; + u64 tsc_offset; + u32 asid; + u8 tlb_ctl; + u32 int_ctl; + u32 int_vector; + u32 int_state; + u32 exit_code; + u32 exit_code_hi; + u64 exit_info_1; + u64 exit_info_2; + u32 exit_int_info; + u32 exit_int_info_err; + u64 nested_ctl; + u32 event_inj; + u32 event_inj_err; + u64 nested_cr3; + u64 virt_ext; +}; + struct svm_nested_state { struct kvm_vmcb_info vmcb02; u64 hsave_msr; @@ -308,6 +333,12 @@ static inline bool vmcb_is_intercept(struct vmcb_control_area *control, u32 bit) return test_bit(bit, (unsigned long *)&control->intercepts); } +static inline bool vmcb12_is_intercept(struct vmcb_ctrl_area_cached *control, u32 bit) +{ + WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT); + return test_bit(bit, (unsigned long *)&control->intercepts); +} + static inline void set_dr_intercepts(struct vcpu_svm *svm) { struct vmcb *vmcb = svm->vmcb01.ptr; -- 2.27.0