Received: by 2002:a05:7412:2a91:b0:fc:a2b0:25d7 with SMTP id u17csp345366rdh; Tue, 13 Feb 2024 20:41:01 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCV8XHJUo1Kp90T8rWt6OZOA7QKQF6zotAXQG6fm0ga1hsmqcDBg70F02im5qxO/JdCVuyHA0edOQRA/DZ56cCQBjWh8CLhWnov5eVO2zg== X-Google-Smtp-Source: AGHT+IGq0Mc5WEhOOQJauDNcpLBA2/tfQs/SPxEBDLMfyTQ1+sEBiK/fchFFu+s35wtGvdMfc0lY X-Received: by 2002:a17:90a:8c97:b0:290:28f8:f5a7 with SMTP id b23-20020a17090a8c9700b0029028f8f5a7mr1323641pjo.12.1707885661460; Tue, 13 Feb 2024 20:41:01 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707885661; cv=pass; d=google.com; s=arc-20160816; b=i0wRyWUvQmWfY/6uoN+iYsMcqf2f3iM26yC2GTta8p7wxmkdXJ+uuawNXKWmu1fsCZ Xzh1DfxuoSUG6m8r0m8fDj9gWyZmM2urC8vviQDeL2P5b9AxVpRbnlZnczQ2wj1gNJmn 0wgeAzmttnAuCLh2/j78XOaJKoahTMdkeK7Ai4KR42y4qm7JomaZQ6RDlFo/MBRoP+2E dygTWUrGcXVNnurtjHErk/hw08b7ku9PFsbmbLzf30SvEKn8XUMstYRi1cMJtxmRUY24 fCrKZ65wM4etyLjd/U8cqvLdpRtwqHhQLyYNg4EQF8WYs8Pcz93zW/gl1S1rWIuX9I6P r2ag== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=hpCF9iddljklhqDP+SKGog7DVLZfAPT4/VjiW2AeN1Q=; fh=9QIEQvTHS6D0cGaBLh9f3INGakLdrYhstPU/DF0Low8=; b=DJKbOzyedbGh9ctSErWOBItu1qDn806Y7IeHK14H6397P1e2sTcvZ4YS8pTelGhb9a 2uMhjmFmjpw/+qKAac3X5L5icLVIqxZz2lOjV/mxzfgXWFKsFwOXcwjYiPoIbVMgULM1 5tgVl2EmurX5oWnrkErweRx3062Fex6JHp554pYzHMeIQxZ22qiuynp24NglkYo3swtw yW2NyenPABFbvr49SnsghJAkDJAHLi0ce3gh2Z6czzcB2Oih/UtLz3cCFSSD2+bSnvdj IM9jwZmcGEh5xM4xs42Z3C+y1/p4BHQtH5phQ0W5hb56u7QQej4/Bhf/FJCHyqyyeWPC moiA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="aG3B/Fmp"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-64689-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-64689-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com X-Forwarded-Encrypted: i=2; AJvYcCVSNVCUBgTSSS1YszuESjqQypEkZgTkK7XiCHr77F51mJqhOAsvZ+/El0v4YgI+Jgtw4t4ipHUX+iDT411KGTLgswmDLk4EZgF39jJdBQ== Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id l26-20020a63ba5a000000b005dc491389a5si3221164pgu.812.2024.02.13.20.41.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 13 Feb 2024 20:41:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-64689-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="aG3B/Fmp"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-64689-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-64689-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id EF9EDB21548 for ; Wed, 14 Feb 2024 02:23:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 94060AD27; Wed, 14 Feb 2024 02:22:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="aG3B/Fmp" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2C0C879E4; Wed, 14 Feb 2024 02:22:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.10 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707877365; cv=none; b=HbVm1R9HgDLokl6kQO1Cw4Ls5TUsfOkHnxaLrYvF9/nyA6yS3Zjkw4zW3ol9dmGjCcM6yxGpDFpGKHCJTFK4jp/9rRbq5t0cZg199+dAz24R+beFuWfQYnQ8aya5iHl2BwSToxY/LfpSsrBNEPmjXmZOOUicpl6N4st2sJZ+wq4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707877365; c=relaxed/simple; bh=u1UGEkcOlB++GwYXFMqY/sGF2V1JEt16kvILQYqnLmw=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=smLp2Am8sPbPIQVgoVpGaNFOgovl+wTFqjhCiJpHJNiySPNeP1/sRcRG9qnBJbjgA5hTDIvwf37inmtCRHdt5jWcmg4eof4zBZDV7kZVHFrFpWEMFdLZNhVnXE0fx/gj5CUOH/a/1mbsIZUNFNVa0D99wzl1Xcb3EPoDH3BRLqs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=aG3B/Fmp; arc=none smtp.client-ip=192.198.163.10 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1707877364; x=1739413364; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=u1UGEkcOlB++GwYXFMqY/sGF2V1JEt16kvILQYqnLmw=; b=aG3B/FmpARHnDLjL1tyyL+JT/r+IY2nqxTQehpZAa3jLZlf/y9NCa2UU SDweVvY7z6q0ZV/q3y66hzB9/Ec56L9HoYOJPuyUHrqTlI9NtYnPhxyBy WtkASzsNWeyGHCaKDjHbM87jsqMOwKeZM3gQZkLOKqrVYdJxdoktXjOgP fScLaw2OwmSWv9yxMFoDEjwbGI8HlrTEGZBtutFVMUA98pOILy1/lJbGP rRukU3xcIxifXIsT0eo+n+VFoSCcr0kkuNfuZjBkLwth8AMU0rWEtYNWj 0uNYD93E08WrTHKmdT+q9ydpYnR/jHRhXZbnzmDNyccHD5+ep6RTQzGHz w==; X-IronPort-AV: E=McAfee;i="6600,9927,10982"; a="13298005" X-IronPort-AV: E=Sophos;i="6.06,158,1705392000"; d="scan'208";a="13298005" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmvoesa104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Feb 2024 18:22:41 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10982"; a="826285014" X-IronPort-AV: E=Sophos;i="6.06,158,1705392000"; d="scan'208";a="826285014" Received: from diegoavi-mobl.amr.corp.intel.com (HELO desk) ([10.255.230.185]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Feb 2024 18:22:40 -0800 Date: Tue, 13 Feb 2024 18:22:40 -0800 From: Pawan Gupta To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Peter Zijlstra , Josh Poimboeuf , Andy Lutomirski , Jonathan Corbet , Sean Christopherson , Paolo Bonzini , tony.luck@intel.com, ak@linux.intel.com, tim.c.chen@linux.intel.com, Andrew Cooper , Nikolay Borisov Cc: linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, kvm@vger.kernel.org, Alyssa Milburn , Daniel Sneddon , antonio.gomez.iglesias@linux.intel.com Subject: [PATCH v8 5/6] KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH Message-ID: <20240213-delay-verw-v8-5-a6216d83edb7@linux.intel.com> X-Mailer: b4 0.12.3 References: <20240213-delay-verw-v8-0-a6216d83edb7@linux.intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240213-delay-verw-v8-0-a6216d83edb7@linux.intel.com> From: Sean Christopherson Use EFLAGS.CF instead of EFLAGS.ZF to track whether to use VMRESUME versus VMLAUNCH. Freeing up EFLAGS.ZF will allow doing VERW, which clobbers ZF, for MDS mitigations as late as possible without needing to duplicate VERW for both paths. Reviewed-by: Nikolay Borisov Cc: stable@kernel.org Signed-off-by: Sean Christopherson Signed-off-by: Pawan Gupta --- arch/x86/kvm/vmx/run_flags.h | 7 +++++-- arch/x86/kvm/vmx/vmenter.S | 6 +++--- 2 files changed, 8 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/vmx/run_flags.h b/arch/x86/kvm/vmx/run_flags.h index edc3f16cc189..6a9bfdfbb6e5 100644 --- a/arch/x86/kvm/vmx/run_flags.h +++ b/arch/x86/kvm/vmx/run_flags.h @@ -2,7 +2,10 @@ #ifndef __KVM_X86_VMX_RUN_FLAGS_H #define __KVM_X86_VMX_RUN_FLAGS_H -#define VMX_RUN_VMRESUME (1 << 0) -#define VMX_RUN_SAVE_SPEC_CTRL (1 << 1) +#define VMX_RUN_VMRESUME_SHIFT 0 +#define VMX_RUN_SAVE_SPEC_CTRL_SHIFT 1 + +#define VMX_RUN_VMRESUME BIT(VMX_RUN_VMRESUME_SHIFT) +#define VMX_RUN_SAVE_SPEC_CTRL BIT(VMX_RUN_SAVE_SPEC_CTRL_SHIFT) #endif /* __KVM_X86_VMX_RUN_FLAGS_H */ diff --git a/arch/x86/kvm/vmx/vmenter.S b/arch/x86/kvm/vmx/vmenter.S index 906ecd001511..ef7cfbad4d57 100644 --- a/arch/x86/kvm/vmx/vmenter.S +++ b/arch/x86/kvm/vmx/vmenter.S @@ -139,7 +139,7 @@ SYM_FUNC_START(__vmx_vcpu_run) mov (%_ASM_SP), %_ASM_AX /* Check if vmlaunch or vmresume is needed */ - test $VMX_RUN_VMRESUME, %ebx + bt $VMX_RUN_VMRESUME_SHIFT, %ebx /* Load guest registers. Don't clobber flags. */ mov VCPU_RCX(%_ASM_AX), %_ASM_CX @@ -161,8 +161,8 @@ SYM_FUNC_START(__vmx_vcpu_run) /* Load guest RAX. This kills the @regs pointer! */ mov VCPU_RAX(%_ASM_AX), %_ASM_AX - /* Check EFLAGS.ZF from 'test VMX_RUN_VMRESUME' above */ - jz .Lvmlaunch + /* Check EFLAGS.CF from the VMX_RUN_VMRESUME bit test above. */ + jnc .Lvmlaunch /* * After a successful VMRESUME/VMLAUNCH, control flow "magically" -- 2.34.1