From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3643EC35247 for ; Thu, 6 Feb 2020 22:08:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 0980620658 for ; Thu, 6 Feb 2020 22:08:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727851AbgBFWIi (ORCPT ); Thu, 6 Feb 2020 17:08:38 -0500 Received: from mga14.intel.com ([192.55.52.115]:64211 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727496AbgBFWIh (ORCPT ); Thu, 6 Feb 2020 17:08:37 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Feb 2020 14:08:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,411,1574150400"; d="scan'208";a="404625082" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.202]) by orsmga005.jf.intel.com with ESMTP; 06 Feb 2020 14:08:37 -0800 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 0/7] KVM: x86/mmu: nVMX: 5-level paging fixes and enabling Date: Thu, 6 Feb 2020 14:08:29 -0800 Message-Id: <20200206220836.22743-1-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Two fixes for 5-level nested EPT bugs with a 100% fatality rate, with a patch to enable 5-level EPT in L1 and additional clean up on top (mostly renames of functions/variables that caused me no end of confusion when trying to figure out what was broken). Tested fixed kernels at L0, L1 and L2, with most combinations of EPT, shadow paging, 4-level and 5-level. EPT kvm-unit-tests runs clean in L0. Nothing too stressful, but the bugs caused L2 to hang on the very first instruction, so being able to boot is a marked improvement. Sean Christopherson (7): KVM: nVMX: Use correct root level for nested EPT shadow page tables KVM: x86/mmu: Fix struct guest_walker arrays for 5-level paging KVM: nVMX: Allow L1 to use 5-level page walks for nested EPT KVM: nVMX: Rename nested_ept_get_cr3() to nested_ept_get_eptp() KVM: nVMX: Rename EPTP validity helper and associated variables KVM: x86/mmu: Rename kvm_mmu->get_cr3() to ->get_guest_cr3_or_eptp() KVM: nVMX: Drop unnecessary check on ept caps for execute-only arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/include/asm/vmx.h | 12 +++++++ arch/x86/kvm/mmu/mmu.c | 35 ++++++++++---------- arch/x86/kvm/mmu/paging_tmpl.h | 6 ++-- arch/x86/kvm/svm.c | 10 +++--- arch/x86/kvm/vmx/nested.c | 58 ++++++++++++++++++++------------- arch/x86/kvm/vmx/nested.h | 4 +-- arch/x86/kvm/vmx/vmx.c | 2 ++ arch/x86/kvm/x86.c | 2 +- 9 files changed, 79 insertions(+), 52 deletions(-) -- 2.24.1