KVM: SVM: Cleanup NMI singlestep
Push the NMI-related singlestep variable into vcpu_svm. It's dealing with an AMD-specific deficit, nothing generic for x86. Acked-by: Gleb Natapov <gleb@redhat.com> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> arch/x86/include/asm/kvm_host.h | 1 - arch/x86/kvm/svm.c | 12 +++++++----- 2 files changed, 7 insertions(+), 6 deletions(-) Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
This commit is contained in:
@@ -354,7 +354,6 @@ struct kvm_vcpu_arch {
|
|||||||
unsigned int time_offset;
|
unsigned int time_offset;
|
||||||
struct page *time_page;
|
struct page *time_page;
|
||||||
|
|
||||||
bool singlestep; /* guest is single stepped by KVM */
|
|
||||||
bool nmi_pending;
|
bool nmi_pending;
|
||||||
bool nmi_injected;
|
bool nmi_injected;
|
||||||
|
|
||||||
|
@@ -107,6 +107,8 @@ struct vcpu_svm {
|
|||||||
u32 *msrpm;
|
u32 *msrpm;
|
||||||
|
|
||||||
struct nested_state nested;
|
struct nested_state nested;
|
||||||
|
|
||||||
|
bool nmi_singlestep;
|
||||||
};
|
};
|
||||||
|
|
||||||
/* enable NPT for AMD64 and X86 with PAE */
|
/* enable NPT for AMD64 and X86 with PAE */
|
||||||
@@ -1050,7 +1052,7 @@ static void update_db_intercept(struct kvm_vcpu *vcpu)
|
|||||||
svm->vmcb->control.intercept_exceptions &=
|
svm->vmcb->control.intercept_exceptions &=
|
||||||
~((1 << DB_VECTOR) | (1 << BP_VECTOR));
|
~((1 << DB_VECTOR) | (1 << BP_VECTOR));
|
||||||
|
|
||||||
if (vcpu->arch.singlestep)
|
if (svm->nmi_singlestep)
|
||||||
svm->vmcb->control.intercept_exceptions |= (1 << DB_VECTOR);
|
svm->vmcb->control.intercept_exceptions |= (1 << DB_VECTOR);
|
||||||
|
|
||||||
if (vcpu->guest_debug & KVM_GUESTDBG_ENABLE) {
|
if (vcpu->guest_debug & KVM_GUESTDBG_ENABLE) {
|
||||||
@@ -1195,13 +1197,13 @@ static int db_interception(struct vcpu_svm *svm)
|
|||||||
|
|
||||||
if (!(svm->vcpu.guest_debug &
|
if (!(svm->vcpu.guest_debug &
|
||||||
(KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) &&
|
(KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) &&
|
||||||
!svm->vcpu.arch.singlestep) {
|
!svm->nmi_singlestep) {
|
||||||
kvm_queue_exception(&svm->vcpu, DB_VECTOR);
|
kvm_queue_exception(&svm->vcpu, DB_VECTOR);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (svm->vcpu.arch.singlestep) {
|
if (svm->nmi_singlestep) {
|
||||||
svm->vcpu.arch.singlestep = false;
|
svm->nmi_singlestep = false;
|
||||||
if (!(svm->vcpu.guest_debug & KVM_GUESTDBG_SINGLESTEP))
|
if (!(svm->vcpu.guest_debug & KVM_GUESTDBG_SINGLESTEP))
|
||||||
svm->vmcb->save.rflags &=
|
svm->vmcb->save.rflags &=
|
||||||
~(X86_EFLAGS_TF | X86_EFLAGS_RF);
|
~(X86_EFLAGS_TF | X86_EFLAGS_RF);
|
||||||
@@ -2543,7 +2545,7 @@ static void enable_nmi_window(struct kvm_vcpu *vcpu)
|
|||||||
/* Something prevents NMI from been injected. Single step over
|
/* Something prevents NMI from been injected. Single step over
|
||||||
possible problem (IRET or exception injection or interrupt
|
possible problem (IRET or exception injection or interrupt
|
||||||
shadow) */
|
shadow) */
|
||||||
vcpu->arch.singlestep = true;
|
svm->nmi_singlestep = true;
|
||||||
svm->vmcb->save.rflags |= (X86_EFLAGS_TF | X86_EFLAGS_RF);
|
svm->vmcb->save.rflags |= (X86_EFLAGS_TF | X86_EFLAGS_RF);
|
||||||
update_db_intercept(vcpu);
|
update_db_intercept(vcpu);
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user