From: Jim Mattson <jmattson@google.com>
To: Sean Christopherson <seanjc@google.com>,
Paolo Bonzini <pbonzini@redhat.com>,
Thomas Gleixner <tglx@kernel.org>,
Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
Dave Hansen <dave.hansen@linux.intel.com>,
x86@kernel.org, "H. Peter Anvin" <hpa@zytor.com>,
Shuah Khan <shuah@kernel.org>,
kvm@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-kselftest@vger.kernel.org,
Yosry Ahmed <yosry.ahmed@linux.dev>
Cc: Jim Mattson <jmattson@google.com>
Subject: [PATCH v4 7/8] KVM: x86: nSVM: Handle restore of legacy nested state
Date: Thu, 12 Feb 2026 07:58:55 -0800 [thread overview]
Message-ID: <20260212155905.3448571-8-jmattson@google.com> (raw)
In-Reply-To: <20260212155905.3448571-1-jmattson@google.com>
When nested NPT is enabled and KVM_SET_NESTED_STATE is used to restore an
old checkpoint (without a valid gPAT), the current IA32_PAT value must be
used as L2's gPAT.
Unfortunately, checkpoint restore is non-atomic, and the order in which
state components are restored is not specified. Hence, the current IA32_PAT
value may be restored by KVM_SET_MSRS after KVM_SET_NESTED_STATE. To
further complicate matters, there may be a KVM_GET_NESTED_STATE before the
next KVM_RUN.
Introduce a new boolean, svm->nested.legacy_gpat_semantics. When set, hPAT
updates are also applied to gPAT, preserving the old behavior (i.e. L2
shares L1's PAT). Set this boolean when restoring legacy state (i.e. nested
NPT is enabled, but no GPAT is provided) in KVM_SET_NESTED_STATE. Clear
this boolean in svm_vcpu_pre_run(), to ensure that hPAT and gPAT are
decoupled before the vCPU resumes execution.
Signed-off-by: Jim Mattson <jmattson@google.com>
---
arch/x86/kvm/svm/nested.c | 11 ++++++++---
arch/x86/kvm/svm/svm.c | 2 ++
arch/x86/kvm/svm/svm.h | 11 +++++++++++
3 files changed, 21 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
index f73f3e586012..d854d29b0bd8 100644
--- a/arch/x86/kvm/svm/nested.c
+++ b/arch/x86/kvm/svm/nested.c
@@ -2073,9 +2073,14 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu,
if (ret)
goto out_free;
- if (nested_npt_enabled(svm) &&
- (kvm_state->hdr.svm.flags & KVM_STATE_SVM_VALID_GPAT))
- svm_set_gpat(svm, kvm_state->hdr.svm.gpat);
+ if (nested_npt_enabled(svm)) {
+ if (kvm_state->hdr.svm.flags & KVM_STATE_SVM_VALID_GPAT) {
+ svm_set_gpat(svm, kvm_state->hdr.svm.gpat);
+ } else {
+ svm_set_gpat(svm, vcpu->arch.pat);
+ svm->nested.legacy_gpat_semantics = true;
+ }
+ }
svm_switch_vmcb(svm, &svm->nested.vmcb02);
nested_vmcb02_prepare_control(svm, svm->vmcb->save.rip, svm->vmcb->save.cs.base);
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
index 205bf07896ad..d951d25f1f91 100644
--- a/arch/x86/kvm/svm/svm.c
+++ b/arch/x86/kvm/svm/svm.c
@@ -4245,6 +4245,8 @@ static int svm_vcpu_pre_run(struct kvm_vcpu *vcpu)
if (to_kvm_sev_info(vcpu->kvm)->need_init)
return -EINVAL;
+ to_svm(vcpu)->nested.legacy_gpat_semantics = false;
+
return 1;
}
diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h
index 88549705133f..0bb9fdcb489d 100644
--- a/arch/x86/kvm/svm/svm.h
+++ b/arch/x86/kvm/svm/svm.h
@@ -238,6 +238,15 @@ struct svm_nested_state {
* on its side.
*/
bool force_msr_bitmap_recalc;
+
+ /*
+ * Indicates that a legacy nested state (without a valid gPAT) was
+ * recently restored. Until the next KVM_RUN, updates to hPAT are
+ * also applied to gPAT, preserving legacy behavior (i.e. L2 shares
+ * L1's PAT). Because checkpoint restore is non-atomic, this
+ * complication is necessary for backward compatibility.
+ */
+ bool legacy_gpat_semantics;
};
struct vcpu_sev_es_state {
@@ -621,6 +630,8 @@ static inline void svm_set_hpat(struct vcpu_svm *svm, u64 data)
if (is_guest_mode(&svm->vcpu) && !nested_npt_enabled(svm))
vmcb_set_gpat(svm->nested.vmcb02.ptr, data);
}
+ if (svm->nested.legacy_gpat_semantics)
+ svm_set_gpat(svm, data);
}
static inline bool nested_vnmi_enabled(struct vcpu_svm *svm)
--
2.53.0.239.g8d8fc8a987-goog
next prev parent reply other threads:[~2026-02-12 15:59 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-12 15:58 [PATCH v4 0/8] KVM: x86: nSVM: Improve PAT virtualization Jim Mattson
2026-02-12 15:58 ` [PATCH v4 1/8] KVM: x86: nSVM: Clear VMCB_NPT clean bit when updating hPAT from guest mode Jim Mattson
2026-02-13 0:17 ` Yosry Ahmed
2026-02-13 15:26 ` Sean Christopherson
2026-02-13 15:32 ` Yosry Ahmed
2026-02-13 15:46 ` Jim Mattson
2026-02-12 15:58 ` [PATCH v4 2/8] KVM: x86: nSVM: Cache and validate vmcb12 g_pat Jim Mattson
2026-02-13 0:22 ` Yosry Ahmed
2026-02-20 22:26 ` Jim Mattson
2026-02-20 23:25 ` Yosry Ahmed
2026-02-12 15:58 ` [PATCH v4 3/8] KVM: x86: nSVM: Set vmcb02.g_pat correctly for nested NPT Jim Mattson
2026-02-13 0:27 ` Yosry Ahmed
2026-02-12 15:58 ` [PATCH v4 4/8] KVM: x86: nSVM: Redirect IA32_PAT accesses to either hPAT or gPAT Jim Mattson
2026-02-13 0:30 ` Yosry Ahmed
2026-02-13 15:20 ` Sean Christopherson
2026-02-13 15:42 ` Jim Mattson
2026-02-13 22:19 ` Sean Christopherson
2026-02-13 23:31 ` Jim Mattson
2026-02-17 23:27 ` Sean Christopherson
2026-02-17 23:40 ` Yosry Ahmed
2026-02-17 23:44 ` Sean Christopherson
2026-03-26 21:18 ` Jim Mattson
2026-03-26 21:26 ` Yosry Ahmed
2026-03-26 21:56 ` Jim Mattson
2026-03-26 21:59 ` Yosry Ahmed
2026-02-13 15:43 ` Yosry Ahmed
2026-02-13 15:44 ` Yosry Ahmed
2026-02-12 15:58 ` [PATCH v4 5/8] KVM: x86: nSVM: Save gPAT to vmcb12.g_pat on VMEXIT Jim Mattson
2026-02-13 0:33 ` Yosry Ahmed
2026-02-12 15:58 ` [PATCH v4 6/8] KVM: x86: nSVM: Save/restore gPAT with KVM_{GET,SET}_NESTED_STATE Jim Mattson
2026-02-13 0:36 ` Yosry Ahmed
2026-02-12 15:58 ` Jim Mattson [this message]
2026-02-13 0:38 ` [PATCH v4 7/8] KVM: x86: nSVM: Handle restore of legacy nested state Yosry Ahmed
2026-02-12 15:58 ` [PATCH v4 8/8] KVM: selftests: nSVM: Add svm_nested_pat test Jim Mattson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260212155905.3448571-8-jmattson@google.com \
--to=jmattson@google.com \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=hpa@zytor.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=shuah@kernel.org \
--cc=tglx@kernel.org \
--cc=x86@kernel.org \
--cc=yosry.ahmed@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox