Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp2858225ybn; Thu, 26 Sep 2019 19:21:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqwRO40CCwqSXODfWH1+9oKXMQyum0ojlWyZi5jvWT+AG2GT818vDl7lqHOoCsZe9iI4N+XK X-Received: by 2002:a50:8a21:: with SMTP id i30mr2017688edi.229.1569550912964; Thu, 26 Sep 2019 19:21:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569550912; cv=none; d=google.com; s=arc-20160816; b=dF4pacK6lpZWd5NAM7GTg3vAX3izAGTMksutaxT8YylXqk9gIbTppYI8+HhzBSyYIG hHw19EnKKiqRmgpHNPnWZq5GgW4r0fEOInMvrPrFEIrpSfiOjGq4krqO9Vp2hsK1nHwJ rzuQFie331pXRppIwTjbIRRiK5Pgl/EUX0OzUtbNl72psB0W7bN9BcyIoEzTLxI1QVxg JfZJzUyoyVqUW9bI/lpk/RGEnlRqYRvof44TB2jPH20gtObL2+lKOtuB1cyioH6wNRc8 /lQFudBq7t5WE0omE/TtusmHV5gzTBUpNNeYkXFyUYRBe1CVK1yT2PEmvDu27zkL+/9U Yatw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=hISDs+QIMc42Tj+4gb+QclhmDMMS58/dxmF9Vx/ebHg=; b=B270gw6idKUGjh8ilsW9WeqR/kHDy9/wpsNVnxKYRRThwLGE2hoOkBegERlYvHn8Nu /yikx94xV7tkR5ui05TrJJ2PCpo9Z3b3/qopOJ7739oz6kRBgNJPRFPpL5k2V/SLn0o+ Y+jolmTSD/lfgOFcZNfhK99Gyuxc7EwYu3OQ1O8kWR+LdBAoA7Ab3e9Ttex4D3+YE3kV coFb/BG8tbYnYA3ZPolmfw0OmIQ/zokqxK1If+wrfnOxFoA2zycBCWjuhh2qTe8h6T7z Ph9lQ7c3h3W2ibkxmZ2Q19KyEt36GqmO3/Fqx4UgwUCngcVg2WZ2ldnObArSEEZ3yxES R3qQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d13si742929edx.156.2019.09.26.19.21.28; Thu, 26 Sep 2019 19:21:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728920AbfI0CRW (ORCPT + 99 others); Thu, 26 Sep 2019 22:17:22 -0400 Received: from mga17.intel.com ([192.55.52.151]:25572 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728775AbfI0CRT (ORCPT ); Thu, 26 Sep 2019 22:17:19 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Sep 2019 19:17:19 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,553,1559545200"; d="scan'208";a="193020694" Received: from unknown (HELO local-michael-cet-test.sh.intel.com) ([10.239.159.128]) by orsmga003.jf.intel.com with ESMTP; 26 Sep 2019 19:17:17 -0700 From: Yang Weijiang To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, pbonzini@redhat.com, sean.j.christopherson@intel.com Cc: mst@redhat.com, rkrcmar@redhat.com, jmattson@google.com, Yang Weijiang Subject: [PATCH v7 5/7] kvm: x86: Add CET CR4 bit and XSS support Date: Fri, 27 Sep 2019 10:19:25 +0800 Message-Id: <20190927021927.23057-6-weijiang.yang@intel.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190927021927.23057-1-weijiang.yang@intel.com> References: <20190927021927.23057-1-weijiang.yang@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org CR4.CET(bit 23) is master enable bit for CET feature. Previously, KVM did not support setting any bits in XSS so it's hardcoded to check and inject a #GP if Guest attempted to write a non-zero value to XSS, now it supports CET related bits setting. Co-developed-by: Zhang Yi Z Signed-off-by: Zhang Yi Z Signed-off-by: Yang Weijiang --- arch/x86/include/asm/kvm_host.h | 4 +++- arch/x86/kvm/cpuid.c | 11 +++++++++-- arch/x86/kvm/vmx/vmx.c | 6 +----- 3 files changed, 13 insertions(+), 8 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index d018df8c5f32..8f97269d6d9f 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -90,7 +90,8 @@ | X86_CR4_PGE | X86_CR4_PCE | X86_CR4_OSFXSR | X86_CR4_PCIDE \ | X86_CR4_OSXSAVE | X86_CR4_SMEP | X86_CR4_FSGSBASE \ | X86_CR4_OSXMMEXCPT | X86_CR4_LA57 | X86_CR4_VMXE \ - | X86_CR4_SMAP | X86_CR4_PKE | X86_CR4_UMIP)) + | X86_CR4_SMAP | X86_CR4_PKE | X86_CR4_UMIP \ + | X86_CR4_CET)) #define CR8_RESERVED_BITS (~(unsigned long)X86_CR8_TPR) @@ -623,6 +624,7 @@ struct kvm_vcpu_arch { u64 xcr0; u64 guest_supported_xcr0; + u64 guest_supported_xss; u32 guest_xstate_size; struct kvm_pio_request pio; diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 0a47b9e565be..dd3ddc6daa58 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -120,8 +120,15 @@ int kvm_update_cpuid(struct kvm_vcpu *vcpu) } best = kvm_find_cpuid_entry(vcpu, 0xD, 1); - if (best && (best->eax & (F(XSAVES) | F(XSAVEC)))) - best->ebx = xstate_required_size(vcpu->arch.xcr0, true); + if (best && (best->eax & (F(XSAVES) | F(XSAVEC)))) { + u64 kvm_xss = kvm_supported_xss(); + + best->ebx = + xstate_required_size(vcpu->arch.xcr0 | kvm_xss, true); + vcpu->arch.guest_supported_xss = best->ecx & kvm_xss; + } else { + vcpu->arch.guest_supported_xss = 0; + } /* * The existing code assumes virtual address is 48-bit or 57-bit in the diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index ba1a83d11e69..44913e4ab558 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -1973,11 +1973,7 @@ static int vmx_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) !(guest_cpuid_has(vcpu, X86_FEATURE_XSAVE) && guest_cpuid_has(vcpu, X86_FEATURE_XSAVES)))) return 1; - /* - * The only supported bit as of Skylake is bit 8, but - * it is not supported on KVM. - */ - if (data != 0) + if (data & ~vcpu->arch.guest_supported_xss) return 1; vcpu->arch.ia32_xss = data; if (vcpu->arch.ia32_xss != host_xss) -- 2.17.2