Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp846566ybx; Fri, 1 Nov 2019 12:11:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqyAsjluc7yl4ANWDAr66hclV1JRb34NyL9c4rrRiZgsVdC8cl7RchRrgm1+Eo9FS2e1wokY X-Received: by 2002:a17:906:2615:: with SMTP id h21mr6609596ejc.212.1572635459943; Fri, 01 Nov 2019 12:10:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572635459; cv=none; d=google.com; s=arc-20160816; b=F18KzGsCuKPc44KxtbkFxwDhh2cZ4uPp0JjfP6H/k7rhvBb0DRXFiWhg6BIGMY27SN G7aKfeMj0jI6+IMOpAj/luT33EdYmaqJMqWd+glI+fXm2FOmp/G0nJ3NO+d3uiDqt3Tn tF4LI5snh8IfJm5Poajx21RkAQWj8QpAtlaqdQk4PTT3QDsfOqO6BbdONxRQDNV25jB4 J+r8oCOF7o5U+uvElt7lxhIOX0uqrCQQVWvFQSHcJUBnFJpXlQKLlVXOE/zRNl3YoAWe /qbD8PaPwkYHIC3iZPSoFhF9RcEUOfgVARDQuZ8TcuYzLDO1t1koTOL0Zn1+eL1l1/H1 nT3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=Yh/ASjlY0wDWBSh/szy38eUV8TUYg4IRHL8PGh1tRl4=; b=nL/xqFX3aGVWZ0wkN4/GyZQuk4I2Am+BDZFVHelo8mAsIVHCu+63Gbqv03j2Lt+IYK Obm693xG+kkM6rjtPkK1CuWluoMVOC+Mhc29Be5f0Df0rrUtxqCgcnf/wBU1KVgaaHok njDWFtaNxz9SS1lA1D8TUoFt5vQrHGOREQ+/2pi+q5oHeDL9Syvl07XtEuftFs35gYbY caX82lnV+Y8xmC4otMzqP+DoZ+Y2qMzCbJgb74HSWuI0c8IM5zwQxctnOG8tfNLomaVP h+GlrjywgHTYYHuVB6olGF2gkS+ck29xo6ZV7fyY1LC3ZX4kaaQtcKR2BOUm9Oa6qGcE oNrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dmi0sKqQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h16si6231730ejj.352.2019.11.01.12.10.34; Fri, 01 Nov 2019 12:10:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dmi0sKqQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727551AbfKATJX (ORCPT + 99 others); Fri, 1 Nov 2019 15:09:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:36802 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726671AbfKATJW (ORCPT ); Fri, 1 Nov 2019 15:09:22 -0400 Received: from mail-wr1-f43.google.com (mail-wr1-f43.google.com [209.85.221.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BFA84218DE for ; Fri, 1 Nov 2019 19:09:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572635362; bh=oqQ6mc8vMOO6iFg5xkYVj8cqy2/wKHrB+ZBK7dSIJbA=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=dmi0sKqQdD/CtjGV934ctcBkBqjEG0DD84sdkg6g56WAc44/iodUHl2tYGNestOFC vZcSOUvDWCQbeR5qqWw/K67by48GtFmAqzr4y7V660wH9Jq6BXatQy0Oq3PaiGvKtK /nhKLYwgNrMWt/f1mOsId2LBZ+VHWPB3y+kp56T4= Received: by mail-wr1-f43.google.com with SMTP id p4so10574960wrm.8 for ; Fri, 01 Nov 2019 12:09:21 -0700 (PDT) X-Gm-Message-State: APjAAAW2GY7fs7/Np3hOI/G5u6bBEJF2F5MzQMjjSn/0mAXql3rusxPT NqwmMn4amF+QKfSchwUYKVyVZfczCPGJx3y9CSBhcw== X-Received: by 2002:a5d:51c2:: with SMTP id n2mr11735442wrv.149.1572635360221; Fri, 01 Nov 2019 12:09:20 -0700 (PDT) MIME-Version: 1.0 References: <157262960837.2838.17520432516398899751.stgit@naples-babu.amd.com> <157262962352.2838.15656190309312238595.stgit@naples-babu.amd.com> <288d481f-43c7-ffbb-8aed-c3c4bc19846b@amd.com> In-Reply-To: <288d481f-43c7-ffbb-8aed-c3c4bc19846b@amd.com> From: Andy Lutomirski Date: Fri, 1 Nov 2019 12:09:06 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 2/4] kvm: svm: Enable UMIP feature on AMD To: "Moger, Babu" Cc: Andy Lutomirski , "tglx@linutronix.de" , "mingo@redhat.com" , "bp@alien8.de" , "hpa@zytor.com" , "pbonzini@redhat.com" , "rkrcmar@redhat.com" , "sean.j.christopherson@intel.com" , "vkuznets@redhat.com" , "wanpengli@tencent.com" , "jmattson@google.com" , "x86@kernel.org" , "joro@8bytes.org" , "zohar@linux.ibm.com" , "yamada.masahiro@socionext.com" , "nayna@linux.ibm.com" , "linux-kernel@vger.kernel.org" , "kvm@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 1, 2019 at 11:38 AM Moger, Babu wrote: > > > > On 11/1/19 1:24 PM, Andy Lutomirski wrote: > > On Fri, Nov 1, 2019 at 10:33 AM Moger, Babu wrote: > >> > >> AMD 2nd generation EPYC processors support UMIP (User-Mode Instruction > >> Prevention) feature. The UMIP feature prevents the execution of certain > >> instructions if the Current Privilege Level (CPL) is greater than 0. > >> If any of these instructions are executed with CPL > 0 and UMIP > >> is enabled, then kernel reports a #GP exception. > >> > >> The idea is taken from articles: > >> https://lwn.net/Articles/738209/ > >> https://lwn.net/Articles/694385/ > >> > >> Enable the feature if supported on bare metal and emulate instructions > >> to return dummy values for certain cases. > > > > What are these cases? > > It is mentioned in the article https://lwn.net/Articles/738209/ > > === How does it impact applications? > > When enabled, however, UMIP will change the behavior that certain > applications expect from the operating system. For instance, programs > running on WineHQ and DOSEMU2 rely on some of these instructions to > function. Stas Sergeev found that Microsoft Windows 3.1 and dos4gw use the > instruction SMSW when running in virtual-8086 mode [4]. SGDT and SIDT can > also be used on virtual-8086 mode. > What does that have to do with your series? Your series is about enabling UMIP (or emulating UMIP -- your descriptions are quite unclear) on AMD hardware, and the hypervisor should *not* be emulating instructions to return dummy values. The *guest kernel* already knows how to emulate userspace instructions as needed. --Andy