Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp405780ybt; Wed, 1 Jul 2020 01:08:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJykZufVMP+13t73QTH/lpLdY0HiWiEA3K447FgKGrcjaW632rwtv4LiapGkoO4tTdM6tRv5 X-Received: by 2002:a17:906:1e83:: with SMTP id e3mr6700887ejj.7.1593590919818; Wed, 01 Jul 2020 01:08:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593590919; cv=none; d=google.com; s=arc-20160816; b=E5Rp142uUUz3lEYjtJerX0CV96iLdl+ByozTahNqvpk1mUqP1Kk7G2a5kv2EXcCXyb 8klTBffLiN+wcDqD56tA4JVCi2mDG3KGaFM3BF8h3I1YK1nA7lywp7cawsqJekkyji/k NRT1VTqO95iL5nxW0ZTe1N0ZfggjPn1JD0Yijr6d6L0Vkmt6Hbf++6FYOsBFlzzsmEqL Th7etJpOaSH0gML4tLbJHuPw4UAOyPvsyq/64eE+bLU85jVgYu9OzjzkzqMfPXHrYH70 QPFsAA8Etk7W4JnZPTP5lJyOpXdhCTL1w34Q8jFX741oAUXlkKf85rzHuhknTERzkRNQ NVbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:ironport-sdr:ironport-sdr; bh=mVZCVCa0mx1TP58B6N9ohJxZw7mu0zE+t2YCaNnqPgw=; b=AHiXKCNaFDfVuEG/xS0q4q7vHKicyqTvOnTEHgj081Sy5+kmqa5JA6fWCbr6NtevME IWGHAGlRaJShehsRHgcJZQOTGtPOlVgx+ymCBf2AqJBEPW/RgW+mE0Ngq0hCBxtVE0+g QgNQilhQNmIn0fdwiHwPU8bA8elg/jaXu5pRgrNIwIzL23Kq/1COnb2BWQKRUBcGWD6z uQ06LkLtDkumyvmApMabLbLRaiVCC7sWizU6nnSS/s0Oc+f2Nck2DHrQ2CPYOva8Ajx9 0xCy7Nb6zKc316r/75Q1JDzZnxsDK/rlL0a645wb7J5blOo3b7rfBdD8rtnEX8rU7Gk7 0QnA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ml21si3477944ejb.261.2020.07.01.01.08.16; Wed, 01 Jul 2020 01:08:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728793AbgGAIFl (ORCPT + 99 others); Wed, 1 Jul 2020 04:05:41 -0400 Received: from mga14.intel.com ([192.55.52.115]:2452 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728624AbgGAIEf (ORCPT ); Wed, 1 Jul 2020 04:04:35 -0400 IronPort-SDR: 0MGT5X/ti1ZumtLNeXNg1u+1aOCtRAxAML1JZ2zf3Jp3kpVEi6VVFdzTDWEBONeHtetCEaxUNv zkw7tsP+wx9Q== X-IronPort-AV: E=McAfee;i="6000,8403,9668"; a="145581967" X-IronPort-AV: E=Sophos;i="5.75,299,1589266800"; d="scan'208";a="145581967" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Jul 2020 01:04:34 -0700 IronPort-SDR: NzHo0OsUtr3zWdFDSv5PoarSpUL/OePkL+T+sYHxbw1DanwxECqECpEudzIZtggQGdOAZGj5mO egF4Bk6/Cy9w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,299,1589266800"; d="scan'208";a="455010360" Received: from unknown (HELO local-michael-cet-test.sh.intel.com) ([10.239.159.128]) by orsmga005.jf.intel.com with ESMTP; 01 Jul 2020 01:04:32 -0700 From: Yang Weijiang To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, pbonzini@redhat.com, sean.j.christopherson@intel.com, jmattson@google.com Cc: yu.c.zhang@linux.intel.com, Yang Weijiang Subject: [PATCH v13 10/11] KVM: x86: Add #CP support in guest exception dispatch Date: Wed, 1 Jul 2020 16:04:10 +0800 Message-Id: <20200701080411.5802-11-weijiang.yang@intel.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20200701080411.5802-1-weijiang.yang@intel.com> References: <20200701080411.5802-1-weijiang.yang@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org CPU defined #CP(21) to handle CET induced exception, it's accompanied with several error codes corresponding to different CET violation cases, see SDM for detailed description. The exception is classified as a contibutory exception w.r.t #DF. Signed-off-by: Yang Weijiang --- arch/x86/include/uapi/asm/kvm.h | 1 + arch/x86/kvm/x86.c | 1 + arch/x86/kvm/x86.h | 2 +- 3 files changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h index 3f3f780c8c65..78e5c4266270 100644 --- a/arch/x86/include/uapi/asm/kvm.h +++ b/arch/x86/include/uapi/asm/kvm.h @@ -31,6 +31,7 @@ #define MC_VECTOR 18 #define XM_VECTOR 19 #define VE_VECTOR 20 +#define CP_VECTOR 21 /* Select x86 specific features in */ #define __KVM_HAVE_PIT diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 9c16ce65fe74..94ca5b56d233 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -407,6 +407,7 @@ static int exception_class(int vector) case NP_VECTOR: case SS_VECTOR: case GP_VECTOR: + case CP_VECTOR: return EXCPT_CONTRIBUTORY; default: break; diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index b968acc0516f..7374e77c91d8 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -115,7 +115,7 @@ static inline bool x86_exception_has_error_code(unsigned int vector) { static u32 exception_has_error_code = BIT(DF_VECTOR) | BIT(TS_VECTOR) | BIT(NP_VECTOR) | BIT(SS_VECTOR) | BIT(GP_VECTOR) | - BIT(PF_VECTOR) | BIT(AC_VECTOR); + BIT(PF_VECTOR) | BIT(AC_VECTOR) | BIT(CP_VECTOR); return (1U << vector) & exception_has_error_code; } -- 2.17.2