Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp3085751pxb; Tue, 12 Jan 2021 06:07:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJx+vT3zHVx1TSa71dNC9ti0x6oOZq4/ABW4E9jGMN87QUHey7PnLdvNQMW0RJMDvEQ1AN1r X-Received: by 2002:a17:907:3f29:: with SMTP id hq41mr2344888ejc.227.1610460446933; Tue, 12 Jan 2021 06:07:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610460446; cv=none; d=google.com; s=arc-20160816; b=lS4J98yF0gfHPTUM1GZUU1VIl4QBzcDQY63UoC52ePkAXyYwNwv4s/tjM/fEhpqhoD 0AX3srBztGF+iC9SDHCJTnb0xzcIAyRlLkunXQxQRvzNKLQ35r1ed9Nyz9ztpnwbDsfG rRIbx4UWZgAgVMCMOuXfWiJaxMutA5DErOAgFBSYc67dpKmsrt/eSS3B/n65aaaCjvYy hO2yPU7PUnAh7VCfDR++pEfmNEl5dp/5N1BC6JpiLAO14q+6mW26g8PqbCTXlw60aQSH 7Zd0XvVyBky6+rU6XuKXKszgKfs6AU1ZJS/F+Dh80zAuOr5Y57Ycdzt3InObxC+kUxjY GpXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject:from :references:cc:to:dkim-signature; bh=g5hRSkHHWOdbmUsMs75Gf2Bt4kYflDDkT2OYvb6EzB8=; b=qYO/noaBhCxnsyppZ+uggENCXerzk/pmefPH20dSvL604zN23le17vJ5Ny21J9BNFO Z2+NkeDCHfhw3QXrfAnLd82uceDGImwx/1GVtYKVuLCYzVknKaCUl8y8Hnp8rxYJCvGg cJRLqoyMw1OpwVrugQSbmu7Nrgor6fPTokn4Ie4qYtJMjj1YCRvo22Ja7oCJa/s+bWXA yfW3YH6o5zxp1lLFbf5QpauuLq6jwbnzIYWBsCf/VQgI6DF88DKNNqVOv2k8jRztCUSO xQBtpRtr46KzeHGycMpYpY5In55gOkC5rdPZWZpAmyxJervGUCSz2ZxX7kjP6VbMF9tH kmiA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=T6v3xVNH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t19si1185100eji.402.2021.01.12.06.06.44; Tue, 12 Jan 2021 06:07:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=T6v3xVNH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387883AbhALODN (ORCPT + 99 others); Tue, 12 Jan 2021 09:03:13 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:45169 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387752AbhALODM (ORCPT ); Tue, 12 Jan 2021 09:03:12 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1610460106; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=g5hRSkHHWOdbmUsMs75Gf2Bt4kYflDDkT2OYvb6EzB8=; b=T6v3xVNHXd6PLearnOH2shNfWJNeqf52cCHbHhb5VeAIevCv5lFv0Gw1fBGSmA/1rXMpwe 9lvc0nHJTOplN1KMFMlcTA0sVJWeYtxQoW3acPTUBqlxId4d9KCle0wae0iqzOfoKFK4W5 RHAfqe/3Ay4JA3/uGDin+m+rt/2stRA= Received: from mail-ej1-f72.google.com (mail-ej1-f72.google.com [209.85.218.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-566-2Xekcf8MN_OUc3YC9ZDwjA-1; Tue, 12 Jan 2021 09:01:43 -0500 X-MC-Unique: 2Xekcf8MN_OUc3YC9ZDwjA-1 Received: by mail-ej1-f72.google.com with SMTP id lw15so1037236ejb.7 for ; Tue, 12 Jan 2021 06:01:43 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:cc:references:from:subject:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=g5hRSkHHWOdbmUsMs75Gf2Bt4kYflDDkT2OYvb6EzB8=; b=VT6oim26dG8/y6b3XtzbAYkZ6OJfITzGiM88nDcqmq7rBqQl3xheCkBxiZE4XrqLpZ vmqJyAxhat889ctZzUWQVL1APxiAPyde25skgUPKtcnmQe0IVuy9ENgJpXkl3yf/uMFB sNzENO/XCEFABHQhCNB9VLcsNUaCzNvJEaMOXnOqusSChPXbZpmNmWuUCETOJOgjbUk0 FDzkFRm1pM9KcRzOAtutdqCIbvV9jGf+EyhVp5op6anazMWy/3x3+W60omdQxHD+2Sn0 0na0La/idc4WKR2Yt2cbnhVcFkgQ4x5k3uzXGTi4kW8XiHxLtNvlYnGXoBWXs4Y+DG/T HmNA== X-Gm-Message-State: AOAM530FPpYKTkq6wbtw5E4Mi456X+uO4uvPilCdvaaP+baArWufCcos ChpQwy3uyPfIbaM0Np9jAXv64sWmqwEH97L4JpvYCLL4HQenxULEF8+DUD2LDWSEIPhl2oAM+8x d2/3Uscz7TmvUzAPa5GNDa/IS X-Received: by 2002:a50:fe0e:: with SMTP id f14mr3606953edt.159.1610460102384; Tue, 12 Jan 2021 06:01:42 -0800 (PST) X-Received: by 2002:a50:fe0e:: with SMTP id f14mr3606930edt.159.1610460102224; Tue, 12 Jan 2021 06:01:42 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:c8dd:75d4:99ab:290a? ([2001:b07:6468:f312:c8dd:75d4:99ab:290a]) by smtp.gmail.com with ESMTPSA id dd12sm1497632edb.6.2021.01.12.06.01.40 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 12 Jan 2021 06:01:41 -0800 (PST) To: Wei Huang , kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org, vkuznets@redhat.com, seanjc@google.com, joro@8bytes.org, bp@alien8.de, tglx@linutronix.de, mingo@redhat.com, x86@kernel.org, jmattson@google.com, wanpengli@tencent.com, bsd@redhat.com, dgilbert@redhat.com, mlevitsk@redhat.com References: <20210112063703.539893-1-wei.huang2@amd.com> From: Paolo Bonzini Subject: Re: [PATCH 1/2] KVM: x86: Add emulation support for #GP triggered by VM instructions Message-ID: <090232a9-7a87-beb9-1402-726bb7cab7e6@redhat.com> Date: Tue, 12 Jan 2021 15:01:39 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 In-Reply-To: <20210112063703.539893-1-wei.huang2@amd.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/01/21 07:37, Wei Huang wrote: > static int gp_interception(struct vcpu_svm *svm) > { > struct kvm_vcpu *vcpu = &svm->vcpu; > u32 error_code = svm->vmcb->control.exit_info_1; > - > - WARN_ON_ONCE(!enable_vmware_backdoor); > + int rc; > > /* > - * VMware backdoor emulation on #GP interception only handles IN{S}, > - * OUT{S}, and RDPMC, none of which generate a non-zero error code. > + * Only VMware backdoor and SVM VME errata are handled. Neither of > + * them has non-zero error codes. > */ > if (error_code) { > kvm_queue_exception_e(vcpu, GP_VECTOR, error_code); > return 1; > } > - return kvm_emulate_instruction(vcpu, EMULTYPE_VMWARE_GP); > + > + rc = kvm_emulate_instruction(vcpu, EMULTYPE_PARAVIRT_GP); > + if (rc > 1) > + rc = svm_emulate_vm_instr(vcpu, rc); > + return rc; > } > Passing back the third byte is quick hacky. Instead of this change to kvm_emulate_instruction, I'd rather check the instruction bytes in gp_interception before calling kvm_emulate_instruction. That would be something like: - move "kvm_clear_exception_queue(vcpu);" inside the "if (!(emulation_type & EMULTYPE_NO_DECODE))". It doesn't apply when you are coming back from userspace. - extract the "if (!(emulation_type & EMULTYPE_NO_DECODE))" body to a new function x86_emulate_decoded_instruction. Call it from gp_interception, we know this is not a pagefault and therefore vcpu->arch.write_fault_to_shadow_pgtable must be false. - check ctxt->insn_bytes for an SVM instruction - if not an SVM instruction, call kvm_emulate_instruction(vcpu, EMULTYPE_VMWARE_GP|EMULTYPE_NO_DECODE). Thanks, Paolo