Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1269932pxb; Thu, 21 Oct 2021 20:01:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwd/ZHrjujDsDHNm2GXMo95YQRqQKBivBirI+HPmvM9o6UZTDVisMXa4x2MJ21CP0aXHSkk X-Received: by 2002:a05:6a00:1488:b0:44d:25b2:f80b with SMTP id v8-20020a056a00148800b0044d25b2f80bmr9899070pfu.20.1634871708456; Thu, 21 Oct 2021 20:01:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634871708; cv=none; d=google.com; s=arc-20160816; b=dJyLeJXp+p0DkWajhxfPNcl1/8TU0yVpodnKFu+fnI7qdrMho0LKhArImWO29tV8+U SjQN1+WBaubqI0qi5hU392moQbvvZ0Yw8dGNEipsTaQngHUSUUT4LriGAhY2n6P97qC2 uh2p5TnRoOVRk331CCS0nCVY8j9hTyeK1wLDOZsQFCwu2RdHtYFHm5beC4jJTMOalQ7b rkgZaDainjlCrcs0UkP2A+oBMLshgZnhAttkL5MV2siJfqgCOOzMDcrwMYSPqKlP5/w1 9qqlouB1LqBZcQYU6Jh4G+FBJVu+giZaqINOnaR6JZACAyeTO6Gb3HLdEO7co43C32ak FvNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Nw4A0OndFbjxjPCmyaZA/anHkPIKSUhTnGh73Wzel38=; b=ld/vsKnX3WqKCiF3PzPvid8t1hLt0tyTODrZ9eMuNjki4PgI+SpGIA0RRfmACT8iB8 OCMMIPda+RXYremXpmwAaWzybQxHOv4XYh9OUJrSJWrFgx8onfOzYsNsED0UoWCAveVO 2Jn/CUB/+C/fX87+2ilcjceu5GHJF7e3zoBZ+3fRbQSMyrSspXuHCfHzUWbh3uvBmQsI VRDO6EjsBgLOAM4SvOXTALGxY5nx2HBTI1hAtn/qfqFNyi4Oumy+GKoeD+KwmQ5CKLEl 4M/bCW9mSwuDNMxQe+TGTWY0eCEjsUliq4kuxvYt08RVNj6nDF6qMg+qWX1OZXtvfSiy XA7Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i70si8943640pge.600.2021.10.21.20.01.25; Thu, 21 Oct 2021 20:01:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232627AbhJVDCV (ORCPT + 99 others); Thu, 21 Oct 2021 23:02:21 -0400 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:56893 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232769AbhJVDCS (ORCPT ); Thu, 21 Oct 2021 23:02:18 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R141e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04400;MF=houwenlong93@linux.alibaba.com;NM=1;PH=DS;RN=14;SR=0;TI=SMTPD_---0UtCQfPR_1634871599; Received: from localhost(mailfrom:houwenlong93@linux.alibaba.com fp:SMTPD_---0UtCQfPR_1634871599) by smtp.aliyun-inc.com(127.0.0.1); Fri, 22 Oct 2021 10:59:59 +0800 From: Hou Wenlong To: kvm@vger.kernel.org Cc: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , Alexander Graf , linux-kernel@vger.kernel.org Subject: [PATCH 2/2] KVM: X86: Exit to userspace if RDMSR/WRMSR emulation returns X86EMUL_IO_NEEDED Date: Fri, 22 Oct 2021 10:59:57 +0800 Message-Id: X-Mailer: git-send-email 2.31.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In em_rdmsr()/em_wrmsr(), it returns X86EMUL_IO_NEEDED if MSR accesses needed to exit to userspace. However, x86_emulate_insn() doesn't return X86EMUL_*, so x86_emulate_instruction() doesn't directly act on X86EMUL_IO_NEEDED, it instead looks for other signals to differentiate between PIO, MMIO, etc... So RDMSR/WRMSR emulation won't exit to userspace now. The userspace_msr_exit_test testcase in seftests had tested RDMSR/WRMSR emulation with kvm.force_enable_prefix enabled and it was passed. Because x86_emulate_instruction() returns 1 and guest continues, but RIP has been updated to point to RDMSR/WRMSR. Then guest would execute RDMSR/WRMSR and exit to userspace by kvm_emulate_rdmsr()/kvm_emulate_wrmsr() finally. In such situation, instruction emulation didn't take effect but userspace exit information had been filled, which was inappropriate. Since X86EMUL_IO_NEEDED path would provide a complete_userspace_io callback, x86_emulate_instruction() should return 0 if callback is not NULL. Then RDMSR/WRMSR instruction emulation can exit to userspace and skip RDMSR/WRMSR execution and inteception. Fixes: 1ae099540e8c7 ("KVM: x86: Allow deflecting unknown MSR accesses to user space") Signed-off-by: Hou Wenlong --- arch/x86/kvm/x86.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 3ea4f6ef2474..4e0dc5b06d03 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -7950,7 +7950,9 @@ int x86_emulate_instruction(struct kvm_vcpu *vcpu, gpa_t cr2_or_gpa, writeback = false; r = 0; vcpu->arch.complete_userspace_io = complete_emulated_mmio; - } else if (r == EMULATION_RESTART) + } else if (vcpu->arch.complete_userspace_io) + r = 0; + else if (r == EMULATION_RESTART) goto restart; else r = 1; -- 2.31.1