Received: by 10.223.164.202 with SMTP id h10csp73371wrb; Tue, 14 Nov 2017 17:51:28 -0800 (PST) X-Google-Smtp-Source: AGs4zMYiJIzuhdOtzP341zZ9D1IRqA3Z8cIzB+0a0NylSmZNBLMqDrh04sOVgPMNfi/iUcDw/aep X-Received: by 10.99.169.25 with SMTP id u25mr13690187pge.77.1510710688686; Tue, 14 Nov 2017 17:51:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510710688; cv=none; d=google.com; s=arc-20160816; b=S7kQ9VRB3jh3WQND6TvTD+EgTIJ9jw4X4qyF6QlDMAgttmdY2DfilHEOLxmCnkLsiS QeCJ/DcVuD8AllHWwyFoEDPPJeeNYJySLvb0y17JAd8fK4/rVOzbQ5S4P4EPgjGMkuti stIsEDxWpcral7WGdT1TVB7Omt0nw6sloEfo/QziJzMAKsojSiWp1o0uyrntvcxn4xlO YeQgveoa0Ivx67NM71nmuGWt3eUjw7PmkX+3Pj/m0hi8G+OHAchP+SBjr97kOmV6DqHS kWDvYvAeoPonwI0tvrYrd+UA6dH9r+6zU8g8ICFJnaNx5U2z0ZeNY5Sj6Q1N/E/utgwZ SLCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=OZMJNfmVhPMbTQc9dOSAmrEPatdbkA86Qz2Tj+FZ65k=; b=LswAeu2F9geSATli6BJeutDz+A6qFkjlD1x8HwkJW2YdokJCcmx+LaOj1uWBZxHIE9 4E4NyihAFG31616TQUW8hoWRomgOpHnWGCMEASjk7ECimWDmASxOw8qkvIeOMAomjlv/ yILjL4PuaxUd6yWK96lddpn5CKJNTxpCQsRk4drkt136vVyQ3AX7ge+g1HOIfFrKWaSp 1aTpDarIXO0OdE05VAkDaA+Y4Y/dv0xxty222LDo3/5g9lHIVtDqoElRkQBap4Jl8VcQ EyIB4/rIfXMbBV5dF3LofI2TU6z492nLYyJr0FY6hgP51M+8UK1mhMPzh9VgB8xhYUE6 Kkpg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AC4RBbaa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si16938688plz.723.2017.11.14.17.51.16; Tue, 14 Nov 2017 17:51:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AC4RBbaa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757679AbdKOAn2 (ORCPT + 87 others); Tue, 14 Nov 2017 19:43:28 -0500 Received: from mail-oi0-f66.google.com ([209.85.218.66]:56485 "EHLO mail-oi0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757361AbdKOAmt (ORCPT ); Tue, 14 Nov 2017 19:42:49 -0500 Received: by mail-oi0-f66.google.com with SMTP id a81so4864955oii.13; Tue, 14 Nov 2017 16:42:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=OZMJNfmVhPMbTQc9dOSAmrEPatdbkA86Qz2Tj+FZ65k=; b=AC4RBbaaljPgHA1YPmeO/HGrJrY5wCIhrWGm01ZsJ6vLinvk8gfVLhKZngJQJ5fVbj qduwisMdo/stwVFhidGD/9qqfwfWE90uwgb36effUqnKC4g9U2/PYVl4eLayljxHs8ov pzMXXBJMzIJy14uBOnfl6drTYxzfbrVr2nILhmS19rGRneZrE++AhPdKIiPydbCKG7Lp 2QGY4rFzYNgLptdGuTGMqbdS7EbOEcY5t1AWzR6krDfBEWIcM7oqC8fKPa5ZdiGwS6oG xVwvsYUTwO/w/a0QZz+4h5Pl4dytzr5HN9Qu40wh0fI59dWHwZxS6ejGhSd/GdXH80oU hr0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=OZMJNfmVhPMbTQc9dOSAmrEPatdbkA86Qz2Tj+FZ65k=; b=iUuGRM3FK5aken3YStbOMVeNBOeKii1QCyZXDbPHJt+NarGazwgumusMgk4PK6uySn VGmw/Owmjs2ylM8eSI7QJGCrheTghEPE7c5cDKsifFvtbw1tRwt40B/D4mhd9N+sH4xE S8HlIJbtxwt0DJ4PzCEjUb3nU+icYujX52G0gLGU1EhwR/tRfJNXHlVCf7J6ojTPxeuq opEsxxZ20U7CGbyRbKbTJPzBmDkqP4SI05wJmuPG1viAPgLZSx3xM6vbebvhiX0p9fJG 1qk1YzbinKJMV3Uh0YLIq6qvJRXvIbuxW0tYU8HhG9pBAWVNES20sOpdHLiCs20f8JC9 T2HA== X-Gm-Message-State: AJaThX6ZhUxl803ZU/WtnV106guNpxdJUHZOv/1kW//QPPgnBoi6eTHO xmBk5XAWDLsm0tBZnTv2scW0TqtQHt7GIrHFjAs= X-Received: by 10.202.220.3 with SMTP id t3mr8778634oig.237.1510706568719; Tue, 14 Nov 2017 16:42:48 -0800 (PST) MIME-Version: 1.0 Received: by 10.74.53.27 with HTTP; Tue, 14 Nov 2017 16:42:48 -0800 (PST) In-Reply-To: <1510584031-36240-6-git-send-email-pbonzini@redhat.com> References: <1510584031-36240-1-git-send-email-pbonzini@redhat.com> <1510584031-36240-6-git-send-email-pbonzini@redhat.com> From: Wanpeng Li Date: Wed, 15 Nov 2017 08:42:48 +0800 Message-ID: Subject: Re: [PATCH 5/5] KVM: vmx: add support for emulating UMIP To: Paolo Bonzini Cc: "linux-kernel@vger.kernel.org" , kvm , Radim Krcmar Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2017-11-13 22:40 GMT+08:00 Paolo Bonzini : > UMIP can be emulated almost perfectly on Intel processor by enabling > descriptor-table exits. SMSW does not cause a vmexit and hence it > cannot be changed into a #GP fault, but all in all it's the most > "innocuous" of the unprivileged instructions that UMIP blocks. > > In fact, Linux is _also_ emulating SMSW instructions on behalf of the > program that executes them, because some 16-bit programs expect to use > SMSW to detect vm86 mode, so this is an even smaller issue. > > Signed-off-by: Paolo Bonzini Reviewed-by: Wanpeng Li > --- > arch/x86/kvm/vmx.c | 29 +++++++++++++++++++++++++++-- > 1 file changed, 27 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index 6c474c94e154..a257ddc644d1 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -3651,6 +3651,7 @@ static __init int setup_vmcs_config(struct vmcs_config *vmcs_conf) > SECONDARY_EXEC_ENABLE_EPT | > SECONDARY_EXEC_UNRESTRICTED_GUEST | > SECONDARY_EXEC_PAUSE_LOOP_EXITING | > + SECONDARY_EXEC_DESC | > SECONDARY_EXEC_RDTSCP | > SECONDARY_EXEC_ENABLE_INVPCID | > SECONDARY_EXEC_APIC_REGISTER_VIRT | > @@ -4347,6 +4348,14 @@ static int vmx_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) > (to_vmx(vcpu)->rmode.vm86_active ? > KVM_RMODE_VM_CR4_ALWAYS_ON : KVM_PMODE_VM_CR4_ALWAYS_ON); > > + if ((cr4 & X86_CR4_UMIP) && !boot_cpu_has(X86_FEATURE_UMIP)) { > + vmcs_set_bits(SECONDARY_VM_EXEC_CONTROL, > + SECONDARY_EXEC_DESC); > + hw_cr4 &= ~X86_CR4_UMIP; > + } else > + vmcs_clear_bits(SECONDARY_VM_EXEC_CONTROL, > + SECONDARY_EXEC_DESC); > + > if (cr4 & X86_CR4_VMXE) { > /* > * To use VMXON (and later other VMX instructions), a guest > @@ -5296,6 +5305,7 @@ static void vmx_compute_secondary_exec_control(struct vcpu_vmx *vmx) > struct kvm_vcpu *vcpu = &vmx->vcpu; > > u32 exec_control = vmcs_config.cpu_based_2nd_exec_ctrl; > + > if (!cpu_need_virtualize_apic_accesses(vcpu)) > exec_control &= ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES; > if (vmx->vpid == 0) > @@ -5314,6 +5324,11 @@ static void vmx_compute_secondary_exec_control(struct vcpu_vmx *vmx) > exec_control &= ~(SECONDARY_EXEC_APIC_REGISTER_VIRT | > SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY); > exec_control &= ~SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE; > + > + /* SECONDARY_EXEC_DESC is enabled/disabled on writes to CR4.UMIP, > + * in vmx_set_cr4. */ > + exec_control &= ~SECONDARY_EXEC_DESC; > + > /* SECONDARY_EXEC_SHADOW_VMCS is enabled when L1 executes VMPTRLD > (handle_vmptrld). > We can NOT enable shadow_vmcs here because we don't have yet > @@ -6064,6 +6079,12 @@ static int handle_set_cr4(struct kvm_vcpu *vcpu, unsigned long val) > return kvm_set_cr4(vcpu, val); > } > > +static int handle_desc(struct kvm_vcpu *vcpu) > +{ > + WARN_ON(!(vcpu->arch.cr4 & X86_CR4_UMIP)); > + return emulate_instruction(vcpu, 0) == EMULATE_DONE; > +} > + > static int handle_cr(struct kvm_vcpu *vcpu) > { > unsigned long exit_qualification, val; > @@ -8152,6 +8173,8 @@ static int (*const kvm_vmx_exit_handlers[])(struct kvm_vcpu *vcpu) = { > [EXIT_REASON_XSETBV] = handle_xsetbv, > [EXIT_REASON_TASK_SWITCH] = handle_task_switch, > [EXIT_REASON_MCE_DURING_VMENTRY] = handle_machine_check, > + [EXIT_REASON_GDTR_IDTR] = handle_desc, > + [EXIT_REASON_LDTR_TR] = handle_desc, > [EXIT_REASON_EPT_VIOLATION] = handle_ept_violation, > [EXIT_REASON_EPT_MISCONFIG] = handle_ept_misconfig, > [EXIT_REASON_PAUSE_INSTRUCTION] = handle_pause, > @@ -9097,7 +9120,8 @@ static bool vmx_xsaves_supported(void) > > static bool vmx_umip_emulated(void) > { > - return false; > + return vmcs_config.cpu_based_2nd_exec_ctrl & > + SECONDARY_EXEC_DESC; > } > > static void vmx_recover_nmi_blocking(struct vcpu_vmx *vmx) > @@ -9691,7 +9715,8 @@ static void vmcs_set_secondary_exec_control(u32 new_ctl) > u32 mask = > SECONDARY_EXEC_SHADOW_VMCS | > SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE | > - SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES; > + SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES | > + SECONDARY_EXEC_DESC; > > u32 cur_ctl = vmcs_read32(SECONDARY_VM_EXEC_CONTROL); > > -- > 1.8.3.1 > From 1583962360842015057@xxx Mon Nov 13 14:43:41 +0000 2017 X-GM-THRID: 1583962360842015057 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread