f6df304f26
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
168 lines
6.0 KiB
Diff
168 lines
6.0 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Maxim Levitsky <mlevitsk@redhat.com>
|
|
Date: Tue, 21 Jun 2022 18:09:02 +0300
|
|
Subject: [PATCH] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM
|
|
|
|
When #SMI is asserted, the CPU can be in interrupt shadow
|
|
due to sti or mov ss.
|
|
|
|
It is not mandatory in Intel/AMD prm to have the #SMI
|
|
blocked during the shadow, and on top of
|
|
that, since neither SVM nor VMX has true support for SMI
|
|
window, waiting for one instruction would mean single stepping
|
|
the guest.
|
|
|
|
Instead, allow #SMI in this case, but both reset the interrupt
|
|
window and stash its value in SMRAM to restore it on exit
|
|
from SMM.
|
|
|
|
This fixes rare failures seen mostly on windows guests on VMX,
|
|
when #SMI falls on the sti instruction which mainfest in
|
|
VM entry failure due to EFLAGS.IF not being set, but STI interrupt
|
|
window still being set in the VMCS.
|
|
|
|
Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com>
|
|
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
|
|
---
|
|
arch/x86/kvm/emulate.c | 17 ++++++++++++++---
|
|
arch/x86/kvm/kvm_emulate.h | 13 ++++++++++---
|
|
arch/x86/kvm/x86.c | 12 ++++++++++++
|
|
3 files changed, 36 insertions(+), 6 deletions(-)
|
|
|
|
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
|
|
index 98c2cf169b39..5614456de922 100644
|
|
--- a/arch/x86/kvm/emulate.c
|
|
+++ b/arch/x86/kvm/emulate.c
|
|
@@ -2416,7 +2416,7 @@ static int rsm_load_state_32(struct x86_emulate_ctxt *ctxt,
|
|
struct kvm_smram_state_32 *smstate)
|
|
{
|
|
struct desc_ptr dt;
|
|
- int i;
|
|
+ int i, r;
|
|
|
|
ctxt->eflags = smstate->eflags | X86_EFLAGS_FIXED;
|
|
ctxt->_eip = smstate->eip;
|
|
@@ -2451,8 +2451,16 @@ static int rsm_load_state_32(struct x86_emulate_ctxt *ctxt,
|
|
|
|
ctxt->ops->set_smbase(ctxt, smstate->smbase);
|
|
|
|
- return rsm_enter_protected_mode(ctxt, smstate->cr0,
|
|
- smstate->cr3, smstate->cr4);
|
|
+ r = rsm_enter_protected_mode(ctxt, smstate->cr0,
|
|
+ smstate->cr3, smstate->cr4);
|
|
+
|
|
+ if (r != X86EMUL_CONTINUE)
|
|
+ return r;
|
|
+
|
|
+ ctxt->ops->set_int_shadow(ctxt, 0);
|
|
+ ctxt->interruptibility = (u8)smstate->int_shadow;
|
|
+
|
|
+ return X86EMUL_CONTINUE;
|
|
}
|
|
|
|
#ifdef CONFIG_X86_64
|
|
@@ -2501,6 +2509,9 @@ static int rsm_load_state_64(struct x86_emulate_ctxt *ctxt,
|
|
rsm_load_seg_64(ctxt, &smstate->fs, VCPU_SREG_FS);
|
|
rsm_load_seg_64(ctxt, &smstate->gs, VCPU_SREG_GS);
|
|
|
|
+ ctxt->ops->set_int_shadow(ctxt, 0);
|
|
+ ctxt->interruptibility = (u8)smstate->int_shadow;
|
|
+
|
|
return X86EMUL_CONTINUE;
|
|
}
|
|
#endif
|
|
diff --git a/arch/x86/kvm/kvm_emulate.h b/arch/x86/kvm/kvm_emulate.h
|
|
index d16b377be70b..5b881a3a5ed9 100644
|
|
--- a/arch/x86/kvm/kvm_emulate.h
|
|
+++ b/arch/x86/kvm/kvm_emulate.h
|
|
@@ -229,6 +229,7 @@ struct x86_emulate_ops {
|
|
bool (*guest_has_rdpid)(struct x86_emulate_ctxt *ctxt);
|
|
|
|
void (*set_nmi_mask)(struct x86_emulate_ctxt *ctxt, bool masked);
|
|
+ void (*set_int_shadow)(struct x86_emulate_ctxt *ctxt, u8 shadow);
|
|
|
|
unsigned (*get_hflags)(struct x86_emulate_ctxt *ctxt);
|
|
void (*exiting_smm)(struct x86_emulate_ctxt *ctxt);
|
|
@@ -499,7 +500,9 @@ struct kvm_smram_state_32 {
|
|
u32 reserved1[62]; /* FE00 - FEF7 */
|
|
u32 smbase; /* FEF8 */
|
|
u32 smm_revision; /* FEFC */
|
|
- u32 reserved2[5]; /* FF00-FF13 */
|
|
+ u32 reserved2[4]; /* FF00-FF0F*/
|
|
+ /* int_shadow is KVM extension*/
|
|
+ u32 int_shadow; /* FF10 */
|
|
/* CR4 is not present in Intel/AMD SMRAM image*/
|
|
u32 cr4; /* FF14 */
|
|
u32 reserved3[5]; /* FF18 */
|
|
@@ -571,13 +574,17 @@ struct kvm_smram_state_64 {
|
|
struct kvm_smm_seg_state_64 idtr; /* FE80 (R/O) */
|
|
struct kvm_smm_seg_state_64 tr; /* FE90 (R/O) */
|
|
|
|
- /* I/O restart and auto halt restart are not implemented by KVM */
|
|
+ /*
|
|
+ * I/O restart and auto halt restart are not implemented by KVM
|
|
+ * int_shadow is KVM's extension
|
|
+ */
|
|
+
|
|
u64 io_restart_rip; /* FEA0 (R/O) */
|
|
u64 io_restart_rcx; /* FEA8 (R/O) */
|
|
u64 io_restart_rsi; /* FEB0 (R/O) */
|
|
u64 io_restart_rdi; /* FEB8 (R/O) */
|
|
u32 io_restart_dword; /* FEC0 (R/O) */
|
|
- u32 reserved1; /* FEC4 */
|
|
+ u32 int_shadow; /* FEC4 (R/O) */
|
|
u8 io_instruction_restart; /* FEC8 (R/W) */
|
|
u8 auto_halt_restart; /* FEC9 (R/W) */
|
|
u8 reserved2[6]; /* FECA-FECF */
|
|
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
|
|
index f40cd45b6a01..9afac97ea98c 100644
|
|
--- a/arch/x86/kvm/x86.c
|
|
+++ b/arch/x86/kvm/x86.c
|
|
@@ -7299,6 +7299,11 @@ static void emulator_set_nmi_mask(struct x86_emulate_ctxt *ctxt, bool masked)
|
|
static_call(kvm_x86_set_nmi_mask)(emul_to_vcpu(ctxt), masked);
|
|
}
|
|
|
|
+static void emulator_set_int_shadow(struct x86_emulate_ctxt *ctxt, u8 shadow)
|
|
+{
|
|
+ static_call(kvm_x86_set_interrupt_shadow)(emul_to_vcpu(ctxt), shadow);
|
|
+}
|
|
+
|
|
static unsigned emulator_get_hflags(struct x86_emulate_ctxt *ctxt)
|
|
{
|
|
return emul_to_vcpu(ctxt)->arch.hflags;
|
|
@@ -7368,6 +7373,7 @@ static const struct x86_emulate_ops emulate_ops = {
|
|
.guest_has_fxsr = emulator_guest_has_fxsr,
|
|
.guest_has_rdpid = emulator_guest_has_rdpid,
|
|
.set_nmi_mask = emulator_set_nmi_mask,
|
|
+ .set_int_shadow = emulator_set_int_shadow,
|
|
.get_hflags = emulator_get_hflags,
|
|
.exiting_smm = emulator_exiting_smm,
|
|
.leave_smm = emulator_leave_smm,
|
|
@@ -9088,6 +9094,8 @@ static void enter_smm_save_state_32(struct kvm_vcpu *vcpu, struct kvm_smram_stat
|
|
smram->cr4 = kvm_read_cr4(vcpu);
|
|
smram->smm_revision = 0x00020000;
|
|
smram->smbase = vcpu->arch.smbase;
|
|
+
|
|
+ smram->int_shadow = static_call(kvm_x86_get_interrupt_shadow)(vcpu);
|
|
}
|
|
|
|
#ifdef CONFIG_X86_64
|
|
@@ -9136,6 +9144,8 @@ static void enter_smm_save_state_64(struct kvm_vcpu *vcpu, struct kvm_smram_stat
|
|
enter_smm_save_seg_64(vcpu, &smram->ds, VCPU_SREG_DS);
|
|
enter_smm_save_seg_64(vcpu, &smram->fs, VCPU_SREG_FS);
|
|
enter_smm_save_seg_64(vcpu, &smram->gs, VCPU_SREG_GS);
|
|
+
|
|
+ smram->int_shadow = static_call(kvm_x86_get_interrupt_shadow)(vcpu);
|
|
}
|
|
#endif
|
|
|
|
@@ -9172,6 +9182,8 @@ static void enter_smm(struct kvm_vcpu *vcpu)
|
|
kvm_set_rflags(vcpu, X86_EFLAGS_FIXED);
|
|
kvm_rip_write(vcpu, 0x8000);
|
|
|
|
+ static_call(kvm_x86_set_interrupt_shadow)(vcpu, 0);
|
|
+
|
|
cr0 = vcpu->arch.cr0 & ~(X86_CR0_PE | X86_CR0_EM | X86_CR0_TS | X86_CR0_PG);
|
|
static_call(kvm_x86_set_cr0)(vcpu, cr0);
|
|
vcpu->arch.cr0 = cr0;
|