[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH 3/4 V2] X86: MPX IA32_BNDCFGS msr handle



From 09743a7516a37e93034dd7895d1730fe5f400a2f Mon Sep 17 00:00:00 2001
From: Liu Jinsong <jinsong.liu@xxxxxxxxx>
Date: Mon, 25 Nov 2013 03:32:34 +0800
Subject: [PATCH 3/4 V2] X86: MPX IA32_BNDCFGS msr handle

When MPX supported, a new guest-state field for IA32_BNDCFGS
is added to the VMCS. In addition, two new controls are added:
 - a VM-exit control called "clear BNDCFGS"
 - a VM-entry control called "load BNDCFGS."
VM exits always save IA32_BNDCFGS into BNDCFGS field of VMCS.

Signed-off-by: Xudong Hao <xudong.hao@xxxxxxxxx>
Reviewed-by: Liu Jinsong <jinsong.liu@xxxxxxxxx>

Unlikely, but in case buggy VMX ucode, it also emulated the case
when rdmsr/wrmsr intercepted by hypervisor, via adding entries at
vmexit msr store area/vmentry msr load area, and vmexit msr load area.

Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
Signed-off-by: Liu Jinsong <jinsong.liu@xxxxxxxxx>
---
 xen/arch/x86/hvm/hvm.c             |   27 +++++++++++++++++++++++++++
 xen/arch/x86/hvm/vmx/vmcs.c        |   33 +++++++++++++++++++++++++++++++--
 xen/include/asm-x86/cpufeature.h   |    2 ++
 xen/include/asm-x86/hvm/vmx/vmcs.h |    2 ++
 xen/include/asm-x86/msr-index.h    |    2 ++
 5 files changed, 64 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 9c88c73..070064c 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -248,6 +248,21 @@ int hvm_set_guest_pat(struct vcpu *v, u64 guest_pat)
     return 1;
 }
 
+static bool_t bndcfgs_invalid(u64 msr_content)
+{
+    /* BNDCFGS MSR reserved bits (11 ~ 2) must be zero */
+    if ( msr_content & 0xffc )
+        return 1;
+
+    /* Canonical address reserved bits must be zero */
+    if ( hvm_long_mode_enabled(current) )
+        /* 48b linear address for x86_64 guest */
+        return !!(msr_content & (~(u64)0 << 48) );
+    else
+        /* 32b linear address for x86_32 (include PAE) guest */
+        return !!(msr_content & (~(u64)0 << 32) );
+}
+
 void hvm_set_guest_tsc(struct vcpu *v, u64 guest_tsc)
 {
     uint64_t tsc;
@@ -3010,6 +3025,12 @@ int hvm_msr_read_intercept(unsigned int msr, uint64_t 
*msr_content)
         hvm_get_guest_pat(v, msr_content);
         break;
 
+    case MSR_IA32_BNDCFGS:
+        if ( !cpu_has_mpx )
+            goto gp_fault;
+        vmx_read_guest_msr(MSR_IA32_BNDCFGS, msr_content);
+        break;
+
     case MSR_MTRRcap:
         if ( !mtrr )
             goto gp_fault;
@@ -3133,6 +3154,12 @@ int hvm_msr_write_intercept(unsigned int msr, uint64_t 
msr_content)
            goto gp_fault;
         break;
 
+    case MSR_IA32_BNDCFGS:
+        if ( !cpu_has_mpx || bndcfgs_invalid(msr_content) )
+            goto gp_fault;
+        vmx_write_guest_msr(MSR_IA32_BNDCFGS, msr_content);
+        break;
+
     case MSR_MTRRcap:
         if ( !mtrr )
             goto gp_fault;
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 290b42f..1114ce7 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -270,7 +270,8 @@ static int vmx_init_vmcs_config(void)
     }
 
     min = VM_EXIT_ACK_INTR_ON_EXIT;
-    opt = VM_EXIT_SAVE_GUEST_PAT | VM_EXIT_LOAD_HOST_PAT;
+    opt = VM_EXIT_SAVE_GUEST_PAT | VM_EXIT_LOAD_HOST_PAT |
+          VM_EXIT_CLEAR_BNDCFGS;
     min |= VM_EXIT_IA32E_MODE;
     _vmx_vmexit_control = adjust_vmx_controls(
         "VMExit Control", min, opt, MSR_IA32_VMX_EXIT_CTLS, &mismatch);
@@ -284,7 +285,7 @@ static int vmx_init_vmcs_config(void)
         _vmx_pin_based_exec_control  &= ~ PIN_BASED_POSTED_INTERRUPT;
 
     min = 0;
-    opt = VM_ENTRY_LOAD_GUEST_PAT;
+    opt = VM_ENTRY_LOAD_GUEST_PAT | VM_ENTRY_LOAD_BNDCFGS;
     _vmx_vmentry_control = adjust_vmx_controls(
         "VMEntry Control", min, opt, MSR_IA32_VMX_ENTRY_CTLS, &mismatch);
 
@@ -955,6 +956,34 @@ static int construct_vmcs(struct vcpu *v)
         vmx_disable_intercept_for_msr(v, MSR_IA32_SYSENTER_EIP, MSR_TYPE_R | 
MSR_TYPE_W);
         if ( paging_mode_hap(d) && (!iommu_enabled || iommu_snoop) )
             vmx_disable_intercept_for_msr(v, MSR_IA32_CR_PAT, MSR_TYPE_R | 
MSR_TYPE_W);
+
+        if ( cpu_has_mpx )
+        {
+            /*
+             * When MPX supported, a new guest-state field for IA32_BNDCFGS
+             * is added to the VMCS. In addition, two new controls are added:
+             * - a VM-exit control called "clear BNDCFGS"
+             * - a VM-entry control called "load BNDCFGS."
+             * VM exits always save IA32_BNDCFGS into BNDCFGS field of VMCS.
+             */
+            if ( likely((vmexit_ctl & VM_EXIT_CLEAR_BNDCFGS) &&
+                        (vmentry_ctl & VM_ENTRY_LOAD_BNDCFGS)) )
+            {
+                vmx_disable_intercept_for_msr(v, MSR_IA32_BNDCFGS,
+                                                 MSR_TYPE_R | MSR_TYPE_W);
+            }
+            /* Unlikely, just in case buggy VMX ucode */
+            else
+            {
+                int ret;
+                ret = vmx_add_guest_msr(MSR_IA32_BNDCFGS);
+                if ( ret )
+                    return ret;
+                ret = vmx_add_host_load_msr(MSR_IA32_BNDCFGS);
+                if ( ret )
+                    return ret;
+            }
+        }
     }
 
     /* I/O access bitmap. */
diff --git a/xen/include/asm-x86/cpufeature.h b/xen/include/asm-x86/cpufeature.h
index 1cfaf94..930dc9b 100644
--- a/xen/include/asm-x86/cpufeature.h
+++ b/xen/include/asm-x86/cpufeature.h
@@ -148,6 +148,7 @@
 #define X86_FEATURE_INVPCID    (7*32+10) /* Invalidate Process Context ID */
 #define X86_FEATURE_RTM        (7*32+11) /* Restricted Transactional Memory */
 #define X86_FEATURE_NO_FPU_SEL         (7*32+13) /* FPU CS/DS stored as zero */
+#define X86_FEATURE_MPX                (7*32+14) /* Memory Protection 
Extensions */
 #define X86_FEATURE_SMAP       (7*32+20) /* Supervisor Mode Access Prevention 
*/
 
 #define cpu_has(c, bit)                test_bit(bit, (c)->x86_capability)
@@ -197,6 +198,7 @@
 #define cpu_has_xsave           boot_cpu_has(X86_FEATURE_XSAVE)
 #define cpu_has_avx             boot_cpu_has(X86_FEATURE_AVX)
 #define cpu_has_lwp             boot_cpu_has(X86_FEATURE_LWP)
+#define cpu_has_mpx             boot_cpu_has(X86_FEATURE_MPX)
 
 #define cpu_has_arch_perfmon    boot_cpu_has(X86_FEATURE_ARCH_PERFMON)
 
diff --git a/xen/include/asm-x86/hvm/vmx/vmcs.h 
b/xen/include/asm-x86/hvm/vmx/vmcs.h
index ebaba5c..75cd653 100644
--- a/xen/include/asm-x86/hvm/vmx/vmcs.h
+++ b/xen/include/asm-x86/hvm/vmx/vmcs.h
@@ -186,6 +186,7 @@ extern u32 vmx_pin_based_exec_control;
 #define VM_EXIT_SAVE_GUEST_EFER         0x00100000
 #define VM_EXIT_LOAD_HOST_EFER          0x00200000
 #define VM_EXIT_SAVE_PREEMPT_TIMER      0x00400000
+#define VM_EXIT_CLEAR_BNDCFGS           0x00800000
 extern u32 vmx_vmexit_control;
 
 #define VM_ENTRY_IA32E_MODE             0x00000200
@@ -194,6 +195,7 @@ extern u32 vmx_vmexit_control;
 #define VM_ENTRY_LOAD_PERF_GLOBAL_CTRL  0x00002000
 #define VM_ENTRY_LOAD_GUEST_PAT         0x00004000
 #define VM_ENTRY_LOAD_GUEST_EFER        0x00008000
+#define VM_ENTRY_LOAD_BNDCFGS           0x00010000
 extern u32 vmx_vmentry_control;
 
 #define SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES 0x00000001
diff --git a/xen/include/asm-x86/msr-index.h b/xen/include/asm-x86/msr-index.h
index e597a28..ccad1ab 100644
--- a/xen/include/asm-x86/msr-index.h
+++ b/xen/include/asm-x86/msr-index.h
@@ -56,6 +56,8 @@
 #define MSR_IA32_DS_AREA               0x00000600
 #define MSR_IA32_PERF_CAPABILITIES     0x00000345
 
+#define MSR_IA32_BNDCFGS               0x00000D90
+
 #define MSR_MTRRfix64K_00000           0x00000250
 #define MSR_MTRRfix16K_80000           0x00000258
 #define MSR_MTRRfix16K_A0000           0x00000259
-- 
1.7.1

Attachment: 0003-X86-MPX-IA32_BNDCFGS-msr-handle.patch
Description: 0003-X86-MPX-IA32_BNDCFGS-msr-handle.patch

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.