From: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
To: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>,
LKML <linux-kernel@vger.kernel.org>, KVM <kvm@vger.kernel.org>
Subject: [PATCH v2 0/5] KVM: x86: improve reexecute_instruction
Date: Mon, 10 Dec 2012 17:11:35 +0800 [thread overview]
Message-ID: <50C5A747.1020105@linux.vnet.ibm.com> (raw)
Changelog:
There are some changes from Marcelo and Gleb's review, thank you all!
- access indirect_shadow_pages in the protection of mmu-lock
- fix the issue when unhandleable instruction access on large page
- add a new test case for large page
The current reexecute_instruction can not well detect the failed instruction
emulation. It allows guest to retry all the instructions except it accesses
on error pfn.
For example, these cases can not be detected:
- for tdp used
currently, it refused to retry all instructions. If nested npt is used, the
emulation may be caused by shadow page, it can be fixed by unshadow the
shadow page.
- for shadow mmu
some cases are nested-write-protect, for example, if the page we want to
write is used as PDE but it chains to itself. Under this case, we should
stop the emulation and report the case to userspace.
There are two test cases based on kvm-unit-test can trigger a infinite loop on
current code (ept = 0), after this patchset, it can report the error to Qemu.
Subject: [PATCH] access test: test unhandleable instruction
Test the instruction which can not be handled by kvm
Signed-off-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
---
x86/access.c | 54 +++++++++++++++++++++++++++++++++++++++++++++++++++++-
1 files changed, 53 insertions(+), 1 deletions(-)
diff --git a/x86/access.c b/x86/access.c
index 23a5995..9141c70 100644
--- a/x86/access.c
+++ b/x86/access.c
@@ -2,6 +2,7 @@
#include "libcflat.h"
#include "desc.h"
#include "processor.h"
+#include "vm.h"
#define smp_id() 0
@@ -739,6 +740,54 @@ err:
return 0;
}
+static int check_retry_unhandleable_ins(ac_pool_t *pool)
+{
+ unsigned long mem = 30 * 1024 * 1024;
+ unsigned long esp;
+ ac_test_t at;
+
+ ac_test_init(&at, (void *)(0x123406003000));
+ at.flags[AC_PDE_PRESENT] = at.flags[AC_PDE_WRITABLE] = 1;
+ at.flags[AC_PTE_PRESENT] = at.flags[AC_PTE_WRITABLE] = 1;
+ at.flags[AC_CPU_CR0_WP] = 1;
+
+ at.phys = mem;
+ ac_setup_specific_pages(&at, pool, mem, 0);
+
+ asm volatile("mov %%rsp, %%rax \n\t" : "=a"(esp));
+ asm volatile("mov %%rax, %%rsp \n\t" : : "a"(0x123406003000 + 0xf0));
+ asm volatile ("int $0x3 \n\t");
+ asm volatile("mov %%rax, %%rsp \n\t" : : "a"(esp));
+
+ return 1;
+}
+
+static int check_large_mapping_write_page_table(ac_pool_t *pool)
+{
+ unsigned long mem = 0x1000000;
+ unsigned long esp;
+ ac_test_t at;
+ ulong cr3;
+
+ ac_test_init(&at, (void *)(0x123400000000));
+ at.flags[AC_PDE_PRESENT] = at.flags[AC_PDE_WRITABLE] = 1;
+ at.flags[AC_PDE_PSE] = 1;
+ at.flags[AC_CPU_CR0_WP] = 1;
+
+ at.phys = mem;
+ ac_setup_specific_pages(&at, pool, mem, 0);
+
+ cr3 = read_cr3();
+ write_cr3(cr3);
+
+ asm volatile("mov %%rsp, %%rax \n\t" : "=a"(esp));
+ asm volatile("mov %%rax, %%rsp \n\t" : : "a"(0x123400000000 + 0x6f0));
+ asm volatile ("int $0x3 \n\t");
+ asm volatile("mov %%rax, %%rsp \n\t" : : "a"(esp));
+
+ return 1;
+}
+
int ac_test_exec(ac_test_t *at, ac_pool_t *pool)
{
int r;
@@ -756,7 +805,9 @@ const ac_test_fn ac_test_cases[] =
{
corrupt_hugepage_triger,
check_pfec_on_prefetch_pte,
- check_smep_andnot_wp
+ check_smep_andnot_wp,
+ check_retry_unhandleable_ins,
+ check_large_mapping_write_page_table
};
int ac_test_run(void)
@@ -770,6 +821,7 @@ int ac_test_run(void)
tests = successes = 0;
ac_env_int(&pool);
ac_test_init(&at, (void *)(0x123400000000 + 16 * smp_id()));
+
do {
if (at.flags[AC_CPU_CR4_SMEP] && (ptl2[2] & 0x4))
ptl2[2] -= 0x4;
--
1.7.7.6
next reply other threads:[~2012-12-10 9:11 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-10 9:11 Xiao Guangrong [this message]
2012-12-10 9:12 ` [PATCH v2 1/5] KVM: MMU: move adjusting pte access for softmmu to FNAME(page_fault) Xiao Guangrong
2012-12-11 23:47 ` Marcelo Tosatti
2012-12-12 18:53 ` Xiao Guangrong
2012-12-10 9:13 ` [PATCH v2 2/5] KVM: MMU: adjust page size early if gfn used as page table Xiao Guangrong
2012-12-12 0:57 ` Marcelo Tosatti
2012-12-12 19:23 ` Xiao Guangrong
2012-12-13 22:37 ` Marcelo Tosatti
2012-12-10 9:13 ` [PATCH v2 3/5] KVM: x86: clean up reexecute_instruction Xiao Guangrong
2012-12-10 9:14 ` [PATCH v2 4/5] KVM: x86: let reexecute_instruction work for tdp Xiao Guangrong
2012-12-10 9:14 ` [PATCH v2 5/5] KVM: x86: improve reexecute_instruction Xiao Guangrong
2012-12-12 1:09 ` Marcelo Tosatti
2012-12-12 19:29 ` Xiao Guangrong
2012-12-13 23:02 ` Marcelo Tosatti
2012-12-14 3:40 ` Xiao Guangrong
2012-12-11 23:36 ` [PATCH v2 0/5] " Marcelo Tosatti
2012-12-12 20:05 ` Xiao Guangrong
2012-12-13 22:54 ` Marcelo Tosatti
2012-12-14 4:50 ` Xiao Guangrong
2012-12-15 1:05 ` Marcelo Tosatti
2012-12-23 11:46 ` Gleb Natapov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=50C5A747.1020105@linux.vnet.ibm.com \
--to=xiaoguangrong@linux.vnet.ibm.com \
--cc=gleb@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).