From patchwork Thu Oct 21 11:49:05 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paolo Bonzini X-Patchwork-Id: 12574801 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DB0E0C4332F for ; Thu, 21 Oct 2021 11:49:33 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BE5E561208 for ; Thu, 21 Oct 2021 11:49:33 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231534AbhJULvs (ORCPT ); Thu, 21 Oct 2021 07:51:48 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:33670 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230407AbhJULvg (ORCPT ); Thu, 21 Oct 2021 07:51:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1634816960; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mqtr4g7jtOX1ba5o1QHrEq5h6VLPcWfRuHrRk2qkRgw=; b=EQAQRNJfCAd7rF8TI3/GZU1Sh4MdA47o0sA5H/+rTsU7zza5lg61uED+Cm2WbY11u/pdSP ldlwhIvddFZzeV5dOR4Fku67ZE7Qle1bFFp+sBzwxNnJ7Acjk0HAlSXj7u8b6ZlXHV4NdQ 8fkrEiEal3zw8C9f3Lw4hHihVkdelHs= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-339-yqBv60hDOPKrFnRLjVIrQg-1; Thu, 21 Oct 2021 07:49:15 -0400 X-MC-Unique: yqBv60hDOPKrFnRLjVIrQg-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 3E5C0802B4F; Thu, 21 Oct 2021 11:49:14 +0000 (UTC) Received: from virtlab701.virt.lab.eng.bos.redhat.com (virtlab701.virt.lab.eng.bos.redhat.com [10.19.152.228]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9430F5FC13; Thu, 21 Oct 2021 11:49:13 +0000 (UTC) From: Paolo Bonzini To: kvm@vger.kernel.org Cc: aaronlewis@google.com, jmattson@google.com, zxwang42@gmail.com, marcorr@google.com, seanjc@google.com, jroedel@suse.de, varad.gautam@suse.com Subject: [PATCH kvm-unit-tests 4/9] replace tss_descr global with a function Date: Thu, 21 Oct 2021 07:49:05 -0400 Message-Id: <20211021114910.1347278-5-pbonzini@redhat.com> In-Reply-To: <20211021114910.1347278-1-pbonzini@redhat.com> References: <20211021114910.1347278-1-pbonzini@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org tss_descr is declared as a struct descriptor_table_ptr but it is actualy pointing to an _entry_ in the GDT. Also it is different per CPU, but tss_descr does not recognize that. Fix both by reusing the code (already present e.g. in the vmware_backdoors test) that extracts the base from the GDT entry; and also provide a helper to retrieve the limit, which is needed in vmx.c. Signed-off-by: Paolo Bonzini --- lib/x86/desc.c | 32 ++++++++++++++++++++++++++++++++ lib/x86/desc.h | 25 ++++++------------------- x86/cstart64.S | 1 - x86/svm_tests.c | 15 +++------------ x86/taskswitch.c | 2 +- x86/vmware_backdoors.c | 22 ++++++---------------- x86/vmx.c | 9 +++++---- 7 files changed, 53 insertions(+), 53 deletions(-) diff --git a/lib/x86/desc.c b/lib/x86/desc.c index ba0db65..94f0ddb 100644 --- a/lib/x86/desc.c +++ b/lib/x86/desc.c @@ -409,3 +409,35 @@ void __set_exception_jmpbuf(jmp_buf *addr) { exception_jmpbuf = addr; } + +gdt_entry_t *get_tss_descr(void) +{ + struct descriptor_table_ptr gdt_ptr; + gdt_entry_t *gdt; + + sgdt(&gdt_ptr); + gdt = (gdt_entry_t *)gdt_ptr.base; + return &gdt[str() / 8]; +} + +unsigned long get_gdt_entry_base(gdt_entry_t *entry) +{ + unsigned long base; + base = entry->base1 | ((u32)entry->base2 << 16) | ((u32)entry->base3 << 24); +#ifdef __x86_64__ + if (!entry->s) { + base |= (u64)((struct system_desc64 *)entry)->base4 << 32; + } +#endif + return base; +} + +unsigned long get_gdt_entry_limit(gdt_entry_t *entry) +{ + unsigned long limit; + limit = entry->limit1 | ((u32)entry->limit2 << 16); + if (entry->g) { + limit = (limit << 12) | 0xFFF; + } + return limit; +} diff --git a/lib/x86/desc.h b/lib/x86/desc.h index c339e0e..51148d1 100644 --- a/lib/x86/desc.h +++ b/lib/x86/desc.h @@ -186,30 +186,13 @@ typedef struct { #ifdef __x86_64__ struct system_desc64 { - uint16_t limit1; - uint16_t base1; - uint8_t base2; - union { - uint16_t type_limit_flags; /* Type and limit flags */ - struct { - uint16_t type:4; - uint16_t s:1; - uint16_t dpl:2; - uint16_t p:1; - uint16_t limit2:4; - uint16_t avl:1; - uint16_t l:1; - uint16_t db:1; - uint16_t g:1; - } __attribute__((__packed__)); - } __attribute__((__packed__)); - uint8_t base3; + gdt_entry_t common; uint32_t base4; uint32_t zero; } __attribute__((__packed__)); #endif -#define DESC_BUSY ((uint64_t) 1 << 41) +#define DESC_BUSY 2 extern idt_entry_t boot_idt[256]; @@ -253,4 +236,8 @@ static inline void *get_idt_addr(idt_entry_t *entry) return (void *)addr; } +extern gdt_entry_t *get_tss_descr(void); +extern unsigned long get_gdt_entry_base(gdt_entry_t *entry); +extern unsigned long get_gdt_entry_limit(gdt_entry_t *entry); + #endif diff --git a/x86/cstart64.S b/x86/cstart64.S index 5c6ad38..cf38bae 100644 --- a/x86/cstart64.S +++ b/x86/cstart64.S @@ -4,7 +4,6 @@ .globl boot_idt .globl idt_descr -.globl tss_descr .globl gdt64_desc .globl online_cpus .globl cpu_online_count diff --git a/x86/svm_tests.c b/x86/svm_tests.c index 2fdb0dc..8ad6122 100644 --- a/x86/svm_tests.c +++ b/x86/svm_tests.c @@ -1875,23 +1875,14 @@ static bool reg_corruption_check(struct svm_test *test) static void get_tss_entry(void *data) { - struct descriptor_table_ptr gdt; - gdt_entry_t *gdt_table; - struct system_desc64 *tss_entry; - u16 tr = 0; - - sgdt(&gdt); - tr = str(); - gdt_table = (gdt_entry_t *) gdt.base; - tss_entry = (struct system_desc64 *) &gdt_table[tr / 8]; - *((struct system_desc64 **)data) = tss_entry; + *((gdt_entry_t **)data) = get_tss_descr(); } static int orig_cpu_count; static void init_startup_prepare(struct svm_test *test) { - struct system_desc64 *tss_entry; + gdt_entry_t *tss_entry; int i; on_cpu(1, get_tss_entry, &tss_entry); @@ -1905,7 +1896,7 @@ static void init_startup_prepare(struct svm_test *test) --cpu_online_count; - *(uint64_t *)tss_entry &= ~DESC_BUSY; + tss_entry->type &= ~DESC_BUSY; apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]); diff --git a/x86/taskswitch.c b/x86/taskswitch.c index b6b3451..0fa818d 100644 --- a/x86/taskswitch.c +++ b/x86/taskswitch.c @@ -21,7 +21,7 @@ fault_handler(unsigned long error_code) tss.eip += 2; - gdt32[TSS_MAIN / 8].type &= ~2; + gdt32[TSS_MAIN / 8].type &= ~DESC_BUSY; set_gdt_task_gate(TSS_RETURN, tss_intr.prev); } diff --git a/x86/vmware_backdoors.c b/x86/vmware_backdoors.c index b1433cd..bc10020 100644 --- a/x86/vmware_backdoors.c +++ b/x86/vmware_backdoors.c @@ -132,23 +132,13 @@ struct fault_test vmware_backdoor_tests[] = { */ static void set_tss_ioperm(void) { - struct descriptor_table_ptr gdt; - gdt_entry_t *gdt_table; - struct system_desc64 *tss_entry; - u16 tr = 0; + gdt_entry_t *tss_entry; tss64_t *tss; unsigned char *ioperm_bitmap; - uint64_t tss_base; - - sgdt(&gdt); - tr = str(); - gdt_table = (gdt_entry_t *) gdt.base; - tss_entry = (struct system_desc64 *) &gdt_table[tr / 8]; - tss_base = ((uint64_t) tss_entry->base1 | - ((uint64_t) tss_entry->base2 << 16) | - ((uint64_t) tss_entry->base3 << 24) | - ((uint64_t) tss_entry->base4 << 32)); - tss = (tss64_t *)tss_base; + u16 tr = str(); + + tss_entry = get_tss_descr(); + tss = (tss64_t *)get_gdt_entry_base(tss_entry); tss->iomap_base = sizeof(*tss); ioperm_bitmap = ((unsigned char *)tss+tss->iomap_base); @@ -157,7 +147,7 @@ static void set_tss_ioperm(void) 1 << (RANDOM_IO_PORT % 8); ioperm_bitmap[VMWARE_BACKDOOR_PORT / 8] |= 1 << (VMWARE_BACKDOOR_PORT % 8); - *(uint64_t *)tss_entry &= ~DESC_BUSY; + tss_entry->type &= ~DESC_BUSY; /* Update TSS */ ltr(tr); diff --git a/x86/vmx.c b/x86/vmx.c index 20dc677..d45c6de 100644 --- a/x86/vmx.c +++ b/x86/vmx.c @@ -75,7 +75,6 @@ union vmx_ept_vpid ept_vpid; extern struct descriptor_table_ptr gdt64_desc; extern struct descriptor_table_ptr idt_descr; -extern struct descriptor_table_ptr tss_descr; extern void *vmx_return; extern void *entry_sysenter; extern void *guest_entry; @@ -1275,7 +1274,7 @@ static void init_vmcs_host(void) vmcs_write(HOST_SEL_FS, KERNEL_DS); vmcs_write(HOST_SEL_GS, KERNEL_DS); vmcs_write(HOST_SEL_TR, TSS_MAIN); - vmcs_write(HOST_BASE_TR, tss_descr.base); + vmcs_write(HOST_BASE_TR, get_gdt_entry_base(get_tss_descr())); vmcs_write(HOST_BASE_GDTR, gdt64_desc.base); vmcs_write(HOST_BASE_IDTR, idt_descr.base); vmcs_write(HOST_BASE_FS, 0); @@ -1291,6 +1290,8 @@ static void init_vmcs_host(void) static void init_vmcs_guest(void) { + gdt_entry_t *tss_descr = get_tss_descr(); + /* 26.3 CHECKING AND LOADING GUEST STATE */ ulong guest_cr0, guest_cr4, guest_cr3; /* 26.3.1.1 */ @@ -1331,7 +1332,7 @@ static void init_vmcs_guest(void) vmcs_write(GUEST_BASE_DS, 0); vmcs_write(GUEST_BASE_FS, 0); vmcs_write(GUEST_BASE_GS, 0); - vmcs_write(GUEST_BASE_TR, tss_descr.base); + vmcs_write(GUEST_BASE_TR, get_gdt_entry_base(tss_descr)); vmcs_write(GUEST_BASE_LDTR, 0); vmcs_write(GUEST_LIMIT_CS, 0xFFFFFFFF); @@ -1341,7 +1342,7 @@ static void init_vmcs_guest(void) vmcs_write(GUEST_LIMIT_FS, 0xFFFFFFFF); vmcs_write(GUEST_LIMIT_GS, 0xFFFFFFFF); vmcs_write(GUEST_LIMIT_LDTR, 0xffff); - vmcs_write(GUEST_LIMIT_TR, tss_descr.limit); + vmcs_write(GUEST_LIMIT_TR, get_gdt_entry_limit(tss_descr)); vmcs_write(GUEST_AR_CS, 0xa09b); vmcs_write(GUEST_AR_DS, 0xc093);