On Fri, Mar 15, 2013 at 08:38:56AM +0100, Jan Kiszka wrote:
> From: Jan Kiszka <[email protected]>
>
> Very old user space (namely qemu-kvm before kvm-49) didn't set the TSS
> base before running the VCPU. We always warned about this bug, but no
> reports about users actually seeing this are known. Time to finally
> remove the workaround that effectively prevented to call vmx_vcpu_reset
> while already holding the KVM srcu lock.
>
> Signed-off-by: Jan Kiszka <[email protected]>
Reviewed-by: Gleb Natapov <[email protected]>
> ---
>
> This obsoletes all other attempts to allow vmx_vcpu_reset to be called
> with the srcu lock held. Hope we can settle the topic this way.
>
> arch/x86/kvm/vmx.c | 30 ++++--------------------------
> 1 files changed, 4 insertions(+), 26 deletions(-)
>
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 958ac3a..310bd00 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -2898,22 +2898,6 @@ static void enter_pmode(struct kvm_vcpu *vcpu)
> vmx->cpl = 0;
> }
>
> -static gva_t rmode_tss_base(struct kvm *kvm)
> -{
> - if (!kvm->arch.tss_addr) {
> - struct kvm_memslots *slots;
> - struct kvm_memory_slot *slot;
> - gfn_t base_gfn;
> -
> - slots = kvm_memslots(kvm);
> - slot = id_to_memslot(slots, 0);
> - base_gfn = slot->base_gfn + slot->npages - 3;
> -
> - return base_gfn << PAGE_SHIFT;
> - }
> - return kvm->arch.tss_addr;
> -}
> -
> static void fix_rmode_seg(int seg, struct kvm_segment *save)
> {
> const struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];
> @@ -2964,19 +2948,15 @@ static void enter_rmode(struct kvm_vcpu *vcpu)
>
> /*
> * Very old userspace does not call KVM_SET_TSS_ADDR before entering
> - * vcpu. Call it here with phys address pointing 16M below 4G.
> + * vcpu. Warn the user that an update is overdue.
> */
> - if (!vcpu->kvm->arch.tss_addr) {
> + if (!vcpu->kvm->arch.tss_addr)
> printk_once(KERN_WARNING "kvm: KVM_SET_TSS_ADDR need to be "
> "called before entering vcpu\n");
> - srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
> - vmx_set_tss_addr(vcpu->kvm, 0xfeffd000);
> - vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
> - }
>
> vmx_segment_cache_clear(vmx);
>
> - vmcs_writel(GUEST_TR_BASE, rmode_tss_base(vcpu->kvm));
> + vmcs_writel(GUEST_TR_BASE, vcpu->kvm->arch.tss_addr);
> vmcs_write32(GUEST_TR_LIMIT, RMODE_TSS_SIZE - 1);
> vmcs_write32(GUEST_TR_AR_BYTES, 0x008b);
>
> @@ -3623,7 +3603,7 @@ static int init_rmode_tss(struct kvm *kvm)
> int r, idx, ret = 0;
>
> idx = srcu_read_lock(&kvm->srcu);
> - fn = rmode_tss_base(kvm) >> PAGE_SHIFT;
> + fn = kvm->arch.tss_addr >> PAGE_SHIFT;
> r = kvm_clear_guest_page(kvm, fn, 0, PAGE_SIZE);
> if (r < 0)
> goto out;
> @@ -4190,9 +4170,7 @@ static void vmx_vcpu_reset(struct kvm_vcpu *vcpu)
> vmcs_write16(VIRTUAL_PROCESSOR_ID, vmx->vpid);
>
> vmx->vcpu.arch.cr0 = X86_CR0_NW | X86_CR0_CD | X86_CR0_ET;
> - vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
> vmx_set_cr0(&vmx->vcpu, kvm_read_cr0(vcpu)); /* enter rmode */
> - srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
> vmx_set_cr4(&vmx->vcpu, 0);
> vmx_set_efer(&vmx->vcpu, 0);
> vmx_fpu_activate(&vmx->vcpu);
> --
> 1.7.3.4
--
Gleb.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html