[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1584503298-18731-1-git-send-email-luwei.kang@intel.com>
Date: Wed, 18 Mar 2020 11:48:18 +0800
From: Luwei Kang <luwei.kang@...el.com>
To: kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Cc: pbonzini@...hat.com, sean.j.christopherson@...el.com,
vkuznets@...hat.com, wanpengli@...cent.com, jmattson@...gle.com,
joro@...tes.org, Luwei Kang <luwei.kang@...el.com>
Subject: [PATCH] KVM: VMX: Disable Intel PT before VM-entry
If the logical processor is operating with Intel PT enabled (
IA32_RTIT_CTL.TraceEn = 1) at the time of VM entry, the “load
IA32_RTIT_CTL” VM-entry control must be 0(SDM 26.2.1.1).
The first disabled the host Intel PT(Clear TraceEn) will make all the
buffered packets are flushed out of the processor and it may cause
an Intel PT PMI. The host Intel PT will be re-enabled in the host Intel
PT PMI handler.
handle_pmi_common()
-> intel_pt_interrupt()
-> pt_config_start()
This patch will disable the Intel PT twice to make sure the Intel PT
is disabled before VM-Entry.
Signed-off-by: Luwei Kang <luwei.kang@...el.com>
---
arch/x86/kvm/vmx/vmx.c | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 26f8f31..d936a91 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -1095,6 +1095,8 @@ static inline void pt_save_msr(struct pt_ctx *ctx, u32 addr_range)
static void pt_guest_enter(struct vcpu_vmx *vmx)
{
+ u64 rtit_ctl;
+
if (pt_mode == PT_MODE_SYSTEM)
return;
@@ -1103,8 +1105,14 @@ static void pt_guest_enter(struct vcpu_vmx *vmx)
* Save host state before VM entry.
*/
rdmsrl(MSR_IA32_RTIT_CTL, vmx->pt_desc.host.ctl);
- if (vmx->pt_desc.guest.ctl & RTIT_CTL_TRACEEN) {
+ if (vmx->pt_desc.host.ctl & RTIT_CTL_TRACEEN) {
wrmsrl(MSR_IA32_RTIT_CTL, 0);
+ rdmsrl(MSR_IA32_RTIT_CTL, rtit_ctl);
+ if (rtit_ctl)
+ wrmsrl(MSR_IA32_RTIT_CTL, 0);
+ }
+
+ if (vmx->pt_desc.guest.ctl & RTIT_CTL_TRACEEN) {
pt_save_msr(&vmx->pt_desc.host, vmx->pt_desc.addr_range);
pt_load_msr(&vmx->pt_desc.guest, vmx->pt_desc.addr_range);
}
--
1.8.3.1
Powered by blists - more mailing lists