|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 3/3] x86/vmx: Better description of CR4 settings outside of paged mode
This rearanges the logic to avoid the double !hvm_paging_enabled(v) check, but
is otherwise identical.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
CC: Jan Beulich <JBeulich@xxxxxxxx>
CC: Jun Nakajima <jun.nakajima@xxxxxxxxx>
CC: Kevin Tian <kevin.tian@xxxxxxxxx>
---
xen/arch/x86/hvm/vmx/vmx.c | 37 ++++++++++++++++++++++++++++---------
1 file changed, 28 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index 5b943d4..5b9b074 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1642,21 +1642,40 @@ static void vmx_update_guest_cr(struct vcpu *v,
unsigned int cr)
v->arch.hvm_vcpu.hw_cr[4] |= v->arch.hvm_vcpu.guest_cr[4];
if ( v->arch.hvm_vmx.vmx_realmode )
v->arch.hvm_vcpu.hw_cr[4] |= X86_CR4_VME;
- if ( paging_mode_hap(v->domain) && !hvm_paging_enabled(v) )
- {
- v->arch.hvm_vcpu.hw_cr[4] |= X86_CR4_PSE;
- v->arch.hvm_vcpu.hw_cr[4] &= ~X86_CR4_PAE;
- }
+
if ( !hvm_paging_enabled(v) )
{
/*
- * SMEP/SMAP is disabled if CPU is in non-paging mode in hardware.
- * However Xen always uses paging mode to emulate guest non-paging
- * mode. To emulate this behavior, SMEP/SMAP needs to be manually
- * disabled when guest VCPU is in non-paging mode.
+ * When the guest thinks paging is disabled, Xen may need to hide
+ * the effects of running with CR0.PG actually enabled. There are
+ * two subtly complicated cases.
+ */
+
+ if ( paging_mode_hap(v->domain) )
+ {
+ /*
+ * On hardware lacking the Unrestricted Guest feature (or with
+ * it disabled in the VMCS), we may not enter the guest with
+ * CR0.PG actually disabled. When EPT is enabled, we run with
+ * guest paging settings, but with CR3 pointing at
+ * HVM_PARAM_IDENT_PT which is a 32bit pagetable using 4M
+ * superpages. Override the guests paging settings to match.
+ */
+ v->arch.hvm_vcpu.hw_cr[4] |= X86_CR4_PSE;
+ v->arch.hvm_vcpu.hw_cr[4] &= ~X86_CR4_PAE;
+ }
+
+ /*
+ * Without CR0.PG, all memory accesses are user mode, so
+ * _PAGE_USER must be set in the pagetables for guest userspace to
+ * function. This in turn trips up guest supervisor mode if
+ * SMEP/SMAP are left active in context. They wouldn't have any
+ * effect if paging was actually disabled, so hide them behind the
+ * back of the guest.
*/
v->arch.hvm_vcpu.hw_cr[4] &= ~(X86_CR4_SMEP | X86_CR4_SMAP);
}
+
__vmwrite(GUEST_CR4, v->arch.hvm_vcpu.hw_cr[4]);
break;
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |