From patchwork Wed Jul 19 02:45:53 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Zeng Guang X-Patchwork-Id: 122374 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:c923:0:b0:3e4:2afc:c1 with SMTP id j3csp2183822vqt; Tue, 18 Jul 2023 21:19:21 -0700 (PDT) X-Google-Smtp-Source: APBJJlEcw/PBxpCggglogWRH2aZoW5Iunz6aVDGfSqOcoDL02/WnyWJADlZGCM3XPa+PXPnk2S/P X-Received: by 2002:aa7:d1d9:0:b0:51a:5c1d:5c06 with SMTP id g25-20020aa7d1d9000000b0051a5c1d5c06mr1229624edp.42.1689740361119; Tue, 18 Jul 2023 21:19:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689740361; cv=none; d=google.com; s=arc-20160816; b=hhU4PBVETn1E5Yy2abbSXctHMvQwH6LY9eIP9PBhnYlkwTgHlRngYUgvw/nG8k9j+6 N61efLsp/7UtYj/MYlcpmbTTtsdhElpvyiIiqx/6AGHVXQv6mHRv+VyQR9MBmLCZaQXu Gkk2AyBHtJDHLuX9e+BvwfBw5sIeP1sO9Yj7GHcc+GEdmtAewmEXzNOXQJDx2GUb/sAn hpBVf8VA4Pl3SQ/25d9K0fZovJfwXevpmEcheNpQfh0x7gnrJDoJDgskaM7yE1HFJvJb yw08aylYGSEtr2hvh/bjXz82evGE/EV4nD4pAc1TA4AhBU5M8WWF+jjrmA/3Ai4/YR7o PDZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=rgHLzcVMhIFw1tOXRrc/vXJkxSauVijxB1HLq/hsq8I=; fh=Anq9OfXDpkFCOPFtgh8QgUfzP993MEtJnx/ssiwHMkk=; b=D/Ok26S+cUt1uK24MvYtK5ngkj2dxaVbUbW4RxJDvGfBpjpktCQqGTRL9j1twJ9x7J QKUpCxUPd139sIpsdOjvVZSx6NlX0q/oiUx4unYIASC1/3T8LSNYb0r2pansblSA57CF Rpy5vlgjRw6BQUuqXQiUMwLArejkA5qrrWUI1IijK8UO5UEtvFzPZtXcH4VQegM66iA3 y/E37WNZgmqpIHMTvRt3mLeH/mjJCNICzkpO67NnX+wxE9P/QmbQliZ24DRsG4TFMjbZ c82YLIRMPWDx/vQHrRQnnkCNz5TuJp9M4iuYncV/DERUeogDFeb7BuyHulFnrG2hQK8t zwwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JlWoO4oc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n13-20020aa7db4d000000b0051e3d143815si2225741edt.560.2023.07.18.21.18.57; Tue, 18 Jul 2023 21:19:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JlWoO4oc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230464AbjGSD0F (ORCPT + 99 others); Tue, 18 Jul 2023 23:26:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48368 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229502AbjGSDZx (ORCPT ); Tue, 18 Jul 2023 23:25:53 -0400 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 814611BDD; Tue, 18 Jul 2023 20:25:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1689737152; x=1721273152; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=qeP1TX20L6bDrbjHG7LXoPTITHr/t0Ikc6UPLombWJs=; b=JlWoO4ocGildF4EUkShycmzmJNnVEAXXd3H5blx8h/ZTTzz+f0FbXwCC RPGVKZum1lBepVidFBKtS1uCyMAWCmkVD5Nlt6SQYaBpAJakDuZbZsvz2 dxNJ/EVHWMFbktO3kytItoSjQhfWIX57RQtk1vJOZLFzegCwZoMir3L8w o4Y74KqRzs5WSWLnQnoh2cGMja5Y+MrgH7ca46X/OYH9f51CN5Bd9PBPd axxxSgXH5Jyz1d12d2HdTP8D8dcIF1JcX6e0OCvvKf0PtBTO7LSRuKBBX t8GDFRtObS/XguQQPNwu6o504fIXCjloKeo4qMAcotEwjZWzPxsz69JC3 w==; X-IronPort-AV: E=McAfee;i="6600,9927,10775"; a="346665819" X-IronPort-AV: E=Sophos;i="6.01,215,1684825200"; d="scan'208";a="346665819" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Jul 2023 20:25:52 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10775"; a="813980269" X-IronPort-AV: E=Sophos;i="6.01,215,1684825200"; d="scan'208";a="813980269" Received: from arthur-vostro-3668.sh.intel.com ([10.238.200.123]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Jul 2023 20:25:49 -0700 From: Zeng Guang To: Paolo Bonzini , Sean Christopherson , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , H Peter Anvin , kvm@vger.kernel.org Cc: x86@kernel.org, linux-kernel@vger.kernel.org, Binbin Wu , Zeng Guang Subject: [PATCH v2 3/8] KVM: x86: Add an emulation flag for implicit system access Date: Wed, 19 Jul 2023 10:45:53 +0800 Message-Id: <20230719024558.8539-4-guang.zeng@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20230719024558.8539-1-guang.zeng@intel.com> References: <20230719024558.8539-1-guang.zeng@intel.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1771821188577579241 X-GMAIL-MSGID: 1771821188577579241 From: Binbin Wu Add an emulation flag X86EMUL_F_IMPLICIT to identify the behavior of implicit system access in instruction emulation. Signed-off-by: Binbin Wu Signed-off-by: Zeng Guang --- arch/x86/kvm/kvm_emulate.h | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/kvm_emulate.h b/arch/x86/kvm/kvm_emulate.h index 9fc7d34a4ac1..c0e48f4fa7c4 100644 --- a/arch/x86/kvm/kvm_emulate.h +++ b/arch/x86/kvm/kvm_emulate.h @@ -92,6 +92,7 @@ struct x86_instruction_info { #define X86EMUL_F_WRITE BIT(0) #define X86EMUL_F_FETCH BIT(1) #define X86EMUL_F_BRANCH BIT(2) +#define X86EMUL_F_IMPLICIT BIT(3) struct x86_emulate_ops { void (*vm_bugged)(struct x86_emulate_ctxt *ctxt);