From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C910BC31E40 for ; Fri, 9 Aug 2019 16:15:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 7E1EA2086A for ; Fri, 9 Aug 2019 16:15:03 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437104AbfHIQPC (ORCPT ); Fri, 9 Aug 2019 12:15:02 -0400 Received: from mx01.bbu.dsd.mx.bitdefender.com ([91.199.104.161]:52908 "EHLO mx01.bbu.dsd.mx.bitdefender.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437013AbfHIQPB (ORCPT ); Fri, 9 Aug 2019 12:15:01 -0400 Received: from smtp.bitdefender.com (smtp02.buh.bitdefender.net [10.17.80.76]) by mx01.bbu.dsd.mx.bitdefender.com (Postfix) with ESMTPS id 5F04F305D34D; Fri, 9 Aug 2019 19:01:21 +0300 (EEST) Received: from localhost.localdomain (unknown [89.136.169.210]) by smtp.bitdefender.com (Postfix) with ESMTPSA id 188D8305B7A0; Fri, 9 Aug 2019 19:01:21 +0300 (EEST) From: =?UTF-8?q?Adalbert=20Laz=C4=83r?= To: kvm@vger.kernel.org Cc: linux-mm@kvack.org, virtualization@lists.linux-foundation.org, Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Konrad Rzeszutek Wilk , Tamas K Lengyel , Mathieu Tarral , =?UTF-8?q?Samuel=20Laur=C3=A9n?= , Patrick Colp , Jan Kiszka , Stefan Hajnoczi , Weijiang Yang , Zhang@vger.kernel.org, Yu C , =?UTF-8?q?Mihai=20Don=C8=9Bu?= , =?UTF-8?q?Adalbert=20Laz=C4=83r?= , Marian Rotariu Subject: [RFC PATCH v6 52/92] kvm: introspection: add KVMI_GET_CPUID Date: Fri, 9 Aug 2019 19:00:07 +0300 Message-Id: <20190809160047.8319-53-alazar@bitdefender.com> In-Reply-To: <20190809160047.8319-1-alazar@bitdefender.com> References: <20190809160047.8319-1-alazar@bitdefender.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org From: Marian Rotariu This command returns a CPUID leaf (as seen by the guest OS). Signed-off-by: Marian Rotariu Signed-off-by: Adalbert Lazăr --- Documentation/virtual/kvm/kvmi.rst | 36 ++++++++++++++++++++++++++++++ arch/x86/include/uapi/asm/kvmi.h | 12 ++++++++++ arch/x86/kvm/kvmi.c | 19 ++++++++++++++++ include/uapi/linux/kvm_para.h | 1 + virt/kvm/kvmi_int.h | 3 +++ virt/kvm/kvmi_msg.c | 16 +++++++++++++ 6 files changed, 87 insertions(+) diff --git a/Documentation/virtual/kvm/kvmi.rst b/Documentation/virtual/kvm/kvmi.rst index b6722d071ab7..9e15132ed976 100644 --- a/Documentation/virtual/kvm/kvmi.rst +++ b/Documentation/virtual/kvm/kvmi.rst @@ -933,6 +933,42 @@ currently being handled is replied to. * -KVM_EINVAL - padding is not zero * -KVM_EAGAIN - the selected vCPU can't be introspected yet +19. KVMI_GET_CPUID +------------------ + +:Architectures: x86 +:Versions: >= 1 +:Parameters: + +:: + + struct kvmi_vcpu_hdr; + struct kvmi_get_cpuid { + __u32 function; + __u32 index; + }; + +:Returns: + +:: + + struct kvmi_error_code; + struct kvmi_get_cpuid_reply { + __u32 eax; + __u32 ebx; + __u32 ecx; + __u32 edx; + }; + +Returns a CPUID leaf (as seen by the guest OS). + +:Errors: + +* -KVM_EINVAL - the selected vCPU is invalid +* -KVM_EINVAL - padding is not zero +* -KVM_EAGAIN - the selected vCPU can't be introspected yet +* -KVM_ENOENT - the selected leaf is not present or is invalid + Events ====== diff --git a/arch/x86/include/uapi/asm/kvmi.h b/arch/x86/include/uapi/asm/kvmi.h index 98fb27e1273c..fa2719226198 100644 --- a/arch/x86/include/uapi/asm/kvmi.h +++ b/arch/x86/include/uapi/asm/kvmi.h @@ -41,4 +41,16 @@ struct kvmi_get_registers_reply { struct kvm_msrs msrs; }; +struct kvmi_get_cpuid { + __u32 function; + __u32 index; +}; + +struct kvmi_get_cpuid_reply { + __u32 eax; + __u32 ebx; + __u32 ecx; + __u32 edx; +}; + #endif /* _UAPI_ASM_X86_KVMI_H */ diff --git a/arch/x86/kvm/kvmi.c b/arch/x86/kvm/kvmi.c index a78771b21d2f..4615bbe9c0db 100644 --- a/arch/x86/kvm/kvmi.c +++ b/arch/x86/kvm/kvmi.c @@ -5,6 +5,7 @@ * Copyright (C) 2019 Bitdefender S.R.L. */ #include "x86.h" +#include "cpuid.h" #include "../../../virt/kvm/kvmi_int.h" static void *alloc_get_registers_reply(const struct kvmi_msg_hdr *msg, @@ -211,6 +212,24 @@ bool kvmi_arch_pf_event(struct kvm_vcpu *vcpu, gpa_t gpa, gva_t gva, return ret; } +int kvmi_arch_cmd_get_cpuid(struct kvm_vcpu *vcpu, + const struct kvmi_get_cpuid *req, + struct kvmi_get_cpuid_reply *rpl) +{ + struct kvm_cpuid_entry2 *e; + + e = kvm_find_cpuid_entry(vcpu, req->function, req->index); + if (!e) + return -KVM_ENOENT; + + rpl->eax = e->eax; + rpl->ebx = e->ebx; + rpl->ecx = e->ecx; + rpl->edx = e->edx; + + return 0; +} + int kvmi_arch_cmd_get_vcpu_info(struct kvm_vcpu *vcpu, struct kvmi_get_vcpu_info_reply *rpl) { diff --git a/include/uapi/linux/kvm_para.h b/include/uapi/linux/kvm_para.h index 07e3f2662b36..553f168331a4 100644 --- a/include/uapi/linux/kvm_para.h +++ b/include/uapi/linux/kvm_para.h @@ -19,6 +19,7 @@ #define KVM_EOPNOTSUPP 95 #define KVM_EAGAIN 11 #define KVM_EBUSY EBUSY +#define KVM_ENOENT ENOENT #define KVM_ENOMEM ENOMEM #define KVM_HC_VAPIC_POLL_IRQ 1 diff --git a/virt/kvm/kvmi_int.h b/virt/kvm/kvmi_int.h index 7bc3dd1f2298..22508d147495 100644 --- a/virt/kvm/kvmi_int.h +++ b/virt/kvm/kvmi_int.h @@ -230,6 +230,9 @@ int kvmi_arch_cmd_set_page_write_bitmap(struct kvmi *ikvm, void kvmi_arch_setup_event(struct kvm_vcpu *vcpu, struct kvmi_event *ev); bool kvmi_arch_pf_event(struct kvm_vcpu *vcpu, gpa_t gpa, gva_t gva, u8 access); +int kvmi_arch_cmd_get_cpuid(struct kvm_vcpu *vcpu, + const struct kvmi_get_cpuid *req, + struct kvmi_get_cpuid_reply *rpl); int kvmi_arch_cmd_get_vcpu_info(struct kvm_vcpu *vcpu, struct kvmi_get_vcpu_info_reply *rpl); diff --git a/virt/kvm/kvmi_msg.c b/virt/kvm/kvmi_msg.c index 355cec70a28d..9548042de618 100644 --- a/virt/kvm/kvmi_msg.c +++ b/virt/kvm/kvmi_msg.c @@ -29,6 +29,7 @@ static const char *const msg_IDs[] = { [KVMI_CONTROL_VM_EVENTS] = "KVMI_CONTROL_VM_EVENTS", [KVMI_EVENT] = "KVMI_EVENT", [KVMI_EVENT_REPLY] = "KVMI_EVENT_REPLY", + [KVMI_GET_CPUID] = "KVMI_GET_CPUID", [KVMI_GET_GUEST_INFO] = "KVMI_GET_GUEST_INFO", [KVMI_GET_PAGE_ACCESS] = "KVMI_GET_PAGE_ACCESS", [KVMI_GET_PAGE_WRITE_BITMAP] = "KVMI_GET_PAGE_WRITE_BITMAP", @@ -641,6 +642,20 @@ static int handle_control_events(struct kvm_vcpu *vcpu, return reply_cb(vcpu, msg, ec, NULL, 0); } +static int handle_get_cpuid(struct kvm_vcpu *vcpu, + const struct kvmi_msg_hdr *msg, + const void *req, vcpu_reply_fct reply_cb) +{ + struct kvmi_get_cpuid_reply rpl; + int ec; + + memset(&rpl, 0, sizeof(rpl)); + + ec = kvmi_arch_cmd_get_cpuid(vcpu, req, &rpl); + + return reply_cb(vcpu, msg, ec, &rpl, sizeof(rpl)); +} + /* * These commands are executed on the vCPU thread. The receiving thread * passes the messages using a newly allocated 'struct kvmi_vcpu_cmd' @@ -652,6 +667,7 @@ static int(*const msg_vcpu[])(struct kvm_vcpu *, vcpu_reply_fct) = { [KVMI_CONTROL_EVENTS] = handle_control_events, [KVMI_EVENT_REPLY] = handle_event_reply, + [KVMI_GET_CPUID] = handle_get_cpuid, [KVMI_GET_REGISTERS] = handle_get_registers, [KVMI_GET_VCPU_INFO] = handle_get_vcpu_info, [KVMI_SET_REGISTERS] = handle_set_registers, From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 66B6CC31E40 for ; Fri, 9 Aug 2019 16:03:37 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 10F4C2089E for ; Fri, 9 Aug 2019 16:03:37 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 10F4C2089E Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=bitdefender.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 574F16B028F; Fri, 9 Aug 2019 12:01:24 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 525556B0290; Fri, 9 Aug 2019 12:01:24 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 43C646B0291; Fri, 9 Aug 2019 12:01:24 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) by kanga.kvack.org (Postfix) with ESMTP id E67B96B028F for ; Fri, 9 Aug 2019 12:01:23 -0400 (EDT) Received: by mail-wm1-f69.google.com with SMTP id u19so1066829wmj.0 for ; Fri, 09 Aug 2019 09:01:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-original-authentication-results:x-gm-message-state:from:to:cc :subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=7BNbmmYb0LYug5NNEj0pkakD1AOCFOxbWBtCrPsCeHk=; b=Qt17J6x42uid8h6GvY+PUlq/kdyJRyzbn6aDoOTGYx7FIfM7lRpbzATXvTwCiJIVjI uE2dDiXkL703vlqWZYHlPyDO2SP1ZpdpeyvISiht64GESB8Sw22h5IPv9z+M0zd84Y9B uiR/0YzK7pNVNmaLBQkohj9nMvJVZTyr9CXjHHbGMYtM47M9H91z+1vW/RFrxzxpkDj3 sGLpqTesRQMpWDsqyXUFpXGe/Tw9Kln9oxZFDcpMAXzzFCQTYCqIXHuOwPa6EX7xsjHV ztvuy72MAbaSdE9qoQrAbzKUItuvUG6Du/04VSabljEEcfAPjkKNhvf7H/8prk8oJ85y aW0Q== X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of alazar@bitdefender.com designates 91.199.104.161 as permitted sender) smtp.mailfrom=alazar@bitdefender.com X-Gm-Message-State: APjAAAUavgehla4AUKOyWbWN5XTq/parDy2eJXrLoMCuHPNKQnpQ59si ipUNiHEAW4dV/MxefLk92LHdvB2jV9imRilWmk5wqknGo6G18kOZ8DY7H9xGEEvQ1m/PJI2DliX +jypR+54JuB0nGKkCf2T70hWGUkjYN2Gj0VXdJspGjf9BsjqKXclf2ufLA+/0Fw/t0g== X-Received: by 2002:adf:eec5:: with SMTP id a5mr1709290wrp.352.1565366483503; Fri, 09 Aug 2019 09:01:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqxDp1xSMVM5fMsaQdbEt3KP4LIpta1dEuXk3/U/ZQGOBSvvKVc/j+MsyzuPYDNG9v2hdhCB X-Received: by 2002:adf:eec5:: with SMTP id a5mr1709147wrp.352.1565366481985; Fri, 09 Aug 2019 09:01:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565366481; cv=none; d=google.com; s=arc-20160816; b=PLrH82K24AgpJDaNTOQwcH3eZQTU7UuNF/ec1LUiz6KAElC8d3mghPHkctMuaMS3uY E1WSQnAGeQZNF/P7o3Fg2OkgDBG+VD/rqOF5k83dJzjvc5CdwKvIUDCc1vBh4vxHuVwa DS4zTC94MS4Ak8No/TTUnkjqcNkXMMT5e1kagidMpbEFo4d2+zUInUBm/VVQH8o1uX4b I3Ng/DWZOelM5yI0Lozbrt2sd7mnKhnELST3pNwsyKWZe+MB2dZSs+ACNhC43Twf4eM3 UyMx9+uqZWM4pEJ8hx3otVDoFz36xFGTRc4dsXrX6vOqf888Z00rk59OTf9UxNTE/zIi s/3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=7BNbmmYb0LYug5NNEj0pkakD1AOCFOxbWBtCrPsCeHk=; b=F/mn1Bo2ygolCygD+5A2OSv5KzZnzu5sE+Uqp0kKvraxRwji2CIn/a1RWkoblzCRVZ 9ZR0X9ZmPUyeEUfRZrWeVLAyEtXqQo/UNVYWddupsPj/GYlTN+MSB1OkCEf1ejLpPVZd /TKqKoofpG/T9FJtniPug2ULQ/YcKPEDWqJvbfOqQWv/mJhHuB6PjMAXiT8DJzyryYWy de5aBEHSEMqVtYWiNf6SEU32GN8dRSnczrQGARvak6OGuVpIlEkYDPOmUiFJUIsPLk5e UJjZE1/ZRvVHDiux7cKPWPmHjVcXro8Q6xXZzIHdy93oC/9CTZbqJlUNCju3R/xUFOyN Y08g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of alazar@bitdefender.com designates 91.199.104.161 as permitted sender) smtp.mailfrom=alazar@bitdefender.com Received: from mx01.bbu.dsd.mx.bitdefender.com (mx01.bbu.dsd.mx.bitdefender.com. [91.199.104.161]) by mx.google.com with ESMTPS id i11si3852396wrr.434.2019.08.09.09.01.21 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 09 Aug 2019 09:01:21 -0700 (PDT) Received-SPF: pass (google.com: domain of alazar@bitdefender.com designates 91.199.104.161 as permitted sender) client-ip=91.199.104.161; Authentication-Results: mx.google.com; spf=pass (google.com: domain of alazar@bitdefender.com designates 91.199.104.161 as permitted sender) smtp.mailfrom=alazar@bitdefender.com Received: from smtp.bitdefender.com (smtp02.buh.bitdefender.net [10.17.80.76]) by mx01.bbu.dsd.mx.bitdefender.com (Postfix) with ESMTPS id 5F04F305D34D; Fri, 9 Aug 2019 19:01:21 +0300 (EEST) Received: from localhost.localdomain (unknown [89.136.169.210]) by smtp.bitdefender.com (Postfix) with ESMTPSA id 188D8305B7A0; Fri, 9 Aug 2019 19:01:21 +0300 (EEST) From: =?UTF-8?q?Adalbert=20Laz=C4=83r?= To: kvm@vger.kernel.org Cc: linux-mm@kvack.org, virtualization@lists.linux-foundation.org, Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Konrad Rzeszutek Wilk , Tamas K Lengyel , Mathieu Tarral , =?UTF-8?q?Samuel=20Laur=C3=A9n?= , Patrick Colp , Jan Kiszka , Stefan Hajnoczi , Weijiang Yang , Zhang@kvack.org, Yu C , =?UTF-8?q?Mihai=20Don=C8=9Bu?= , =?UTF-8?q?Adalbert=20Laz=C4=83r?= , Marian Rotariu Subject: [RFC PATCH v6 52/92] kvm: introspection: add KVMI_GET_CPUID Date: Fri, 9 Aug 2019 19:00:07 +0300 Message-Id: <20190809160047.8319-53-alazar@bitdefender.com> In-Reply-To: <20190809160047.8319-1-alazar@bitdefender.com> References: <20190809160047.8319-1-alazar@bitdefender.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Marian Rotariu This command returns a CPUID leaf (as seen by the guest OS). Signed-off-by: Marian Rotariu Signed-off-by: Adalbert Lazăr --- Documentation/virtual/kvm/kvmi.rst | 36 ++++++++++++++++++++++++++++++ arch/x86/include/uapi/asm/kvmi.h | 12 ++++++++++ arch/x86/kvm/kvmi.c | 19 ++++++++++++++++ include/uapi/linux/kvm_para.h | 1 + virt/kvm/kvmi_int.h | 3 +++ virt/kvm/kvmi_msg.c | 16 +++++++++++++ 6 files changed, 87 insertions(+) diff --git a/Documentation/virtual/kvm/kvmi.rst b/Documentation/virtual/kvm/kvmi.rst index b6722d071ab7..9e15132ed976 100644 --- a/Documentation/virtual/kvm/kvmi.rst +++ b/Documentation/virtual/kvm/kvmi.rst @@ -933,6 +933,42 @@ currently being handled is replied to. * -KVM_EINVAL - padding is not zero * -KVM_EAGAIN - the selected vCPU can't be introspected yet +19. KVMI_GET_CPUID +------------------ + +:Architectures: x86 +:Versions: >= 1 +:Parameters: + +:: + + struct kvmi_vcpu_hdr; + struct kvmi_get_cpuid { + __u32 function; + __u32 index; + }; + +:Returns: + +:: + + struct kvmi_error_code; + struct kvmi_get_cpuid_reply { + __u32 eax; + __u32 ebx; + __u32 ecx; + __u32 edx; + }; + +Returns a CPUID leaf (as seen by the guest OS). + +:Errors: + +* -KVM_EINVAL - the selected vCPU is invalid +* -KVM_EINVAL - padding is not zero +* -KVM_EAGAIN - the selected vCPU can't be introspected yet +* -KVM_ENOENT - the selected leaf is not present or is invalid + Events ====== diff --git a/arch/x86/include/uapi/asm/kvmi.h b/arch/x86/include/uapi/asm/kvmi.h index 98fb27e1273c..fa2719226198 100644 --- a/arch/x86/include/uapi/asm/kvmi.h +++ b/arch/x86/include/uapi/asm/kvmi.h @@ -41,4 +41,16 @@ struct kvmi_get_registers_reply { struct kvm_msrs msrs; }; +struct kvmi_get_cpuid { + __u32 function; + __u32 index; +}; + +struct kvmi_get_cpuid_reply { + __u32 eax; + __u32 ebx; + __u32 ecx; + __u32 edx; +}; + #endif /* _UAPI_ASM_X86_KVMI_H */ diff --git a/arch/x86/kvm/kvmi.c b/arch/x86/kvm/kvmi.c index a78771b21d2f..4615bbe9c0db 100644 --- a/arch/x86/kvm/kvmi.c +++ b/arch/x86/kvm/kvmi.c @@ -5,6 +5,7 @@ * Copyright (C) 2019 Bitdefender S.R.L. */ #include "x86.h" +#include "cpuid.h" #include "../../../virt/kvm/kvmi_int.h" static void *alloc_get_registers_reply(const struct kvmi_msg_hdr *msg, @@ -211,6 +212,24 @@ bool kvmi_arch_pf_event(struct kvm_vcpu *vcpu, gpa_t gpa, gva_t gva, return ret; } +int kvmi_arch_cmd_get_cpuid(struct kvm_vcpu *vcpu, + const struct kvmi_get_cpuid *req, + struct kvmi_get_cpuid_reply *rpl) +{ + struct kvm_cpuid_entry2 *e; + + e = kvm_find_cpuid_entry(vcpu, req->function, req->index); + if (!e) + return -KVM_ENOENT; + + rpl->eax = e->eax; + rpl->ebx = e->ebx; + rpl->ecx = e->ecx; + rpl->edx = e->edx; + + return 0; +} + int kvmi_arch_cmd_get_vcpu_info(struct kvm_vcpu *vcpu, struct kvmi_get_vcpu_info_reply *rpl) { diff --git a/include/uapi/linux/kvm_para.h b/include/uapi/linux/kvm_para.h index 07e3f2662b36..553f168331a4 100644 --- a/include/uapi/linux/kvm_para.h +++ b/include/uapi/linux/kvm_para.h @@ -19,6 +19,7 @@ #define KVM_EOPNOTSUPP 95 #define KVM_EAGAIN 11 #define KVM_EBUSY EBUSY +#define KVM_ENOENT ENOENT #define KVM_ENOMEM ENOMEM #define KVM_HC_VAPIC_POLL_IRQ 1 diff --git a/virt/kvm/kvmi_int.h b/virt/kvm/kvmi_int.h index 7bc3dd1f2298..22508d147495 100644 --- a/virt/kvm/kvmi_int.h +++ b/virt/kvm/kvmi_int.h @@ -230,6 +230,9 @@ int kvmi_arch_cmd_set_page_write_bitmap(struct kvmi *ikvm, void kvmi_arch_setup_event(struct kvm_vcpu *vcpu, struct kvmi_event *ev); bool kvmi_arch_pf_event(struct kvm_vcpu *vcpu, gpa_t gpa, gva_t gva, u8 access); +int kvmi_arch_cmd_get_cpuid(struct kvm_vcpu *vcpu, + const struct kvmi_get_cpuid *req, + struct kvmi_get_cpuid_reply *rpl); int kvmi_arch_cmd_get_vcpu_info(struct kvm_vcpu *vcpu, struct kvmi_get_vcpu_info_reply *rpl); diff --git a/virt/kvm/kvmi_msg.c b/virt/kvm/kvmi_msg.c index 355cec70a28d..9548042de618 100644 --- a/virt/kvm/kvmi_msg.c +++ b/virt/kvm/kvmi_msg.c @@ -29,6 +29,7 @@ static const char *const msg_IDs[] = { [KVMI_CONTROL_VM_EVENTS] = "KVMI_CONTROL_VM_EVENTS", [KVMI_EVENT] = "KVMI_EVENT", [KVMI_EVENT_REPLY] = "KVMI_EVENT_REPLY", + [KVMI_GET_CPUID] = "KVMI_GET_CPUID", [KVMI_GET_GUEST_INFO] = "KVMI_GET_GUEST_INFO", [KVMI_GET_PAGE_ACCESS] = "KVMI_GET_PAGE_ACCESS", [KVMI_GET_PAGE_WRITE_BITMAP] = "KVMI_GET_PAGE_WRITE_BITMAP", @@ -641,6 +642,20 @@ static int handle_control_events(struct kvm_vcpu *vcpu, return reply_cb(vcpu, msg, ec, NULL, 0); } +static int handle_get_cpuid(struct kvm_vcpu *vcpu, + const struct kvmi_msg_hdr *msg, + const void *req, vcpu_reply_fct reply_cb) +{ + struct kvmi_get_cpuid_reply rpl; + int ec; + + memset(&rpl, 0, sizeof(rpl)); + + ec = kvmi_arch_cmd_get_cpuid(vcpu, req, &rpl); + + return reply_cb(vcpu, msg, ec, &rpl, sizeof(rpl)); +} + /* * These commands are executed on the vCPU thread. The receiving thread * passes the messages using a newly allocated 'struct kvmi_vcpu_cmd' @@ -652,6 +667,7 @@ static int(*const msg_vcpu[])(struct kvm_vcpu *, vcpu_reply_fct) = { [KVMI_CONTROL_EVENTS] = handle_control_events, [KVMI_EVENT_REPLY] = handle_event_reply, + [KVMI_GET_CPUID] = handle_get_cpuid, [KVMI_GET_REGISTERS] = handle_get_registers, [KVMI_GET_VCPU_INFO] = handle_get_vcpu_info, [KVMI_SET_REGISTERS] = handle_set_registers, From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?q?Adalbert=20Laz=C4=83r?= Subject: [RFC PATCH v6 52/92] kvm: introspection: add KVMI_GET_CPUID Date: Fri, 9 Aug 2019 19:00:07 +0300 Message-ID: <20190809160047.8319-53-alazar@bitdefender.com> References: <20190809160047.8319-1-alazar@bitdefender.com> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: In-Reply-To: <20190809160047.8319-1-alazar@bitdefender.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: virtualization-bounces@lists.linux-foundation.org Errors-To: virtualization-bounces@lists.linux-foundation.org To: kvm@vger.kernel.org Cc: Tamas K Lengyel , Weijiang Yang , Yu C , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Jan Kiszka , =?UTF-8?q?Samuel=20Laur=C3=A9n?= , Konrad Rzeszutek Wilk , Marian Rotariu , virtualization@lists.linux-foundation.org, =?UTF-8?q?Adalbert=20Laz=C4=83r?= , linux-mm@kvack.org, Patrick Colp , Mathieu Tarral , Stefan Hajnoczi , Paolo Bonzini , Zhang@mail.linuxfoundation.org, =?UTF-8?q?Mihai=20Don=C8=9Bu?= List-Id: virtualization@lists.linuxfoundation.org RnJvbTogTWFyaWFuIFJvdGFyaXUgPG1hcmlhbi5jLnJvdGFyaXVAZ21haWwuY29tPgoKVGhpcyBj b21tYW5kIHJldHVybnMgYSBDUFVJRCBsZWFmIChhcyBzZWVuIGJ5IHRoZSBndWVzdCBPUykuCgpT aWduZWQtb2ZmLWJ5OiBNYXJpYW4gUm90YXJpdSA8bWFyaWFuLmMucm90YXJpdUBnbWFpbC5jb20+ ClNpZ25lZC1vZmYtYnk6IEFkYWxiZXJ0IExhesSDciA8YWxhemFyQGJpdGRlZmVuZGVyLmNvbT4K LS0tCiBEb2N1bWVudGF0aW9uL3ZpcnR1YWwva3ZtL2t2bWkucnN0IHwgMzYgKysrKysrKysrKysr KysrKysrKysrKysrKysrKysrCiBhcmNoL3g4Ni9pbmNsdWRlL3VhcGkvYXNtL2t2bWkuaCAgIHwg MTIgKysrKysrKysrKwogYXJjaC94ODYva3ZtL2t2bWkuYyAgICAgICAgICAgICAgICB8IDE5ICsr KysrKysrKysrKysrKysKIGluY2x1ZGUvdWFwaS9saW51eC9rdm1fcGFyYS5oICAgICAgfCAgMSAr CiB2aXJ0L2t2bS9rdm1pX2ludC5oICAgICAgICAgICAgICAgIHwgIDMgKysrCiB2aXJ0L2t2bS9r dm1pX21zZy5jICAgICAgICAgICAgICAgIHwgMTYgKysrKysrKysrKysrKwogNiBmaWxlcyBjaGFu Z2VkLCA4NyBpbnNlcnRpb25zKCspCgpkaWZmIC0tZ2l0IGEvRG9jdW1lbnRhdGlvbi92aXJ0dWFs L2t2bS9rdm1pLnJzdCBiL0RvY3VtZW50YXRpb24vdmlydHVhbC9rdm0va3ZtaS5yc3QKaW5kZXgg YjY3MjJkMDcxYWI3Li45ZTE1MTMyZWQ5NzYgMTAwNjQ0Ci0tLSBhL0RvY3VtZW50YXRpb24vdmly dHVhbC9rdm0va3ZtaS5yc3QKKysrIGIvRG9jdW1lbnRhdGlvbi92aXJ0dWFsL2t2bS9rdm1pLnJz dApAQCAtOTMzLDYgKzkzMyw0MiBAQCBjdXJyZW50bHkgYmVpbmcgaGFuZGxlZCBpcyByZXBsaWVk IHRvLgogKiAtS1ZNX0VJTlZBTCAtIHBhZGRpbmcgaXMgbm90IHplcm8KICogLUtWTV9FQUdBSU4g LSB0aGUgc2VsZWN0ZWQgdkNQVSBjYW4ndCBiZSBpbnRyb3NwZWN0ZWQgeWV0CiAKKzE5LiBLVk1J X0dFVF9DUFVJRAorLS0tLS0tLS0tLS0tLS0tLS0tCisKKzpBcmNoaXRlY3R1cmVzOiB4ODYKKzpW ZXJzaW9uczogPj0gMQorOlBhcmFtZXRlcnM6CisKKzo6CisKKwlzdHJ1Y3Qga3ZtaV92Y3B1X2hk cjsKKwlzdHJ1Y3Qga3ZtaV9nZXRfY3B1aWQgeworCQlfX3UzMiBmdW5jdGlvbjsKKwkJX191MzIg aW5kZXg7CisJfTsKKworOlJldHVybnM6CisKKzo6CisKKwlzdHJ1Y3Qga3ZtaV9lcnJvcl9jb2Rl OworCXN0cnVjdCBrdm1pX2dldF9jcHVpZF9yZXBseSB7CisJCV9fdTMyIGVheDsKKwkJX191MzIg ZWJ4OworCQlfX3UzMiBlY3g7CisJCV9fdTMyIGVkeDsKKwl9OworCitSZXR1cm5zIGEgQ1BVSUQg bGVhZiAoYXMgc2VlbiBieSB0aGUgZ3Vlc3QgT1MpLgorCis6RXJyb3JzOgorCisqIC1LVk1fRUlO VkFMIC0gdGhlIHNlbGVjdGVkIHZDUFUgaXMgaW52YWxpZAorKiAtS1ZNX0VJTlZBTCAtIHBhZGRp bmcgaXMgbm90IHplcm8KKyogLUtWTV9FQUdBSU4gLSB0aGUgc2VsZWN0ZWQgdkNQVSBjYW4ndCBi ZSBpbnRyb3NwZWN0ZWQgeWV0CisqIC1LVk1fRU5PRU5UIC0gdGhlIHNlbGVjdGVkIGxlYWYgaXMg bm90IHByZXNlbnQgb3IgaXMgaW52YWxpZAorCiBFdmVudHMKID09PT09PQogCmRpZmYgLS1naXQg YS9hcmNoL3g4Ni9pbmNsdWRlL3VhcGkvYXNtL2t2bWkuaCBiL2FyY2gveDg2L2luY2x1ZGUvdWFw aS9hc20va3ZtaS5oCmluZGV4IDk4ZmIyN2UxMjczYy4uZmEyNzE5MjI2MTk4IDEwMDY0NAotLS0g YS9hcmNoL3g4Ni9pbmNsdWRlL3VhcGkvYXNtL2t2bWkuaAorKysgYi9hcmNoL3g4Ni9pbmNsdWRl L3VhcGkvYXNtL2t2bWkuaApAQCAtNDEsNCArNDEsMTYgQEAgc3RydWN0IGt2bWlfZ2V0X3JlZ2lz dGVyc19yZXBseSB7CiAJc3RydWN0IGt2bV9tc3JzIG1zcnM7CiB9OwogCitzdHJ1Y3Qga3ZtaV9n ZXRfY3B1aWQgeworCV9fdTMyIGZ1bmN0aW9uOworCV9fdTMyIGluZGV4OworfTsKKworc3RydWN0 IGt2bWlfZ2V0X2NwdWlkX3JlcGx5IHsKKwlfX3UzMiBlYXg7CisJX191MzIgZWJ4OworCV9fdTMy IGVjeDsKKwlfX3UzMiBlZHg7Cit9OworCiAjZW5kaWYgLyogX1VBUElfQVNNX1g4Nl9LVk1JX0gg Ki8KZGlmZiAtLWdpdCBhL2FyY2gveDg2L2t2bS9rdm1pLmMgYi9hcmNoL3g4Ni9rdm0va3ZtaS5j CmluZGV4IGE3ODc3MWIyMWQyZi4uNDYxNWJiZTljMGRiIDEwMDY0NAotLS0gYS9hcmNoL3g4Ni9r dm0va3ZtaS5jCisrKyBiL2FyY2gveDg2L2t2bS9rdm1pLmMKQEAgLTUsNiArNSw3IEBACiAgKiBD b3B5cmlnaHQgKEMpIDIwMTkgQml0ZGVmZW5kZXIgUy5SLkwuCiAgKi8KICNpbmNsdWRlICJ4ODYu aCIKKyNpbmNsdWRlICJjcHVpZC5oIgogI2luY2x1ZGUgIi4uLy4uLy4uL3ZpcnQva3ZtL2t2bWlf aW50LmgiCiAKIHN0YXRpYyB2b2lkICphbGxvY19nZXRfcmVnaXN0ZXJzX3JlcGx5KGNvbnN0IHN0 cnVjdCBrdm1pX21zZ19oZHIgKm1zZywKQEAgLTIxMSw2ICsyMTIsMjQgQEAgYm9vbCBrdm1pX2Fy Y2hfcGZfZXZlbnQoc3RydWN0IGt2bV92Y3B1ICp2Y3B1LCBncGFfdCBncGEsIGd2YV90IGd2YSwK IAlyZXR1cm4gcmV0OwogfQogCitpbnQga3ZtaV9hcmNoX2NtZF9nZXRfY3B1aWQoc3RydWN0IGt2 bV92Y3B1ICp2Y3B1LAorCQkJICAgIGNvbnN0IHN0cnVjdCBrdm1pX2dldF9jcHVpZCAqcmVxLAor CQkJICAgIHN0cnVjdCBrdm1pX2dldF9jcHVpZF9yZXBseSAqcnBsKQoreworCXN0cnVjdCBrdm1f Y3B1aWRfZW50cnkyICplOworCisJZSA9IGt2bV9maW5kX2NwdWlkX2VudHJ5KHZjcHUsIHJlcS0+ ZnVuY3Rpb24sIHJlcS0+aW5kZXgpOworCWlmICghZSkKKwkJcmV0dXJuIC1LVk1fRU5PRU5UOwor CisJcnBsLT5lYXggPSBlLT5lYXg7CisJcnBsLT5lYnggPSBlLT5lYng7CisJcnBsLT5lY3ggPSBl LT5lY3g7CisJcnBsLT5lZHggPSBlLT5lZHg7CisKKwlyZXR1cm4gMDsKK30KKwogaW50IGt2bWlf YXJjaF9jbWRfZ2V0X3ZjcHVfaW5mbyhzdHJ1Y3Qga3ZtX3ZjcHUgKnZjcHUsCiAJCQkJc3RydWN0 IGt2bWlfZ2V0X3ZjcHVfaW5mb19yZXBseSAqcnBsKQogewpkaWZmIC0tZ2l0IGEvaW5jbHVkZS91 YXBpL2xpbnV4L2t2bV9wYXJhLmggYi9pbmNsdWRlL3VhcGkvbGludXgva3ZtX3BhcmEuaAppbmRl eCAwN2UzZjI2NjJiMzYuLjU1M2YxNjgzMzFhNCAxMDA2NDQKLS0tIGEvaW5jbHVkZS91YXBpL2xp bnV4L2t2bV9wYXJhLmgKKysrIGIvaW5jbHVkZS91YXBpL2xpbnV4L2t2bV9wYXJhLmgKQEAgLTE5 LDYgKzE5LDcgQEAKICNkZWZpbmUgS1ZNX0VPUE5PVFNVUFAJCTk1CiAjZGVmaW5lIEtWTV9FQUdB SU4JCTExCiAjZGVmaW5lIEtWTV9FQlVTWQkJRUJVU1kKKyNkZWZpbmUgS1ZNX0VOT0VOVAkJRU5P RU5UCiAjZGVmaW5lIEtWTV9FTk9NRU0JCUVOT01FTQogCiAjZGVmaW5lIEtWTV9IQ19WQVBJQ19Q T0xMX0lSUQkJMQpkaWZmIC0tZ2l0IGEvdmlydC9rdm0va3ZtaV9pbnQuaCBiL3ZpcnQva3ZtL2t2 bWlfaW50LmgKaW5kZXggN2JjM2RkMWYyMjk4Li4yMjUwOGQxNDc0OTUgMTAwNjQ0Ci0tLSBhL3Zp cnQva3ZtL2t2bWlfaW50LmgKKysrIGIvdmlydC9rdm0va3ZtaV9pbnQuaApAQCAtMjMwLDYgKzIz MCw5IEBAIGludCBrdm1pX2FyY2hfY21kX3NldF9wYWdlX3dyaXRlX2JpdG1hcChzdHJ1Y3Qga3Zt aSAqaWt2bSwKIHZvaWQga3ZtaV9hcmNoX3NldHVwX2V2ZW50KHN0cnVjdCBrdm1fdmNwdSAqdmNw dSwgc3RydWN0IGt2bWlfZXZlbnQgKmV2KTsKIGJvb2wga3ZtaV9hcmNoX3BmX2V2ZW50KHN0cnVj dCBrdm1fdmNwdSAqdmNwdSwgZ3BhX3QgZ3BhLCBndmFfdCBndmEsCiAJCQl1OCBhY2Nlc3MpOwor aW50IGt2bWlfYXJjaF9jbWRfZ2V0X2NwdWlkKHN0cnVjdCBrdm1fdmNwdSAqdmNwdSwKKwkJCSAg ICBjb25zdCBzdHJ1Y3Qga3ZtaV9nZXRfY3B1aWQgKnJlcSwKKwkJCSAgICBzdHJ1Y3Qga3ZtaV9n ZXRfY3B1aWRfcmVwbHkgKnJwbCk7CiBpbnQga3ZtaV9hcmNoX2NtZF9nZXRfdmNwdV9pbmZvKHN0 cnVjdCBrdm1fdmNwdSAqdmNwdSwKIAkJCQlzdHJ1Y3Qga3ZtaV9nZXRfdmNwdV9pbmZvX3JlcGx5 ICpycGwpOwogCmRpZmYgLS1naXQgYS92aXJ0L2t2bS9rdm1pX21zZy5jIGIvdmlydC9rdm0va3Zt aV9tc2cuYwppbmRleCAzNTVjZWM3MGEyOGQuLjk1NDgwNDJkZTYxOCAxMDA2NDQKLS0tIGEvdmly dC9rdm0va3ZtaV9tc2cuYworKysgYi92aXJ0L2t2bS9rdm1pX21zZy5jCkBAIC0yOSw2ICsyOSw3 IEBAIHN0YXRpYyBjb25zdCBjaGFyICpjb25zdCBtc2dfSURzW10gPSB7CiAJW0tWTUlfQ09OVFJP TF9WTV9FVkVOVFNdICAgICA9ICJLVk1JX0NPTlRST0xfVk1fRVZFTlRTIiwKIAlbS1ZNSV9FVkVO VF0gICAgICAgICAgICAgICAgID0gIktWTUlfRVZFTlQiLAogCVtLVk1JX0VWRU5UX1JFUExZXSAg ICAgICAgICAgPSAiS1ZNSV9FVkVOVF9SRVBMWSIsCisJW0tWTUlfR0VUX0NQVUlEXSAgICAgICAg ICAgICA9ICJLVk1JX0dFVF9DUFVJRCIsCiAJW0tWTUlfR0VUX0dVRVNUX0lORk9dICAgICAgICA9 ICJLVk1JX0dFVF9HVUVTVF9JTkZPIiwKIAlbS1ZNSV9HRVRfUEFHRV9BQ0NFU1NdICAgICAgID0g IktWTUlfR0VUX1BBR0VfQUNDRVNTIiwKIAlbS1ZNSV9HRVRfUEFHRV9XUklURV9CSVRNQVBdID0g IktWTUlfR0VUX1BBR0VfV1JJVEVfQklUTUFQIiwKQEAgLTY0MSw2ICs2NDIsMjAgQEAgc3RhdGlj IGludCBoYW5kbGVfY29udHJvbF9ldmVudHMoc3RydWN0IGt2bV92Y3B1ICp2Y3B1LAogCXJldHVy biByZXBseV9jYih2Y3B1LCBtc2csIGVjLCBOVUxMLCAwKTsKIH0KIAorc3RhdGljIGludCBoYW5k bGVfZ2V0X2NwdWlkKHN0cnVjdCBrdm1fdmNwdSAqdmNwdSwKKwkJCSAgICBjb25zdCBzdHJ1Y3Qg a3ZtaV9tc2dfaGRyICptc2csCisJCQkgICAgY29uc3Qgdm9pZCAqcmVxLCB2Y3B1X3JlcGx5X2Zj dCByZXBseV9jYikKK3sKKwlzdHJ1Y3Qga3ZtaV9nZXRfY3B1aWRfcmVwbHkgcnBsOworCWludCBl YzsKKworCW1lbXNldCgmcnBsLCAwLCBzaXplb2YocnBsKSk7CisKKwllYyA9IGt2bWlfYXJjaF9j bWRfZ2V0X2NwdWlkKHZjcHUsIHJlcSwgJnJwbCk7CisKKwlyZXR1cm4gcmVwbHlfY2IodmNwdSwg bXNnLCBlYywgJnJwbCwgc2l6ZW9mKHJwbCkpOworfQorCiAvKgogICogVGhlc2UgY29tbWFuZHMg YXJlIGV4ZWN1dGVkIG9uIHRoZSB2Q1BVIHRocmVhZC4gVGhlIHJlY2VpdmluZyB0aHJlYWQKICAq IHBhc3NlcyB0aGUgbWVzc2FnZXMgdXNpbmcgYSBuZXdseSBhbGxvY2F0ZWQgJ3N0cnVjdCBrdm1p X3ZjcHVfY21kJwpAQCAtNjUyLDYgKzY2Nyw3IEBAIHN0YXRpYyBpbnQoKmNvbnN0IG1zZ192Y3B1 W10pKHN0cnVjdCBrdm1fdmNwdSAqLAogCQkJICAgICAgdmNwdV9yZXBseV9mY3QpID0gewogCVtL Vk1JX0NPTlRST0xfRVZFTlRTXSAgID0gaGFuZGxlX2NvbnRyb2xfZXZlbnRzLAogCVtLVk1JX0VW RU5UX1JFUExZXSAgICAgID0gaGFuZGxlX2V2ZW50X3JlcGx5LAorCVtLVk1JX0dFVF9DUFVJRF0g ICAgICAgID0gaGFuZGxlX2dldF9jcHVpZCwKIAlbS1ZNSV9HRVRfUkVHSVNURVJTXSAgICA9IGhh bmRsZV9nZXRfcmVnaXN0ZXJzLAogCVtLVk1JX0dFVF9WQ1BVX0lORk9dICAgID0gaGFuZGxlX2dl dF92Y3B1X2luZm8sCiAJW0tWTUlfU0VUX1JFR0lTVEVSU10gICAgPSBoYW5kbGVfc2V0X3JlZ2lz dGVycywKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KVmly dHVhbGl6YXRpb24gbWFpbGluZyBsaXN0ClZpcnR1YWxpemF0aW9uQGxpc3RzLmxpbnV4LWZvdW5k YXRpb24ub3JnCmh0dHBzOi8vbGlzdHMubGludXhmb3VuZGF0aW9uLm9yZy9tYWlsbWFuL2xpc3Rp bmZvL3ZpcnR1YWxpemF0aW9u