Paolo Bonzini <pbonz...@redhat.com> 于2019年9月26日周四 下午5:53写道:
> On 26/09/19 11:35, Li Qiang wrote: > > So without unrestrict guest the mainline is this: KVM set guest's > > rflag bit X86_EFLAGS_VM, so when the guest enter guest mode, it is in > > vm86 mode. In this mode, the CPU will access the address like in > > real mode(seg*4+offset), this address is linear address. And in fact, > > the vm86 is still in protected, so the linear address will be > > translated to gpa by the identity mapping table. Then goes to EPT > > table? > > Yes. > > > ... as soon as the guest tries to enter protected mode, it will get > into > > a situation which is not real mode but doesn't have the segment > > registers properly loaded with selectors. > > > > Therefore, it will either > > hack things together (enter_pmode) or emulate instructions until the > > state is accepted even without unrestricted guest support. > > > > Could you please explain this situation more detailed? Why this happen? > > Protected mode entry looks like this: > > mov %cr0, %eax > or $1, %al > mov %eax, %cr0 > # [1] now in 16-bit protected mode > lgdtl gdt32 > ljmpl $8, 2f > # [2] now in 32-bit protected mode > 2: > .code32 > mov $16, %ax > mov %ax, %ds > mov %ax, %es > mov %ax, %fs > mov %ax, %gs > mov %ax, %ss > # [3] now everything is okay > > Between [1] and [3] the vmentry could fail if not in unrestricted mode. > For example (see checks on guest segment registers in the SDM): > > - "CS. Type must be 9, 11, 13, or 15 (accessed code segment)." CS in > real-mode is a RW data segment, not a code segment. This applies > between [1] and [2]. > > - "SS. If the guest will not be virtual-8086 and the “unrestricted > guest” VM-execution control is 0, the RPL (bits 1:0) must equal the RPL > of the selector field for CS." This may not be the case if the segment > register still holds real-mode values (which are not selectors, just > base >> 4). This applies between [1] and [3]. > > - "DS, ES, FS, GS. The DPL cannot be less than the RPL in the selector > field" Again, the real-mode DPL is zero but the RPL makes no sense if > the segment registers hold a real-mode value. > > You can find more about these checks in guest_state_valid(); look at the > "else" branch of that function, the "then" branch is for pmode->rmode > transitions. When any of the checks fail, KVM emulates instructions > instead of using VMX non-root mode (usually it's just a handful of them, > as in the case above). > > Thanks so much for your explanation. I will read the code more to strengthen my understanding. Thanks, Li Qiang > Paolo > >