Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752523AbdHPTDa (ORCPT ); Wed, 16 Aug 2017 15:03:30 -0400 Received: from mx1.redhat.com ([209.132.183.28]:42310 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751611AbdHPTD2 (ORCPT ); Wed, 16 Aug 2017 15:03:28 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 407FB79744 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=rkrcmar@redhat.com Date: Wed, 16 Aug 2017 21:03:17 +0200 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Paolo Bonzini Cc: "Michael S. Tsirkin" , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH] kvm: x86: disable KVM_FAST_MMIO_BUS Message-ID: <20170816190316.GA2566@flask> References: <20170816112249.28939-1-pbonzini@redhat.com> <20170816155132-mutt-send-email-mst@kernel.org> <9de5ebf5-457d-2a34-0314-c6c612ddb2e9@redhat.com> <20170816161301-mutt-send-email-mst@kernel.org> <20170816194342-mutt-send-email-mst@kernel.org> <81dabc78-edfd-32fc-024c-c57330386a51@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <81dabc78-edfd-32fc-024c-c57330386a51@redhat.com> X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Wed, 16 Aug 2017 19:03:28 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1979 Lines: 45 2017-08-16 19:19+0200, Paolo Bonzini: > On 16/08/2017 18:50, Michael S. Tsirkin wrote: >> On Wed, Aug 16, 2017 at 03:30:31PM +0200, Paolo Bonzini wrote: >>> While you can filter out instruction fetches, that's not enough. A data >>> read could happen because someone pointed the IDT to MMIO area, and who >>> knows what the VM-exit instruction length points to in that case. >> >> Thinking more about it, I don't really see how anything >> legal guest might be doing with virtio would trigger anything >> but a fault after decoding the instruction. How does >> skipping instruction even make sense in the example you give? > > There's no such thing as a legal guest. Anything that the hypervisor > does, that differs from real hardware, is a possible escalation path. > > This in fact makes me doubt the EMULTYPE_SKIP patch too. The main hack is that we expect EPT misconfig within a given range to be a MMIO NULL write. I think it is fine -- EMULTYPE_SKIP is a common path that should have well tested error paths and, IIUC, virtio doesn't allow any other access, so it is a problem of the guest if a buggy/malicious application can access virtio memory. >>>>> Plus of course it wouldn't be guaranteed to work on nested. >>>> >>>> Not sure I got this one. >>> >>> Not all nested hypervisors are setting the VM-exit instruction length >>> field on EPT violations, since it's documented not to be set. >> >> So that's probably the real issue - nested virt which has to do it >> in software at extra cost. We already limit this to intel processors, Hm, there is no reason to exclude SVM. >> how about we blacklist nested virt for this optimization? Not every hypervisor can be easily detected ... KVM uses standard features and SDM clearly says that the instruction length field is undefined. We only lose performance if we decode the instruction, but piling workarounds creates unexpected corner cases. I still don't see acceptable alternatives to Paolo's solution.