Received: by 10.223.185.116 with SMTP id b49csp4708530wrg; Tue, 27 Feb 2018 00:56:31 -0800 (PST) X-Google-Smtp-Source: AH8x226yTLNlFgM/H1FdnwBJywgn1ND9Sy6EwGu+rHiiDcBT32c/HrNPksf1oCwkDd2hr26HKsVS X-Received: by 2002:a17:902:788e:: with SMTP id q14-v6mr13588146pll.396.1519721791586; Tue, 27 Feb 2018 00:56:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519721791; cv=none; d=google.com; s=arc-20160816; b=irQwus3Kg90FfIimXoleXy6quepS3VxGrh+j0cnpM2ZgeUDBkY5fcBXpN2rqr9PkGr 7o0Kdmg2I3BrkA8MWep4RYu8DkAV1LMPBVI+/B4FjkDPRD7K5Z5/Cshe/lA1FIV+U71I fGYdS3YBvXWvBA+mnmXzcDJq1MRqtOUCzehNcEgbZXH/WdRwPYe62fhxVlsWbANoZNV2 JwJqXUYpCLveVqs+Ovd7njotYjQu+2a03MuPvFr8pJPZxLTBVwSKzygTwojlYp1DVHN0 D3+Ckslw2PQnbKzu9OSTc3yU46yKwacTTIXvwZj+hVetBUEoGTnV1aFL+NjPmADVlmLB Racg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=P4oDDTszAtm3vzRv0ogiDW3TGbg+z71Iv9N4j7jIQWs=; b=x4y8AW9NfUzUvOJAEn7nRrGmrsuxrDI9BjOKrQhHV+PJ2Ikl5yUZny9rXENWA8qB+D kV7qSdRo/WruKn9FvIdf8E3Yyn5OiPDbdvsHXqGIVVaeJPSmjqzQ9uKJE55XWev7Mn+O fn6CWaL1WUnx6I4vGIhOIJzM6sMF7TEsyWMXpiedxc4WEuEhpvBEh2tI2+kMkFwviqwq M3XQtDF91MMJhviD3Fc4OLchDbqJVuKyN9SpS0uETlQ/gJimpsswcwWWxOI0dGSrzzXO 6n/SMkU9mRAadzQCZFctNiNZN6kvYoo1oxMTdE+T7k5CbA7jfi5uBaTsX73WVsp1tP1C Sj8Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y9si6792892pgq.548.2018.02.27.00.56.05; Tue, 27 Feb 2018 00:56:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752293AbeB0IiQ (ORCPT + 99 others); Tue, 27 Feb 2018 03:38:16 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:33528 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751907AbeB0IiP (ORCPT ); Tue, 27 Feb 2018 03:38:15 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0FCCB818535B; Tue, 27 Feb 2018 08:38:15 +0000 (UTC) Received: from [10.36.117.123] (ovpn-117-123.ams2.redhat.com [10.36.117.123]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E628A213AEF5; Tue, 27 Feb 2018 08:38:13 +0000 (UTC) Subject: Re: [PATCH v4] KVM: X86: Allow userspace to define the microcode version To: Wanpeng Li , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Liran Alon , Nadav Amit References: <1519698910-4272-1-git-send-email-wanpengli@tencent.com> From: Paolo Bonzini Message-ID: Date: Tue, 27 Feb 2018 09:38:12 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <1519698910-4272-1-git-send-email-wanpengli@tencent.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Tue, 27 Feb 2018 08:38:15 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Tue, 27 Feb 2018 08:38:15 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'pbonzini@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27/02/2018 03:35, Wanpeng Li wrote: > From: Wanpeng Li > > Linux (among the others) has checks to make sure that certain features > aren't enabled on a certain family/model/stepping if the microcode version > isn't greater than or equal to a known good version. > > By exposing the real microcode version, we're preventing buggy guests that > don't check that they are running virtualized (i.e., they should trust the > hypervisor) from disabling features that are effectively not buggy. > > Suggested-by: Filippo Sironi > Cc: Paolo Bonzini > Cc: Radim Krčmář > Cc: Liran Alon > Cc: Nadav Amit > Signed-off-by: Wanpeng Li > --- > v3 -> v4: > * add the shifts back Please wait for a review instead of pushing new versions continuously. Leaving the shifts means that MSR_IA32_UCODE_REV's bits 0-31 are zeroed even if KVM_SET_MSRS makes them nonzero. Paolo > v2 -> v3: > * remove the shifts > * add the MSR_IA32_UCODE_REV version to the "feature MSRs" > v1 -> v2: > * add MSR_IA32_UCODE_REV to emulated_msrs > > arch/x86/include/asm/kvm_host.h | 1 + > arch/x86/kvm/x86.c | 19 +++++++++++++++---- > 2 files changed, 16 insertions(+), 4 deletions(-) > > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index 938d453..6e13f2f 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -507,6 +507,7 @@ struct kvm_vcpu_arch { > u64 smi_count; > bool tpr_access_reporting; > u64 ia32_xss; > + u32 microcode_version; > > /* > * Paging state of the vcpu > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index d4985a9..0299b6e 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -1058,6 +1058,7 @@ static unsigned num_emulated_msrs; > static u32 msr_based_features[] = { > MSR_IA32_ARCH_CAPABILITIES, > MSR_F10H_DECFG, > + MSR_IA32_UCODE_REV, > }; > > static unsigned int num_msr_based_features; > @@ -1067,8 +1068,14 @@ static int do_get_msr_feature(struct kvm_vcpu *vcpu, unsigned index, u64 *data) > struct kvm_msr_entry msr; > > msr.index = index; > - if (kvm_x86_ops->get_msr_feature(&msr)) > - return 1; > + switch (msr.index) { > + case MSR_IA32_UCODE_REV: > + rdmsrl(msr.index, msr.data); > + break; > + default: > + if (kvm_x86_ops->get_msr_feature(&msr)) > + return 1; > + } > > *data = msr.data; > > @@ -2248,7 +2255,6 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > > switch (msr) { > case MSR_AMD64_NB_CFG: > - case MSR_IA32_UCODE_REV: > case MSR_IA32_UCODE_WRITE: > case MSR_VM_HSAVE_PA: > case MSR_AMD64_PATCH_LOADER: > @@ -2256,6 +2262,10 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > case MSR_AMD64_DC_CFG: > break; > > + case MSR_IA32_UCODE_REV: > + if (msr_info->host_initiated) > + vcpu->arch.microcode_version = data >> 32; > + break; > case MSR_EFER: > return set_efer(vcpu, data); > case MSR_K7_HWCR: > @@ -2551,7 +2561,7 @@ int kvm_get_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > msr_info->data = 0; > break; > case MSR_IA32_UCODE_REV: > - msr_info->data = 0x100000000ULL; > + msr_info->data = (u64)vcpu->arch.microcode_version << 32; > break; > case MSR_MTRRcap: > case 0x200 ... 0x2ff: > @@ -8233,6 +8243,7 @@ void kvm_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event) > vcpu->arch.regs_dirty = ~0; > > vcpu->arch.ia32_xss = 0; > + vcpu->arch.microcode_version = 0x1; > > kvm_x86_ops->vcpu_reset(vcpu, init_event); > } >