Received: by 10.223.185.116 with SMTP id b49csp5846302wrg; Tue, 27 Feb 2018 22:59:49 -0800 (PST) X-Google-Smtp-Source: AH8x227H/vJlO8ny+rUlYDL+KGVY3CROAkSRznsYNZ06m/dtA9eJZKPi72xrb16PwAz3I3uwYYoC X-Received: by 2002:a17:902:901:: with SMTP id 1-v6mr17085885plm.404.1519801189365; Tue, 27 Feb 2018 22:59:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519801189; cv=none; d=google.com; s=arc-20160816; b=Yx6Dj5KvJg+PUK2kF8E2J0IpVPZhhSLBIDZtGDG4nUg9m386knWIFiMareshePZOJ2 aSaPZYtdgY7GucxyCjSUADTgbmkES3uR1lzVj7KZQthQHwQBGKHykA4gTLptKpr8f2G3 PBx3yBZ340D/ZPCwenEg+vQCtWqgIa06y8wD19etm8IbDSu9MBu8E89lCTMKKxDWfCLb ww2iRnnAG6aRqX77e40Px9pyY5Xf6cDA+DvSXGKLKd+ynsTB6i5sJsaLMJwt5i/igBx4 oIgae1DEVBeVn6VfcOpKScVGkjI9ZOHE+umPUbZX6CrhELhYrVSCfnewwklZlAWKnQuY Fo3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=c73C9v+D/E5uO1KUdUMTknOr/hOYubUunC6q7l0ErdA=; b=dekCmGoSPz8hQj4JSdljO6CGsSja+eSTd7awtBe61Q6MyhQ4rKXKHJIF9JV1sC7WFC xRcBx6UTWgEZnrvVgWY/2beK+o2gEkCHbhxD6eRQaeuiX2W+jqQQxG0o7SL4+CIFv+X2 0Wmexq0RHE1ZcH0idSRek+rkxxQDMva8799FPrvmlgqxkCK0gJvjQYmEFjI31LyfiLqR MFDoiTBgXkNDb3nI+X7u8FfzbaC9o5eygXTtVvtZvYCDOTPc1TC2vAUWjj28X4Y4IrvV B3vuRQvSurrQkMbjssyQogFLGbFX+yEKBSpLtDAo0DKrJ7LxbIQNE+HVcqaRjm7TQrWM vxHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=XpOHay55; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m21si643231pgn.405.2018.02.27.22.59.34; Tue, 27 Feb 2018 22:59:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=XpOHay55; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752138AbeB1G5j (ORCPT + 99 others); Wed, 28 Feb 2018 01:57:39 -0500 Received: from mail-wm0-f67.google.com ([74.125.82.67]:39493 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751717AbeB1G5i (ORCPT ); Wed, 28 Feb 2018 01:57:38 -0500 Received: by mail-wm0-f67.google.com with SMTP id i3so1543637wmi.4; Tue, 27 Feb 2018 22:57:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=c73C9v+D/E5uO1KUdUMTknOr/hOYubUunC6q7l0ErdA=; b=XpOHay55QphS5+ca28YFASW5W9B0XUtyukqcWZEwjvh5FFK2ammciOMjxAZejYmqNZ cLBy2R8MTQTYKRMp94DWEoWITdid7p9LeiPccjdh6WrnsdzYM/bAzsHUm09EqIfReIJ9 hGiSyNSv1AONuZ60I9yV98cP2nQEtCwtVzWgpAFNEb8zLl2SWrbVUSHc/jxCm7lQSZ1T TRGXYF7PImv20+TJjRdKQWB5Y/Gu0CPO5Czka/a83xAJp6ZP5k67E8rfuNd93LeNnxbQ +6SSiQo0w2XLTLkpriOspPoPKQ15BJDvr/Qd91FyPXojS0KmGPl4OJ99NS3BYWjovmKZ 3gPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=c73C9v+D/E5uO1KUdUMTknOr/hOYubUunC6q7l0ErdA=; b=fQL16hjsjsq8ZNcbUJmdI+d4FxPNPR9aS4ifiZxs/r3Qr+pHD2Lslb5bkYCD8AKPek RdoJAoSKKO9uTYvwz0O0y5vu5/5Z6gk9jYaIU7jQ2urKQUz9blCXIvAMpeJfbR5hqoQl rhruQf/Vi862IgfECzgtQHj4RLuihnglcioS9PxI4IPeaVeZwC2xsurzv6w6shrD3dbA +DJqM0TwC/19+17n2w1UuRqv4BBSr3AWUN768aNd7BkoIm0N4rMAaAHL4Me35OaDkPjB mOWm9GqhJg+rjE0i9zGMSeOarI1x3FmF3uubCHsw0t2n9gk9W5cAV18Z949fuvuc6rMd PTvg== X-Gm-Message-State: APf1xPC6VZylB1JLR1adAGkelKLj30UBdGlxR1FlEfssnsxYIfXfBwGb 4tCDMQmPxLf4rLjBQIBivPs= X-Received: by 10.80.240.144 with SMTP id v16mr21804973edl.90.1519801056683; Tue, 27 Feb 2018 22:57:36 -0800 (PST) Received: from [192.168.10.150] (94-36-191-219.adsl-ull.clienti.tiscali.it. [94.36.191.219]) by smtp.googlemail.com with ESMTPSA id g31sm1137078edd.44.2018.02.27.22.57.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 27 Feb 2018 22:57:35 -0800 (PST) Subject: Re: [PATCH RESEND v5 2/2] KVM: X86: Allow userspace to define the microcode version To: Wanpeng Li , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Liran Alon , Nadav Amit , Borislav Petkov , Tom Lendacky References: <1519797811-4560-1-git-send-email-wanpengli@tencent.com> <1519797811-4560-2-git-send-email-wanpengli@tencent.com> From: Paolo Bonzini Message-ID: Date: Wed, 28 Feb 2018 07:57:35 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <1519797811-4560-2-git-send-email-wanpengli@tencent.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28/02/2018 07:03, Wanpeng Li wrote: > From: Wanpeng Li > > Linux (among the others) has checks to make sure that certain features > aren't enabled on a certain family/model/stepping if the microcode version > isn't greater than or equal to a known good version. > > By exposing the real microcode version, we're preventing buggy guests that > don't check that they are running virtualized (i.e., they should trust the > hypervisor) from disabling features that are effectively not buggy. > > Suggested-by: Filippo Sironi > Cc: Paolo Bonzini > Cc: Radim Krčmář > Cc: Liran Alon > Cc: Nadav Amit > Cc: Borislav Petkov > Cc: Tom Lendacky > Signed-off-by: Wanpeng Li > --- > v4 -> v5: > * microcode_version be u64 and initialized suitable, remote hte shifts > v3 -> v4: > * add the shifts back > v2 -> v3: > * remove the shifts > * add the MSR_IA32_UCODE_REV version to the "feature MSRs" > v1 -> v2: > * add MSR_IA32_UCODE_REV to emulated_msrs > > arch/x86/include/asm/kvm_host.h | 1 + > arch/x86/kvm/svm.c | 4 +--- > arch/x86/kvm/vmx.c | 1 + > arch/x86/kvm/x86.c | 11 +++++++++-- > 4 files changed, 12 insertions(+), 5 deletions(-) > > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index 938d453..df6720f 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -507,6 +507,7 @@ struct kvm_vcpu_arch { > u64 smi_count; > bool tpr_access_reporting; > u64 ia32_xss; > + u64 microcode_version; > > /* > * Paging state of the vcpu > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > index f874798..312f33f 100644 > --- a/arch/x86/kvm/svm.c > +++ b/arch/x86/kvm/svm.c > @@ -1907,6 +1907,7 @@ static void svm_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event) > u32 dummy; > u32 eax = 1; > > + vcpu->arch.microcode_version = 0x01000065; > svm->spec_ctrl = 0; > > if (!init_event) { > @@ -3962,9 +3963,6 @@ static int svm_get_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > > msr_info->data = svm->spec_ctrl; > break; > - case MSR_IA32_UCODE_REV: > - msr_info->data = 0x01000065; > - break; > case MSR_F15H_IC_CFG: { > > int family, model; > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index 9968906..2cdbea7 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -5781,6 +5781,7 @@ static void vmx_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event) > vmx->rmode.vm86_active = 0; > vmx->spec_ctrl = 0; > > + vcpu->arch.microcode_version = 0x100000000ULL; > vmx->vcpu.arch.regs[VCPU_REGS_RDX] = get_rdx_init_val(); > kvm_set_cr8(vcpu, 0); > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index efc8554..5c93cbc 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -1058,6 +1058,7 @@ static unsigned num_emulated_msrs; > static u32 msr_based_features[] = { > MSR_IA32_ARCH_CAPABILITIES, > MSR_F10H_DECFG, > + MSR_IA32_UCODE_REV, > }; > > static unsigned int num_msr_based_features; > @@ -1065,6 +1066,9 @@ static unsigned int num_msr_based_features; > static int kvm_get_msr_feature(struct kvm_msr_entry *msr) > { > switch (msr->index) { > + case MSR_IA32_UCODE_REV: > + rdmsrl(msr->index, msr->data); > + break; > default: > if (kvm_x86_ops->get_msr_feature(msr)) > return 1; > @@ -2260,7 +2264,6 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > > switch (msr) { > case MSR_AMD64_NB_CFG: > - case MSR_IA32_UCODE_REV: > case MSR_IA32_UCODE_WRITE: > case MSR_VM_HSAVE_PA: > case MSR_AMD64_PATCH_LOADER: > @@ -2268,6 +2271,10 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > case MSR_AMD64_DC_CFG: > break; > > + case MSR_IA32_UCODE_REV: > + if (msr_info->host_initiated) > + vcpu->arch.microcode_version = data; > + break; > case MSR_EFER: > return set_efer(vcpu, data); > case MSR_K7_HWCR: > @@ -2563,7 +2570,7 @@ int kvm_get_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > msr_info->data = 0; > break; > case MSR_IA32_UCODE_REV: > - msr_info->data = 0x100000000ULL; > + msr_info->data = vcpu->arch.microcode_version; > break; > case MSR_MTRRcap: > case 0x200 ... 0x2ff: > Reviewed-by: Paolo Bonzini