Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp1557591ybb; Fri, 29 Mar 2019 06:55:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqxULIaJqSkNY7gCJE0mUavlrt+Y0mrM/Yvsu2PHSXDI/8KyvqQtvFrZg7UncVn7R0psRsfJ X-Received: by 2002:a17:902:234b:: with SMTP id n11mr8076493plg.89.1553867747832; Fri, 29 Mar 2019 06:55:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553867747; cv=none; d=google.com; s=arc-20160816; b=VdWVId6Wl6vsNEbujQO8NaC6pWieRZg5tArRnB7TFq72/yZlxZfwsiDEkx7Cp2pRMb 2Qa/TlbJ4W2fVRG03q61tGxSYMdwEwkPv0F64KrqOM1qbM+IcqMI3QJkeWcOHNXVMmKu pjqtbnL791SQlGGC4jiwS2u2To2bX5FFTDvmexBexYYyEsV6X3W7zJMuFF+4QCzyXUGZ WBoc5TpC1BVjlvl7DFzkDFbY82aBBDYKlj/L8xS5DQr5PmvguGbbGLd64h++qO1diy39 cEzcp6FvK2OVGhpE1NdM5ECgGyN0k666ggVqecoH/UvvJmNCK0BCrFRsUbM7vlZ89T4J 91yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=7rKkPhIm49xzsxvO8txL4613/bxIcAScFaNdxPfjhPA=; b=a1kWQ3juGWA7yxOnk5UhNGDkAjCBMN3/p6Irwm0GjQ7YbmY18wVvi+IRXRbt1Er5qs msHg07MupnTfohvmyXYEZWRKTnXYnQCOCwTYt+yKGz9QEzNe+p71hjH/hVnJEwqM0OCV 26BPlPUUWyIPY8tJ5Mse2r+VpRYGcpM1AHUZHEa8JVNna8xtWr6z5sW9466FsMFP6UKt P94GY4FeLckAEblg4HJxu3D9VSF9aYYl5Lr1+m8pP1cHSsDlNcq85fV8cUF0DS7crJiU 640At8vgnz/sjK+IcIV8zoFiyOTGQQ4hZJvsGtjVuodiECwxUxe3IaGyH+XlywcnfLVH bImw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k12si1909316pgo.429.2019.03.29.06.55.31; Fri, 29 Mar 2019 06:55:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729751AbfC2Nyy (ORCPT + 99 others); Fri, 29 Mar 2019 09:54:54 -0400 Received: from mga03.intel.com ([134.134.136.65]:44836 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729688AbfC2Nyx (ORCPT ); Fri, 29 Mar 2019 09:54:53 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Mar 2019 06:54:52 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,284,1549958400"; d="scan'208";a="138342096" Received: from lxy-server.sh.intel.com ([10.239.48.11]) by orsmga003.jf.intel.com with ESMTP; 29 Mar 2019 06:54:50 -0700 From: Xiaoyao Li To: Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Xiaoyao Li , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, chao.gao@intel.com, Sean Christopherson Subject: [PATCH v4 1/2] kvm/vmx: Switch MSR_MISC_FEATURES_ENABLES between host and guest Date: Fri, 29 Mar 2019 21:54:21 +0800 Message-Id: <20190329135422.15046-2-xiaoyao.li@linux.intel.com> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190329135422.15046-1-xiaoyao.li@linux.intel.com> References: <20190329135422.15046-1-xiaoyao.li@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There are two defined bits in MSR_MISC_FEATURES_ENABLES, bit 0 for cpuid faulting and bit 1 for ring3mwait. == cpuid Faulting == cpuid faulting is a feature about CPUID instruction. When cpuid faulting is enabled, all execution of the CPUID instruction outside system-management mode (SMM) cause a general-protection (#GP) if the CPL > 0. About this feature, detailed information can be found at https://www.intel.com/content/dam/www/public/us/en/documents/application-notes/virtualization-technology-flexmigration-application-note.pdf Current KVM provides software emulation of this feature for guest. However, because cpuid faulting takes higher priority over CPUID vm exit (Intel SDM vol3.25.1.1), there is a risk of leaking cpuid faulting to guest when host enables it. If host enables cpuid faulting by setting the bit 0 of MSR_MISC_FEATURES_ENABLES, it will pass to guest since there is no switch of MSR_MISC_FEATURES_ENABLES yet. As a result, when guest calls CPUID instruction in CPL > 0, it will generate a #GP instead of CPUID vm eixt. This issue will cause guest boot failure when guest uses *modprobe* to load modules. *modprobe* calls CPUID instruction, thus causing #GP in guest. Since there is no handling of cpuid faulting in #GP handler, guest fails boot. == ring3mwait == Ring3mwait is a Xeon-Phi Product Family x200 series specific feature, which allows the MONITOR and MWAIT instructions to be executed in rings other than ring 0. The feature can be enabled by setting bit 1 in MSR_MISC_FEATURES_ENABLES. The register can also be read to determine whether the instructions are enabled at other than ring 0. About this feature, description can be found at https://software.intel.com/en-us/blogs/2016/10/06/intel-xeon-phi-product-family-x200-knl-user-mode-ring-3-monitor-and-mwait Current kvm doesn't expose feature ring3mwait to guest. However, there is also a risk of leaking ring3mwait to guest if host enables it since there is no switch of MSR_MISC_FEATURES_ENABLES. == solution == From above analysis, both cpuid faulting and ring3mwait can be leaked to guest. To fix this issue, MSR_MISC_FEATURES_ENABLES should be switched between host and guest. Since MSR_MISC_FEATURES_ENABLES is intel-specific, this patch implement the switching only in vmx. For the reason that kvm provides the software emulation of cpuid faulting and kvm doesn't expose ring3mwait to guest. MSR_MISC_FEATURES_ENABLES can be just cleared to zero for guest when any of the features is enabled in host. Signed-off-by: Xiaoyao Li --- arch/x86/kernel/process.c | 1 + arch/x86/kvm/vmx/vmx.c | 8 ++++++++ 2 files changed, 9 insertions(+) diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c index 1bba1a3c0b01..94a566e79b6c 100644 --- a/arch/x86/kernel/process.c +++ b/arch/x86/kernel/process.c @@ -191,6 +191,7 @@ int set_tsc_mode(unsigned int val) } DEFINE_PER_CPU(u64, msr_misc_features_shadow); +EXPORT_PER_CPU_SYMBOL_GPL(msr_misc_features_shadow); static void set_cpuid_faulting(bool on) { diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 270c6566fd5a..cb0f63879a25 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -1064,6 +1064,9 @@ void vmx_prepare_switch_to_guest(struct kvm_vcpu *vcpu) vmx->loaded_cpu_state = vmx->loaded_vmcs; host_state = &vmx->loaded_cpu_state->host_state; + if (this_cpu_read(msr_misc_features_shadow)) + wrmsrl(MSR_MISC_FEATURES_ENABLES, 0ULL); + /* * Set host fs and gs selectors. Unfortunately, 22.2.3 does not * allow segment selectors with cpl > 0 or ti == 1. @@ -1123,6 +1126,7 @@ void vmx_prepare_switch_to_guest(struct kvm_vcpu *vcpu) static void vmx_prepare_switch_to_host(struct vcpu_vmx *vmx) { struct vmcs_host_state *host_state; + u64 msrval; if (!vmx->loaded_cpu_state) return; @@ -1133,6 +1137,10 @@ static void vmx_prepare_switch_to_host(struct vcpu_vmx *vmx) ++vmx->vcpu.stat.host_state_reload; vmx->loaded_cpu_state = NULL; + msrval = this_cpu_read(msr_misc_features_shadow); + if (msrval) + wrmsrl(MSR_MISC_FEATURES_ENABLES, msrval); + #ifdef CONFIG_X86_64 rdmsrl(MSR_KERNEL_GS_BASE, vmx->msr_guest_kernel_gs_base); #endif -- 2.19.1