Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp160690ybh; Fri, 6 Mar 2020 18:27:21 -0800 (PST) X-Google-Smtp-Source: ADFU+vv0lZOymzoyBkPEgUAtt6JF8IBBbIUFittkkwrvs6EbbtZnUTNVIc6xybcEkFnjUX/DwZww X-Received: by 2002:a05:6830:210f:: with SMTP id i15mr4873633otc.335.1583548041246; Fri, 06 Mar 2020 18:27:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583548041; cv=none; d=google.com; s=arc-20160816; b=iapG9okKpnX7U2DoNGgDMpXL40QfTIY4vp1NljvEgm+QVhwlwu10NdKcco40bRh5NB pBHHBpF5QyYjmQB42HieXww7aabrCdcmGWSbFovb1v18fTXHVMHQMSF2hVNK1KNCe009 5suI3cf3CAFNRAw5DN/slDIHodXbxpyaWMfl2/V2LEQR77BAzut6b25U27uQ/EZxLDgs xD8BmX5V3+S7XVJMQker6RuyvJiXVh7WYB8phyZmv2ClJalcmu/9/HOY0tjwRD7y91pU 7ppYA9QpCjgkBncjgMccFvYYZL/NFVlN8RAZxruw+U/SAV8L/3/U7tt5RXbNwTXnsw25 lhww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=FNNYcKyHtdU5dNADTlA/ovvTCENRcjEZI3CalxSfjVA=; b=SBFxWd+jOS4X/VMTcCnGebXAarzAya62oQjnQpnnQhefe+1mkvk3+oCntS57mVpjsS E/ShR6mLse9q04M5AOCZOcBi2OLStjI5mzae0EKOGKpooduoSz312Sq1lR3fgNRto9ms Qg6UvN7lHeDhKc+NJRiOspEQcT2Q24UgYsQjJxTgQoNpFbph7ksVgr4tVatIFRGZAD5Z FX8hucOWUvwSuZTG0YOKoNLvIBnzUyDNjYvHe1RAJeJpgPVfcaFBi9s5bVVw+XiCgHVC 82CaT9j/RmSx5gZOFAwUqyUUkTvllpwnR++Exh7BfS08MNCqqDhsTUTHEfSzvERQEF/f FVuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DiSG3DrX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t3si2431451oth.247.2020.03.06.18.27.08; Fri, 06 Mar 2020 18:27:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DiSG3DrX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726769AbgCGC0q (ORCPT + 99 others); Fri, 6 Mar 2020 21:26:46 -0500 Received: from mail.kernel.org ([198.145.29.99]:57506 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726231AbgCGC0q (ORCPT ); Fri, 6 Mar 2020 21:26:46 -0500 Received: from localhost (c-67-180-165-146.hsd1.ca.comcast.net [67.180.165.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9E16F206D7; Sat, 7 Mar 2020 02:26:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583548005; bh=WarD3A6TIXCvkh+npVTJxWlJCe2Sm4j29KWN/2pPhhs=; h=From:To:Cc:Subject:Date:From; b=DiSG3DrXPw/2Hmyg25twSuLwoqauursyOSyV1GXzwE4VozYSRkfcKMFCBZmtB+DuZ 0adtWc+A1yF2nvqvsJCzfaescMRw5SEURNmEi3DotQWHn/bSF4sq9h4dfrwMSG22Sc IcN6/3NDPR/obHD63od1YtxF0qTzOkv8TT/4xlvQ= From: Andy Lutomirski To: LKML , x86@kernel.org, kvm list , Paolo Bonzini Cc: Andy Lutomirski , stable@vger.kernel.org Subject: [PATCH v2] x86/kvm: Disable KVM_ASYNC_PF_SEND_ALWAYS Date: Fri, 6 Mar 2020 18:26:42 -0800 Message-Id: X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The ABI is broken and we cannot support it properly. Turn it off. If this causes a meaningful performance regression for someone, KVM can introduce an improved ABI that is supportable. Cc: stable@vger.kernel.org Signed-off-by: Andy Lutomirski --- arch/x86/kernel/kvm.c | 21 ++++++++++++++++++--- 1 file changed, 18 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c index 93ab0cbd304e..e6f2aefa298b 100644 --- a/arch/x86/kernel/kvm.c +++ b/arch/x86/kernel/kvm.c @@ -318,11 +318,26 @@ static void kvm_guest_cpu_init(void) pa = slow_virt_to_phys(this_cpu_ptr(&apf_reason)); -#ifdef CONFIG_PREEMPTION - pa |= KVM_ASYNC_PF_SEND_ALWAYS; -#endif pa |= KVM_ASYNC_PF_ENABLED; + /* + * We do not set KVM_ASYNC_PF_SEND_ALWAYS. With the current + * KVM paravirt ABI, the following scenario is possible: + * + * #PF: async page fault (KVM_PV_REASON_PAGE_NOT_PRESENT) + * NMI before CR2 or KVM_PF_REASON_PAGE_NOT_PRESENT + * NMI accesses user memory, e.g. due to perf + * #PF: normal page fault + * #PF reads CR2 and apf_reason -- apf_reason should be 0 + * + * outer #PF reads CR2 and apf_reason -- apf_reason should be + * KVM_PV_REASON_PAGE_NOT_PRESENT + * + * There is no possible way that both reads of CR2 and + * apf_reason get the correct values. Fixing this would + * require paravirt ABI changes. + */ + if (kvm_para_has_feature(KVM_FEATURE_ASYNC_PF_VMEXIT)) pa |= KVM_ASYNC_PF_DELIVERY_AS_PF_VMEXIT; -- 2.24.1