Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1923936ybb; Thu, 2 Apr 2020 09:47:06 -0700 (PDT) X-Google-Smtp-Source: APiQypIakZLbTOuCMVtqP/+W3fc9PF0skbJ1rcyZp8YAHF55fYr8wUeQGqSGaE0Tl2VghgXFCiae X-Received: by 2002:a9d:58c9:: with SMTP id s9mr2799788oth.99.1585846026283; Thu, 02 Apr 2020 09:47:06 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1585846026; cv=pass; d=google.com; s=arc-20160816; b=aswZ8HLbMvZWIBd6Fs8RqkV8ii+/pBCr28hfXiteXXPNRzhY++HwxG4E9E2PfoJH3P sgtQlitMpm4561vtovbHHR+Wz6Hsmbpept6fRj5anLDa1tzKijDT+eYAfv0qlIsA14k0 kbHOrf3deraKWn8EHAh5IruHLX6ohhIRD2XVlVcCjZJo3eG4x34OvAazp/SwsdjxYD4p i2DFLhuj8Errk3rGfIXZ0jVZ9QM1XbOZytElTtBFpjgUfkj1/CgDH4Xh779ZIRSty5Bm YggbOazDxMpzpoytjU9uzJCGqFcctyglFlm9sCQ6kBSRSjmtO5SnABQkGuhT16bE70rw em7w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:content-language:accept-language:in-reply-to:references :message-id:date:thread-index:thread-topic:subject:cc:to:from :dkim-signature; bh=urZ1Z5Zws6vHH2QwFUM5KbN7S6ite+SjOd8q6/FgyJo=; b=dlsJgfbrMZpCx2rgLiY3ymOz+cWacygsHee3I5r/D/bagh9G4HClRZdUO8PSSBbaSV ZwMEoqp7ZtQXXc27fB/tOaGCVe3i/tVUgJwvCVbTcSIbktWSdew15osK5j1h4qybJhwj wpyMyHCui8vaImeAgdCrs9xsNHwGjykhPdwaZtCS76VjJ3x1q3YDbc7WaqgcRHekn+a2 GdPhBI4R2o6vOuogtsHDk6kmfcFcPY+bJOuyxZee1s3eui/+cTxmnoTQ3+XMtwkFklx5 gubzO+Na5jGelhlt2FEvAeBIRs0HvMEje62dx3ZIXX+hAOJ8CedwiUFnd7ma3eZFEj8v 0J9A== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@vmware.com header.s=selector2 header.b=zzzgCgv9; arc=pass (i=1 spf=pass spfdomain=vmware.com dkim=pass dkdomain=vmware.com dmarc=pass fromdomain=vmware.com); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m193si2558046oig.77.2020.04.02.09.46.52; Thu, 02 Apr 2020 09:47:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@vmware.com header.s=selector2 header.b=zzzgCgv9; arc=pass (i=1 spf=pass spfdomain=vmware.com dkim=pass dkdomain=vmware.com dmarc=pass fromdomain=vmware.com); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389449AbgDBPoG (ORCPT + 99 others); Thu, 2 Apr 2020 11:44:06 -0400 Received: from mail-bn7nam10on2046.outbound.protection.outlook.com ([40.107.92.46]:8028 "EHLO NAM10-BN7-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2389413AbgDBPoF (ORCPT ); Thu, 2 Apr 2020 11:44:05 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CjUy8rPCAvA6Q/aZy3GgJjKpBrWVymZ/xWTZme4xOimsP+A/4vzC7XdXmT1PKNGpV8eq4d+M7aufxS9bjcxcRMF7ct/vfLuizMRehJmugIlTWwBG3DXpun74HcKDtmdYOWEPfmFnpywj5cuyuXLqGv+Wq5azOqPu5ZiM6fVsSRtgG51HI54BC39L9T7ui3r1Y+GOAcSGiIPe581EGHgI89ZSpnBU1V8bpgM4skvDAnsadRLcc91cT0LQ/ZFh1hWtr31WHGezB4DFQHP/MgNa6aPdV3OFvfxI/wXMqjGVqVY4BRlIcdwaopqq/TbXFdh/KTaGbgK5Uc44eDT6UUftvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=urZ1Z5Zws6vHH2QwFUM5KbN7S6ite+SjOd8q6/FgyJo=; b=H9gNOTUMCAZtHAnN52r6Tm2BlTm8Vl0lJ7gq82jAjAeUgl7S25MTPu3v+vYeIspPimnzbQJh8jxBimVZ5luLo1z566vgMFyEATI/aD0CWbec71wRGp81WeoaWjWiOuT5tEw0du1IegS2U+qOIN1mqJkspOk88Rbvq3WeL4Hxd9L4PKCWW7hUnc7xrDrR1YDsLwohbwr2F1Pp7/wMliN5rzrsljIgDtCvgp2rTzLKAL7P7NhnO/kUyi3Q8LJEykW0Bz9qgmh6wqKiteqohcbLOyM0SsFZPwc6bGOEoA04UgmbLs6yfPI77jLxBAPTuBOGr+4hoW1TrftAyRzRMmG8HA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vmware.com; dmarc=pass action=none header.from=vmware.com; dkim=pass header.d=vmware.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vmware.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=urZ1Z5Zws6vHH2QwFUM5KbN7S6ite+SjOd8q6/FgyJo=; b=zzzgCgv9t7cXt5lT0Iw6JvhNRh+8VPU5o7jQcZfmyuTEmEaBfg+cf+6ahovDd/s1LQ/40C6s72pnUovxI8QPlcY4WWfDVn+qMHTVezFr8DqBr1EliuyxoNj2FwR5F9hyiuWoLYrv4UkJ10W2tYwmRJxcj2YuqeSu7FGnIEdSXjw= Received: from BYAPR05MB4776.namprd05.prod.outlook.com (2603:10b6:a03:4a::18) by BYAPR05MB4376.namprd05.prod.outlook.com (2603:10b6:a02:f7::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.12; Thu, 2 Apr 2020 15:44:00 +0000 Received: from BYAPR05MB4776.namprd05.prod.outlook.com ([fe80::7c65:25af:faf7:5331]) by BYAPR05MB4776.namprd05.prod.outlook.com ([fe80::7c65:25af:faf7:5331%2]) with mapi id 15.20.2878.014; Thu, 2 Apr 2020 15:44:00 +0000 From: Nadav Amit To: Sean Christopherson CC: Thomas Gleixner , LKML , x86 , "Kenneth R. Crudup" , Paolo Bonzini , Fenghua Yu , Xiaoyao Li , Thomas Hellstrom , Tony Luck , "Peter Zijlstra (Intel)" , Jessica Yu , Steven Rostedt Subject: Re: [patch 2/2] x86/kvm/vmx: Prevent split lock detection induced #AC wreckage Thread-Topic: [patch 2/2] x86/kvm/vmx: Prevent split lock detection induced #AC wreckage Thread-Index: AQHWCO7TQEdzxFpLhEGvPpyBQxsUlqhl9XCAgAADv4A= Date: Thu, 2 Apr 2020 15:44:00 +0000 Message-ID: <18758F52-BB97-4F47-9481-F66AF4465A06@vmware.com> References: <20200402123258.895628824@linutronix.de> <20200402124205.334622628@linutronix.de> <20200402153035.GA13879@linux.intel.com> In-Reply-To: <20200402153035.GA13879@linux.intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=namit@vmware.com; x-originating-ip: [2601:647:4700:9b2:1153:aafd:5246:5949] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9de6861a-f2fb-45d3-5ea6-08d7d71ca9e1 x-ms-traffictypediagnostic: BYAPR05MB4376:|BYAPR05MB4376: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-forefront-prvs: 0361212EA8 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR05MB4776.namprd05.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(10009020)(4636009)(396003)(346002)(136003)(366004)(376002)(39860400002)(7416002)(966005)(36756003)(6916009)(81156014)(66476007)(76116006)(66446008)(66556008)(81166006)(8676002)(66946007)(8936002)(64756008)(5660300002)(6486002)(71200400001)(4326008)(478600001)(86362001)(54906003)(2906002)(186003)(33656002)(53546011)(2616005)(6506007)(316002)(6512007);DIR:OUT;SFP:1101; received-spf: None (protection.outlook.com: vmware.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: 17HJsqsoaPIf7Nf6EqiIHTrEZC1LKdBY7OriGN0NnLl54SwANnyfNk8TtoQrGe1p3ukUr/0gxepVZ9rhVgVfdRhtFQ64zcYdQyrbLSe+qCsl14R4H/hc8IHw5jm21SxLtrZKXr/n5oXjVxtPvHlecRbPIlIs0vN/mLpQg8peU+4MRQrmtyE83AcQ3NYleouYYzzfX0YzLT5b2s4Xkm5XNg== Content-Type: text/plain; charset="us-ascii" Content-ID: <748CE06D1F28FB468C86DF2FF95EBBD8@namprd05.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: vmware.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9de6861a-f2fb-45d3-5ea6-08d7d71ca9e1 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Apr 2020 15:44:00.4380 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b39138ca-3cee-4b4a-a4d6-cd83d9dd62f0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: f/7bAuHDyOzgsZTRPq+vIdUHfRzsZRJYaUka1is7jRjACsDxzeMrj3m6KsLOHj+DJYunj72F8aBKWwOlWq8RgQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB4376 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Apr 2, 2020, at 8:30 AM, Sean Christopherson wrote: >=20 > On Thu, Apr 02, 2020 at 02:33:00PM +0200, Thomas Gleixner wrote: >> Without at least minimal handling for split lock detection induced #AC, = VMX >> will just run into the same problem as the VMWare hypervisor, which was >> reported by Kenneth. >>=20 >> It will inject the #AC blindly into the guest whether the guest is prepa= red >> or not. >>=20 >> Add the minimal required handling for it: >>=20 >> - Check guest state whether CR0.AM is enabled and EFLAGS.AC is set. If >> so, then the #AC originated from CPL3 and the guest has is prepared t= o >> handle it. In this case it does not matter whether the #AC is due to = a >> split lock or a regular unaligned check. >>=20 >> - Invoke a minimal split lock detection handler. If the host SLD mode is >> sld_warn, then handle it in the same way as user space handling works: >> Emit a warning, disable SLD and mark the current task with TIF_SLD. >> With that resume the guest without injecting #AC. >>=20 >> If the host mode is sld_fatal or sld_off, emit a warning and deliver >> the exception to user space which can crash and burn itself. >>=20 >> Mark the module with MOD_INFO(sld_safe, "Y") so the module loader does n= ot >> force SLD off. >=20 > Some comments below. But, any objection to taking Xiaoyao's patches that > do effectively the same things, minus the MOD_INFO()? I'll repost them i= n > reply to this thread. IIUC they also deal with emulated split-lock accesses in the host, during instruction emulation [1]. This seems also to be required, although I am no= t sure the approach that he took once emulation encounters a split-lock is robust. [1] https://lore.kernel.org/lkml/20200324151859.31068-5-xiaoyao.li@intel.co= m/=