Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp734946pxk; Wed, 23 Sep 2020 14:55:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzsktobKeyUi7wy38lFLPTH5RSj9pB1jbbnrAHPGU9YYv1JzUZMvkzERW3T++t2I3N3vdGX X-Received: by 2002:aa7:c48d:: with SMTP id m13mr1446616edq.326.1600898144235; Wed, 23 Sep 2020 14:55:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600898144; cv=none; d=google.com; s=arc-20160816; b=h/WIrD5ukGSOJ4mQkbZq1I+egB+dlMdcD5EhEnp61+AjzFYXzyv33u0TEH0tIzJWj5 LOdf6fz+MzhcpJprGtSLlRuUXJkXfptpZNfP5Nl4HQb3ItQZFVAqZZcyUEQB94ezAGMe +e2C31Lvy6h8Zgu6yYmmsb1PVp6Ztio4V39Dn+jsFgMpaXcjykvXYw3x/4DZUiJt3aL2 jfzZewnMGNWvHnnROkzJwF+0OHo+zgx72Iwn2+E8NUesyLZ7UUFjGXxs8kPw6b9f3Sdm v3NNWQ1v2LojAK7DlzWdXCpdtHY1OluRrzCRmKqpzigeUi+3bx4emVqncbAUc2HxBXjs eB/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=jgCC27OfuR2ByPKsncOURcCgKpdD5HOG792MWAFQFzA=; b=etKfoGKP+8OtOmQmfvmyF/Xpx2gp3TqTmuvX1yJT1zYca2taEwbeVZNRulQc2PpnCW 0t7aJJuHReg/qE4cZ9r55zXm8bs+dOkSa6vuv82SxGDY8WTKtTwB+HB50NFQbxzsjkMU pQ6XxoIHrigICSntMzK2qB4EpvItLR/ci50XlUqEXI5bKhW0VTtqhe2pzeWOQ1sOSXqg 2y3W4z1PncdrI/TtBIqBtWrql6nxyNn9vebjJTNXP8zjbILIdEauqSfItMR4udM6KkL7 vQlRtGxA1oLjDY2RVwVw3ecJj6gSkD9NiMKBz2nFY54Uvo95Gvp3j5mrJSPswtrooBS4 XfCw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y25si826969edm.176.2020.09.23.14.55.21; Wed, 23 Sep 2020 14:55:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726632AbgIWVxx (ORCPT + 99 others); Wed, 23 Sep 2020 17:53:53 -0400 Received: from mga17.intel.com ([192.55.52.151]:36586 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726199AbgIWVxx (ORCPT ); Wed, 23 Sep 2020 17:53:53 -0400 IronPort-SDR: mIUDTGRSymmnYE56UqDrp3ysb3zWZ8dzw3+EjMmI/iOqT/3six//cTpABbIfwe8fjlAi/i5IDt 4StO1k5Tuyhw== X-IronPort-AV: E=McAfee;i="6000,8403,9753"; a="141037930" X-IronPort-AV: E=Sophos;i="5.77,295,1596524400"; d="scan'208";a="141037930" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Sep 2020 14:53:53 -0700 IronPort-SDR: R8tPOzfBFwE35C1bIv0L7gPeceJWTkWVyRmhP0IgOBgtYibE1kjpJIRFNJGMnsKj3nb9ynqiWJ bWoyTp8rGWow== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,295,1596524400"; d="scan'208";a="455085173" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by orsmga004.jf.intel.com with ESMTP; 23 Sep 2020 14:53:52 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Peter Shier , Oliver Upton Subject: [PATCH] KVM: x86: Reset MMU context if guest toggles CR4.SMAP or CR4.PKE Date: Wed, 23 Sep 2020 14:53:52 -0700 Message-Id: <20200923215352.17756-1-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Reset the MMU context during kvm_set_cr4() if SMAP or PKE is toggled. Recent commits to (correctly) not reload PDPTRs when SMAP/PKE are toggled inadvertantly skipped the MMU context reset due to the mask of bits that triggers PDPTR loads also being used to trigger MMU context resets. Fixes: 427890aff855 ("kvm: x86: Toggling CR4.SMAP does not load PDPTEs in PAE mode") Fixes: cb957adb4ea4 ("kvm: x86: Toggling CR4.PKE does not load PDPTEs in PAE mode") Cc: Jim Mattson Cc: Peter Shier Cc: Oliver Upton Signed-off-by: Sean Christopherson --- arch/x86/kvm/x86.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 17f4995e80a7..fd0da41bc149 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -977,6 +977,7 @@ int kvm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) unsigned long old_cr4 = kvm_read_cr4(vcpu); unsigned long pdptr_bits = X86_CR4_PGE | X86_CR4_PSE | X86_CR4_PAE | X86_CR4_SMEP; + unsigned long mmu_role_bits = pdptr_bits | X86_CR4_SMAP | X86_CR4_PKE; if (kvm_valid_cr4(vcpu, cr4)) return 1; @@ -1004,7 +1005,7 @@ int kvm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) if (kvm_x86_ops.set_cr4(vcpu, cr4)) return 1; - if (((cr4 ^ old_cr4) & pdptr_bits) || + if (((cr4 ^ old_cr4) & mmu_role_bits) || (!(cr4 & X86_CR4_PCIDE) && (old_cr4 & X86_CR4_PCIDE))) kvm_mmu_reset_context(vcpu); -- 2.28.0