Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2384711pxj; Mon, 10 May 2021 01:23:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzjJyENWx1pG/iWQ8c14yfySfUCb7GjioNaRt3HGug0i6VEjXfS8yjp+rTxfMx7wcLXo5cE X-Received: by 2002:a50:ee88:: with SMTP id f8mr27461219edr.176.1620634981272; Mon, 10 May 2021 01:23:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620634981; cv=none; d=google.com; s=arc-20160816; b=gfmQKYMz4EO0voybKX7ALClisOqERQYWuKGDgu0evD8fZ6uk+5Sm+HIFJ+EY60D2GB eYllBSQzvvaoiNmRirfr8iegtWy1rqjgHqOkOGAHUoei19dfBHQwKnNr/DvJ/I9IkS4e Ip7wHpp3ckw1oqkEDv2TT1DDHafLiEkJzl7r99XvzrNQ7rr7ligXVFLsEW+j/jiEW+K1 UbGpW9XoK7Fbu0YDqQbNKQIFzZWD1TWTpzzYY0JsWpfy3fJ7W2pmWEe2hs/Wbx1QADP0 nrrGKrsXmrXdPxbMuSjHZrjtctu+J+VOEI2j1k6Q1MaGenQQXBnHDozOJWXOXL0u8ZgI SISQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=HfUuHKSBBdFn+jdFhIQV1RKcbYBM+dU846Gqym8cI/M=; b=nTMZTeNzisYLCjPZd7CS/YCePTuk4cSzioFJ3nddWOO5g6qAE0BmjpQtU78PfhzGaJ TykmHfor4Jwj4Idtos05Ky+8bOkv3UXbrvYKnvo/dWMa0e7oRrN9XGY6rEKzpe6gp62n yRDelFCmxMrfq5Z+Rn4e0FE+LMOeaB8TAgbRXGqF3CVk5A0dIkH70A76OPmUVMCjQZ8X qgifREDtCceeG1U28oAqZdKQwsgJUoQZFGET2bpkPkrwVYdx45lWTM3imnjoiLiUy89X QR32Pb5x1+72ltnRQuk9NLAmT8b8RilecnjjIt4UYjp91+d1G0zhOeQyZXJnpf6CdMTV wmWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ElS4Xlgm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c7si12615873edv.323.2021.05.10.01.22.38; Mon, 10 May 2021 01:23:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ElS4Xlgm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230153AbhEJIVk (ORCPT + 99 others); Mon, 10 May 2021 04:21:40 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:48630 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230093AbhEJIVj (ORCPT ); Mon, 10 May 2021 04:21:39 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620634834; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=HfUuHKSBBdFn+jdFhIQV1RKcbYBM+dU846Gqym8cI/M=; b=ElS4XlgmwcDFSyv5BU/rGBwv4qeeJwtYkQLmdDGh58zJHj/Lk2GcCWuK1a/2moEzUrOsbo Y6JPSgTCpJxxx5Je600bECow0oJ+TEOkGhf30NNotVN6wQx22oNZPqJH5Jao/H108SMeIu VcIjOVK7X3eVzjaom/Q05pTh1kAqMvY= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-483-F2PMQ6YTNIGGSrih2GUaMw-1; Mon, 10 May 2021 04:20:31 -0400 X-MC-Unique: F2PMQ6YTNIGGSrih2GUaMw-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 749C8107ACCD; Mon, 10 May 2021 08:20:29 +0000 (UTC) Received: from starship (unknown [10.40.194.86]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6D4AE1037F2C; Mon, 10 May 2021 08:20:26 +0000 (UTC) Message-ID: Subject: Re: [PATCH 06/15] KVM: SVM: Probe and load MSR_TSC_AUX regardless of RDTSCP support in host From: Maxim Levitsky To: Sean Christopherson , Paolo Bonzini Cc: Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Xiaoyao Li , Reiji Watanabe Date: Mon, 10 May 2021 11:20:25 +0300 In-Reply-To: <20210504171734.1434054-7-seanjc@google.com> References: <20210504171734.1434054-1-seanjc@google.com> <20210504171734.1434054-7-seanjc@google.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2021-05-04 at 10:17 -0700, Sean Christopherson wrote: > Probe MSR_TSC_AUX whether or not RDTSCP is supported in the host, and > if probing succeeds, load the guest's MSR_TSC_AUX into hardware prior to > VMRUN. Because SVM doesn't support interception of RDPID, RDPID cannot > be disallowed in the guest (without resorting to binary translation). > Leaving the host's MSR_TSC_AUX in hardware would leak the host's value to > the guest if RDTSCP is not supported. > > Note, there is also a kernel bug that prevents leaking the host's value. > The host kernel initializes MSR_TSC_AUX if and only if RDTSCP is > supported, even though the vDSO usage consumes MSR_TSC_AUX via RDPID. > I.e. if RDTSCP is not supported, there is no host value to leak. But, > if/when the host kernel bug is fixed, KVM would start leaking MSR_TSC_AUX > in the case where hardware supports RDPID but RDTSCP is unavailable for > whatever reason. > > Probing MSR_TSC_AUX will also allow consolidating the probe and define > logic in common x86, and will make it simpler to condition the existence > of MSR_TSX_AUX (from the guest's perspective) on RDTSCP *or* RDPID. > > Fixes: AMD CPUs > Cc: stable@vger.kernel.org > Signed-off-by: Sean Christopherson > --- > arch/x86/kvm/svm/svm.c | 18 ++++++++++-------- > 1 file changed, 10 insertions(+), 8 deletions(-) > > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > index 8f2b184270c0..b3153d40cc4d 100644 > --- a/arch/x86/kvm/svm/svm.c > +++ b/arch/x86/kvm/svm/svm.c > @@ -212,7 +212,7 @@ DEFINE_PER_CPU(struct svm_cpu_data *, svm_data); > * RDTSCP and RDPID are not used in the kernel, specifically to allow KVM to > * defer the restoration of TSC_AUX until the CPU returns to userspace. > */ > -#define TSC_AUX_URET_SLOT 0 > +static int tsc_aux_uret_slot __read_mostly = -1; > > static const u32 msrpm_ranges[] = {0, 0xc0000000, 0xc0010000}; > > @@ -959,8 +959,10 @@ static __init int svm_hardware_setup(void) > kvm_tsc_scaling_ratio_frac_bits = 32; > } > > - if (boot_cpu_has(X86_FEATURE_RDTSCP)) > - kvm_define_user_return_msr(TSC_AUX_URET_SLOT, MSR_TSC_AUX); > + if (!kvm_probe_user_return_msr(MSR_TSC_AUX)) { > + tsc_aux_uret_slot = 0; > + kvm_define_user_return_msr(tsc_aux_uret_slot, MSR_TSC_AUX); > + } > > /* Check for pause filtering support */ > if (!boot_cpu_has(X86_FEATURE_PAUSEFILTER)) { > @@ -1454,8 +1456,8 @@ static void svm_prepare_guest_switch(struct kvm_vcpu *vcpu) > } > } > > - if (static_cpu_has(X86_FEATURE_RDTSCP)) > - kvm_set_user_return_msr(TSC_AUX_URET_SLOT, svm->tsc_aux, -1ull); > + if (likely(tsc_aux_uret_slot >= 0)) > + kvm_set_user_return_msr(tsc_aux_uret_slot, svm->tsc_aux, -1ull); > > svm->guest_state_loaded = true; > } > @@ -2664,7 +2666,7 @@ static int svm_get_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > msr_info->data |= (u64)svm->sysenter_esp_hi << 32; > break; > case MSR_TSC_AUX: > - if (!boot_cpu_has(X86_FEATURE_RDTSCP)) > + if (tsc_aux_uret_slot < 0) > return 1; > if (!msr_info->host_initiated && > !guest_cpuid_has(vcpu, X86_FEATURE_RDTSCP)) > @@ -2885,7 +2887,7 @@ static int svm_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr) > svm->sysenter_esp_hi = guest_cpuid_is_intel(vcpu) ? (data >> 32) : 0; > break; > case MSR_TSC_AUX: > - if (!boot_cpu_has(X86_FEATURE_RDTSCP)) > + if (tsc_aux_uret_slot < 0) > return 1; > > if (!msr->host_initiated && > @@ -2908,7 +2910,7 @@ static int svm_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr) > * guest via direct_access_msrs, and switch it via user return. > */ > preempt_disable(); > - r = kvm_set_user_return_msr(TSC_AUX_URET_SLOT, data, -1ull); > + r = kvm_set_user_return_msr(tsc_aux_uret_slot, data, -1ull); > preempt_enable(); > if (r) > return 1; If L1 has ignore_msrs=1, then we will end up writing the IA32_TSC_AUX for nothing, but this shouldn't be that of a big deal, so: Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky