Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1493537pxj; Fri, 18 Jun 2021 08:18:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyoV0DY4XzidD6wMmEshtaGTWq//bqJ3tj/onqwXuasa9wBL7tIEJyBMggcvK3uTJLPm5ST X-Received: by 2002:a05:6e02:1383:: with SMTP id d3mr6734079ilo.172.1624029528108; Fri, 18 Jun 2021 08:18:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624029528; cv=none; d=google.com; s=arc-20160816; b=rKaaflQlzYY9nMj1Z4GRJPvC/8UGuTxVYDbLE2HeA8/Z4uzkcwl3LOKWoB/0BTtTaW UXO3+C+TEadb2TjpsjyvMiqc0OIB9+x3ISMiDQ/RtExjULK3HjHEHN8APBJCd6GcVZ74 K6kkP/WUz62eMNSU5aqFPLvkwxB7aZJgqpXQQjF0yBNp1kDPkPK8a2QlIfZa6fcQhgDf 4E0Ixku0ySnp6gp3OSrEK1IKalUhA6RcOXV7V9LduGFfhMz2DzdzBE3PaX2WPguOGgAA WfTKcTTRIqXJ9oCVXeM1dQ+ArKg9pbHb9lJhjkkhePC8ZsmbKRjXsu41O3UuyQ4h3+/R RpyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=hfAvw0hgq0EhOtnnmtyXispMmzn0udfGL2kHrYegWv0=; b=fhmzhFXcmsIPn6A/gpDocAZLIu8peCti4Jb8boDckjUksabG/mzeTJPxDCUlVw15zM y0BPEWAYLtIzrFW/GJpJPfsdmpmSdSMo6GaP+M7biQ8tOvTgkQUCopwwQuHqf/YufDG7 hfbtCoxA4Nohn15g+YSb4zuRgdL7Tm21C5C0nQq6UkWI3CVDdRDIz081wCrTit6CAYvf HlMmr7EbWl+VVQy67LeJD6aPOlaTZTF3K65OO8xqk6cNTwm/DIKmGrn5SEbP5+4dKMEa Dbejv0aNnzSjsUJQJkdimZJ6Hr+xEd92R5SkK2sTR8gulsqkwlnslg8i2xFBr7DxxTVg TIzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="AaZ4T/gK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m7si2390742ilq.122.2021.06.18.08.18.35; Fri, 18 Jun 2021 08:18:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="AaZ4T/gK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233708AbhFRKef (ORCPT + 99 others); Fri, 18 Jun 2021 06:34:35 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:45201 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233749AbhFRKeR (ORCPT ); Fri, 18 Jun 2021 06:34:17 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1624012328; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=hfAvw0hgq0EhOtnnmtyXispMmzn0udfGL2kHrYegWv0=; b=AaZ4T/gKtA9YLc3UFA2R7YuDmiuLM8KOOmYzo2ljdS8Z0dRJ3OevZCDA6IzWdlnxhmyLX1 +hgQZuKlzDhHqzfNmGXNj6XQDgjhSecmEPUTNT6451DBr/7ghH8I9n50tVL0klSXrtz6dq ix/54dbkBLH7lMrJbfx53QAJCsfrJg0= Received: from mail-ej1-f69.google.com (mail-ej1-f69.google.com [209.85.218.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-537-oMgRDa_7OdK-sOXH8kRaqA-1; Fri, 18 Jun 2021 06:32:07 -0400 X-MC-Unique: oMgRDa_7OdK-sOXH8kRaqA-1 Received: by mail-ej1-f69.google.com with SMTP id lt4-20020a170906fa84b0290481535542e3so1881538ejb.18 for ; Fri, 18 Jun 2021 03:32:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=hfAvw0hgq0EhOtnnmtyXispMmzn0udfGL2kHrYegWv0=; b=Ki1d3V3T1syhnA42zY2HLKCFIieo2mqJfp9pK6rPXJ97Md51Dw5F1gXAr4zJlNtBkK 1mREyfLs1w7ijpJ656pC3ieSXzSwZSlKtoIGLVDZGS26RtnPgm/U3ktIShM2PijZOLIj 5uJh/O7oheNFIGDJf6A6T1NV6lziwPsK7/VTHLRWaHBUr78oQh8puLNh28Niuek09XwR 7YvrZv+Gk0zZ5o0/8XJrEDBhJfRu/w/qbF4C4zXmAxrgoyH1KfujBN5xjMlzgX0MRECE q0bsCaR50QrcCx06TfwGKzWwLP8NQ4i9mam4+rChEz2f9UIqBFAuWpB4pONiatfYbm45 9fqg== X-Gm-Message-State: AOAM5317E/oU+4b+VLO3HunKO/JUgeBRBXpE6UFTzHyUyfODeNYWg/Mu dvcIgkSeMkMk6xMy9PEtNnVKGwnPRqODsygdHTgLiQXFGYT6/JEfHygzuHGCKy37K4kZFOOFqrw MrTcBtrt4bd+f+KgCOenMgVAsczuoKasaPVIkmwsIA+LXyusy1HUN/U2esjVEn3K24V9gjGmrnT Ac X-Received: by 2002:a17:906:6d59:: with SMTP id a25mr2090262ejt.83.1624012325584; Fri, 18 Jun 2021 03:32:05 -0700 (PDT) X-Received: by 2002:a17:906:6d59:: with SMTP id a25mr2090238ejt.83.1624012325419; Fri, 18 Jun 2021 03:32:05 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:c8dd:75d4:99ab:290a? ([2001:b07:6468:f312:c8dd:75d4:99ab:290a]) by smtp.gmail.com with ESMTPSA id o5sm5925198edq.8.2021.06.18.03.32.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 18 Jun 2021 03:32:04 -0700 (PDT) Subject: Re: [PATCH 0/4] KVM: x86: Require EFER.NX support unless EPT is on To: Sean Christopherson Cc: Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org References: <20210615164535.2146172-1-seanjc@google.com> From: Paolo Bonzini Message-ID: <388739c8-6881-8fa7-2025-53b9a464c4cb@redhat.com> Date: Fri, 18 Jun 2021 12:32:04 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: <20210615164535.2146172-1-seanjc@google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 15/06/21 18:45, Sean Christopherson wrote: > KVM has silently required EFER.NX support for shadow paging for well over > a year, and for NPT for roughly the same amount of time. Attempting to > run any VM with shadow paging on a system without NX support will fail due > to invalid state, while enabling nx_huge_pages with NPT and no NX will > explode due to setting a reserved bit in the page tables. > > I really, really wanted to require NX across the board, because the lack > of bug reports for the shadow paging change strongly suggests no one is > running KVM on a CPU that truly doesn't have NX. But, Intel CPUs let > firmware disable NX via MISC_ENABLES, so it's plausible that there are > users running KVM with EPT and no NX. > > Sean Christopherson (4): > KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled > KVM: SVM: Refuse to load kvm_amd if NX support is not available > KVM: x86: WARN and reject loading KVM if NX is supported but not > enabled > KVM: x86: Simplify logic to handle lack of host NX support > > arch/x86/kvm/cpuid.c | 13 +++++-------- > arch/x86/kvm/svm/svm.c | 13 ++++++++++--- > arch/x86/kvm/vmx/vmx.c | 6 ++++++ > arch/x86/kvm/x86.c | 3 +++ > 4 files changed, 24 insertions(+), 11 deletions(-) > Queued 1-3, thanks. Paolo