Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3709023pxv; Mon, 5 Jul 2021 03:57:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw5V4cKd0Dl/TBfYMrt5KLPcuV/wmXDZsOwUEPGFW+OFL7GqolKbRDA5VQGmIp3cDKXjtqR X-Received: by 2002:a05:6e02:bed:: with SMTP id d13mr9726150ilu.259.1625482663278; Mon, 05 Jul 2021 03:57:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625482663; cv=none; d=google.com; s=arc-20160816; b=VNpveEnjonD787p9WBHVolB7udocDttg7mQsDITXaiz0+IHqIuTVfUlQPH/8E/pfoC xzagvvcq65jnjR+MpCMW7ZJFBw4KGv4V2BrqIi/tOJBTf6Xyp5wd6iAZ9/6a0MhxkQ0m kZNSlJa5SAqRzmddAFqJCHzsaGJPgppe9SY4Kh+vSAoZIfNTpk2+ShSFu7VtJuR39k7I /F+twyhAJ8gjNaKBvXve0y9p13YC3hMO4eusmKmhjh4LE4A4ALK3AVwfxUJb5Y/wT4CL mKyDef57ppJvlpTrINz72XYqbvmDpwKkLfKCxwdpFyV4fqiBN7QzlLpGUM9Qve+HR6qe hjCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=1d8evFxshPbz+R4GzcYI89BTbUjKPq+xnJSq61B9tsk=; b=MJxhb70noInKksXLTotaz+vX9ZDAwB+ns9uKHMUJMCkkEy2f/bLKchVnGy7GQXffos diFmc/9qtRzzr7QQEpquMTf0reh49UyhVsDU+twJxGxiJePY44zC6dGIgxFITofcHI3t YIQwsQPcREk78flpeYVsOSDW7mDEEPki92TbOUladSrywXwyHFP57gJl/b1+qyuEaAi6 SvlbXx1jp8n5MvR0M1IU65QWp9R346WJXQqlONrUz+lAlCJx7SRM5b9vOL6LscLvkwGp b1V03X1kfSNXglQiPcCcL/S0rhXWDiBMwfP/xHB0ziO6XdYKHutTBkCRqE7GlG9NpO+a i08w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="gO+Cr/eE"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f16si10586726iol.39.2021.07.05.03.57.32; Mon, 05 Jul 2021 03:57:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="gO+Cr/eE"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231254AbhGEK7h (ORCPT + 99 others); Mon, 5 Jul 2021 06:59:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:46600 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231194AbhGEK7g (ORCPT ); Mon, 5 Jul 2021 06:59:36 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id ECB976141C; Mon, 5 Jul 2021 10:56:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625482619; bh=nBBCshwa0SBmy7QWZKBF/I8NZCmcY3AjHk0uA2km5iA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gO+Cr/eEe9zjqwvCAsAzlRqpvuiYEZHytMoWHPTM6yrhvwdR5TbsnevxRB1AqzKYX bbSe9fmpCYd2N7ohCeDoh5NrGu4aFlSqONWJY5NPC3csGRrJghgGUem1woqrkzbshw yZDkgp0vVTPhlfXStAnsG25LIgODvvol0XK+sjkeeCWVz3SCPiC2/SF+Uq796/OOOL U3rulW468DR7QPxpizu61m1FmjC5SjLookIkvGMUOpTsS6klmPmXx/LBrlCqtJJ/30 /+1ry1Tmvmz/TBYUPqkqW+P8gLMIHM+Qqij940soWJULMS56CLw1+ya3fnlv7C6R6O GlHY68YZ3VIJw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Sean Christopherson , Paolo Bonzini , Greg Kroah-Hartman Subject: [PATCH 5.13 1/2] Revert "KVM: x86/mmu: Drop kvm_mmu_extended_role.cr4_la57 hack" Date: Mon, 5 Jul 2021 06:56:55 -0400 Message-Id: <20210705105656.1512997-2-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210705105656.1512997-1-sashal@kernel.org> References: <20210705105656.1512997-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.13.1-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.13.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.13.1-rc1 X-KernelTest-Deadline: 2021-07-07T10:49+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson commit f71a53d1180d5ecc346f0c6a23191d837fe2871b upstream. Restore CR4.LA57 to the mmu_role to fix an amusing edge case with nested virtualization. When KVM (L0) is using TDP, CR4.LA57 is not reflected in mmu_role.base.level because that tracks the shadow root level, i.e. TDP level. Normally, this is not an issue because LA57 can't be toggled while long mode is active, i.e. the guest has to first disable paging, then toggle LA57, then re-enable paging, thus ensuring an MMU reinitialization. But if L1 is crafty, it can load a new CR4 on VM-Exit and toggle LA57 without having to bounce through an unpaged section. L1 can also load a new CR3 on exit, i.e. it doesn't even need to play crazy paging games, a single entry PML5 is sufficient. Such shenanigans are only problematic if L0 and L1 use TDP, otherwise L1 and L2 share an MMU that gets reinitialized on nested VM-Enter/VM-Exit due to mmu_role.base.guest_mode. Note, in the L2 case with nested TDP, even though L1 can switch between L2s with different LA57 settings, thus bypassing the paging requirement, in that case KVM's nested_mmu will track LA57 in base.level. This reverts commit 8053f924cad30bf9f9a24e02b6c8ddfabf5202ea. Fixes: 8053f924cad3 ("KVM: x86/mmu: Drop kvm_mmu_extended_role.cr4_la57 hack") Cc: stable@vger.kernel.org Signed-off-by: Sean Christopherson Message-Id: <20210622175739.3610207-6-seanjc@google.com> Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/mmu/mmu.c | 1 + 2 files changed, 2 insertions(+) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 9c7ced0e3171..682e82956ea5 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -320,6 +320,7 @@ union kvm_mmu_extended_role { unsigned int cr4_pke:1; unsigned int cr4_smap:1; unsigned int cr4_smep:1; + unsigned int cr4_la57:1; unsigned int maxphyaddr:6; }; }; diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 8d5876dfc6b7..a54f72c31be9 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -4476,6 +4476,7 @@ static union kvm_mmu_extended_role kvm_calc_mmu_role_ext(struct kvm_vcpu *vcpu) ext.cr4_smap = !!kvm_read_cr4_bits(vcpu, X86_CR4_SMAP); ext.cr4_pse = !!is_pse(vcpu); ext.cr4_pke = !!kvm_read_cr4_bits(vcpu, X86_CR4_PKE); + ext.cr4_la57 = !!kvm_read_cr4_bits(vcpu, X86_CR4_LA57); ext.maxphyaddr = cpuid_maxphyaddr(vcpu); ext.valid = 1; -- 2.30.2