Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1230848pxb; Fri, 21 Jan 2022 12:53:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJzEw/sFvNb127+HF0NAX5wRsLEeRoRbPju8297QI/+jZjjcfkXfGunXgg8UEqEN7/IgCkjW X-Received: by 2002:a17:90a:c287:: with SMTP id f7mr2434922pjt.29.1642798419771; Fri, 21 Jan 2022 12:53:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642798419; cv=none; d=google.com; s=arc-20160816; b=P+cboZKmEVwlw6+0LbvOaRZgmTMc0l1GbpwP5PxhQ0uQ59rEObifuEAM7BHVkFM+UZ xIZ8D1MewYH9vQyORxZg45R9w+4NQ3IdCCqdwUg+UJHF/UlgjBfYcV4Ysp2Ug00ywyz8 2izzb07BkGR3cu20mmZzHk79DaySe0Un9k6b1sFk1VpKLDXzwVyOWn9FejMQLY8iVeeI blH+FDOsYhLNLd8QinqK3X6LB/n7ApFSfY66dYJlgy3T4Id11apai09QZXsf/kipN+ax TNZb0dbEVqzaTCo18lBzbAVsBDiA3LnY+SOA1xFLVhIi9ZTautncvGVcczynGqpviKPt 9UZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:dkim-signature; bh=1MqJcaQdNhP8SCL+NFeqeJWTrEaCvBpqs2dZuCdHK2Y=; b=o+qWoAOjwu815hlst0qIdx2wqSfyzOtWeaE4i523iUyjIZx7jrd1bFlBhyJUGwcOcs uIgSJS7ICdcBHZTZ6kHs2lU4s6gkiVJTxC7txYElzu6wWRbYwewdutDFgKwFl1rdt76v UWY+mzQlmceisXDnFdnmMUP/THJIswG9rud4s6ksU/OtBeASMt/TkRSqisNVe1wN4WB2 1tzR8EJu3uXWOUMhFaIaUM2BeW//+jfH80qaab1LVCq4qdQ1phwg3BbbcQSO9zXBmdPn aDafcsfo/IRKGF+QbWzTut7uaHfZ0Zv2kCGYcCodcUkQ/3fWqT5Vr87eStgYCgsnbqY4 fN3w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=TJ2FWW5f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y6si9610678plg.343.2022.01.21.12.53.28; Fri, 21 Jan 2022 12:53:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=TJ2FWW5f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345260AbiATBI1 (ORCPT + 99 others); Wed, 19 Jan 2022 20:08:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49178 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1358160AbiATBHp (ORCPT ); Wed, 19 Jan 2022 20:07:45 -0500 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A51D9C061755 for ; Wed, 19 Jan 2022 17:07:38 -0800 (PST) Received: by mail-pf1-x449.google.com with SMTP id x11-20020aa7918b000000b004bd70cde509so2637278pfa.9 for ; Wed, 19 Jan 2022 17:07:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=1MqJcaQdNhP8SCL+NFeqeJWTrEaCvBpqs2dZuCdHK2Y=; b=TJ2FWW5fCZHdNotJ03suK35FRY2TDUvVarJkAb30a3e7GfYJF3iobX7j9DJFQG53Z1 wgPWmvuR7JMQvfC1HUgUxnySnvI8sjgfuIVo5whsXbAoVZWpCZGbcuz7lNCXs65mElDw HmtE71ykIxTNGP/rpz/VYH/dxgTy4KNJcVNglaLAj7sx/wzdbZTfrhsagKyLHEovu6BO +ZT651eiEOAcNUPKG3XIEQx2guE8OsYQTfnAsCWPww8AVHvTD4kuNMFNg/DJoq/syDdd wDJoUhAwQKejmydJGZ6wQJgVZZBrM3mIi7WEOJxyk1skav8lgp0o5i6SAiW391uQXlM5 kyYA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=1MqJcaQdNhP8SCL+NFeqeJWTrEaCvBpqs2dZuCdHK2Y=; b=YsLJtJgvwioP2ELNH5/lTZbNuoHTgPjLz4za2rA4vlZhTSuevX64Gi1+NgccvlWluM +CTpESPmZLynqJ9NQ5LvZaDW5v+ADcrKtZWUr5K+wJmSfUl+fzY+Zy9EiYu5wZ3jzQI0 giko+G3JepEaYd2kJu8/4j9ZsdkuEMN+c5FAzX/6Qn8Y6wy9hu2dEuYd8uoViTrb9bx1 srD8vMLviIVakQvvZRL4D+VL7Y/MiAelTA/LPxH1Fvwpx1MnGFndP1d2YgPX9ETklx7A JmS7/y99uIx6/tST6IXzRmir5GxZXvMalXsja8zWulbEIElv9ROflw3ONBHvnY1YNX8r aB9g== X-Gm-Message-State: AOAM530qM8lfOyhhDcF+0WwAFTsNVxpLCACur5DDmxJpp3RwHQlRXmKI XA/ohsc3OhtLTICuMi7OUACjqU1sEXQ= X-Received: from seanjc.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:3e5]) (user=seanjc job=sendgmr) by 2002:a17:90b:1c8f:: with SMTP id oo15mr7460001pjb.125.1642640858187; Wed, 19 Jan 2022 17:07:38 -0800 (PST) Reply-To: Sean Christopherson Date: Thu, 20 Jan 2022 01:07:19 +0000 In-Reply-To: <20220120010719.711476-1-seanjc@google.com> Message-Id: <20220120010719.711476-10-seanjc@google.com> Mime-Version: 1.0 References: <20220120010719.711476-1-seanjc@google.com> X-Mailer: git-send-email 2.34.1.703.g22d0c6ccf7-goog Subject: [PATCH 9/9] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Lendacky , Brijesh Singh , Liam Merwick Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Inject a #GP instead of synthesizing triple fault to try to avoid killing the guest if emulation of an SEV guest fails due to encountering the SMAP erratum. The injected #GP may still be fatal to the guest, e.g. if the userspace process is providing critical functionality, but KVM should make every attempt to keep the guest alive. Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/svm.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index a4b02a6217fd..88f5bbb0e6a1 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -4357,7 +4357,21 @@ static bool svm_can_emulate_instruction(struct kvm_vcpu *vcpu, int emul_type, is_user = svm_get_cpl(vcpu) == 3; if (smap && (!smep || is_user)) { pr_err_ratelimited("KVM: SEV Guest triggered AMD Erratum 1096\n"); - kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); + + /* + * If the fault occurred in userspace, arbitrarily inject #GP + * to avoid killing the guest and to hopefully avoid confusing + * the guest kernel too much, e.g. injecting #PF would not be + * coherent with respect to the guest's page tables. Request + * triple fault if the fault occurred in the kernel as there's + * no fault that KVM can inject without confusing the guest. + * In practice, the triple fault is moot as no sane SEV kernel + * will execute from user memory while also running with SMAP=1. + */ + if (is_user) + kvm_inject_gp(vcpu, 0); + else + kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); } resume_guest: -- 2.34.1.703.g22d0c6ccf7-goog