Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1231176pxb; Fri, 21 Jan 2022 12:54:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJwHWEbzDOa3gIt6eQcYi9ybbtdib+TNjZvv38emlNqwf7Heg1Y/65+nBdf5ZYnJIf07Pn7N X-Received: by 2002:a17:90b:4b8c:: with SMTP id lr12mr2425744pjb.32.1642798454984; Fri, 21 Jan 2022 12:54:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642798454; cv=none; d=google.com; s=arc-20160816; b=Dgnw00UUlhoNGVy/wqijmyRLEwCvNrTolm+5VPkUEA40epUoWK+k3cOiQ+ngwFOGlC xmXNCrAvaIxaczKJK9oVBx/Rf++KClkRTtKoic6xO5njFqJ3x8udVAUmKPdGSER5H8Da 49CNhnRaPLlrTE97hIs5cdoXgnygA9hZwE9vkoVUqzuG/K7AL05pEiYqgd72CI3HOQ/y zvgu/uYDMFc7Jd0qxBUQaGG3bq8YDBEq4uv5viKD3JLlyrB2MUIQLvtwwMHUwKX0n/9k mo174B8ZW1HTyH+kkV8krHAg5YutzugHPohaJ+d+MRIU6rMLKivLsxjfgESBjyPt2gX8 K6VQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:dkim-signature; bh=yJF8IE4woQyFxdtp6qxfyGJA8OkTrqLP6YfwBFeba+0=; b=tFAoWtaGr52lX+5UrViGA8TyG9O8BIzcgP7NZPgV5uF4gxt7wQdjzyDxwV6dTzw+Tr RYIPgp9iDnPsNrf5rGxufWc0Q4JO6h+thiV/SSEKzJAdqxCqyH1Diu1oLE5CaI17tGUs HzmWSJcaPBt9aLazoOOAPr1L9wJvCByMD5yQrHAZyPxz50tDWf9qHfDoeAsVJHs7Wv81 eaS1CVi569MEuF+E5SCxhiaox+F9TCn0td3CxLCLcl+mFVHQDZu1JWdVAXRzW7hZ5jXH NLMbOE13bKwCxlFuk6Y4JvVQh9ilUV8MT1Urwk9D+y3savuycL19CCAzJcBwf/dMgQkm 49LQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=tlZuieks; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t19si5177617pgu.36.2022.01.21.12.54.03; Fri, 21 Jan 2022 12:54:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=tlZuieks; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358121AbiATBID (ORCPT + 99 others); Wed, 19 Jan 2022 20:08:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49166 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1358148AbiATBHo (ORCPT ); Wed, 19 Jan 2022 20:07:44 -0500 Received: from mail-pl1-x649.google.com (mail-pl1-x649.google.com [IPv6:2607:f8b0:4864:20::649]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1A0BCC061747 for ; Wed, 19 Jan 2022 17:07:37 -0800 (PST) Received: by mail-pl1-x649.google.com with SMTP id y17-20020a170902d65100b0014a17faf0bdso723880plh.12 for ; Wed, 19 Jan 2022 17:07:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=yJF8IE4woQyFxdtp6qxfyGJA8OkTrqLP6YfwBFeba+0=; b=tlZuieks+J1SbXLVjDBQ3/s8r9tSTvUzUKdZ/9IkvvKjtAGgLZPFbyfoK01Ktf8Tkr afeWSISvuS+1bOBsyY9jlj+pPixqUl4vGgFpbzY2bsJcqXMgwSeEnr5PVGg2OkKLWhAB H9Qx9zexDs6VtK2wzDfPHR/qA8gX3KHT+vnu2hTJhb7cMWCFghrydxmDBEgxBgv2XLv/ YZTXEAtE3nAzSv3MLLUuQMPG1LtEFqz0Rpryy+0N0erQnHPHb4iU+7rYvM6DosGIp1ps ZhJBX5nrDI8jLj3bIb38VGbxP3mAoTrOg2nJnlygiw902c2tNYjnhjkuW7gmqAXDiCMX iUYQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=yJF8IE4woQyFxdtp6qxfyGJA8OkTrqLP6YfwBFeba+0=; b=kHDh1h2FIFhhyCei6ho17NL7R+g2lyAl9LZnXtKZLGLwvFq5wt5WC5QThaM/EDeLK0 Wnd3TcLDsM2c/57+0r0naav6GZj6B6rEl3g6vsOA4jkLoR2BnBlRxgEIB73doB28ji7e J2A5FpwnEPU6hoawu6Z+VHfPN0Qz6ay2Kmn1joN44GVFmJ9cE6evbHYQF/fyZINcW+V+ CbI19LRigw3u8DRxR/Jp0iu/LRw1SVKw/tZEvQLjlewk2iOxwE8Jpjh7jhgbFJe0pt+t OpULAHuS2RFJtPmA7FgwtW9BgzFrHHH8j/mxlbDBb6xyXB0nTAMEvL5dYBQAh7XcVDGR Q1rg== X-Gm-Message-State: AOAM533lRjoDBMhP69Wh2eB4f+GbiNOgiVStZ0OEp7d/1pZ8/02WR3Bu ES3GlZ6zOMGddwuEPCe9WAg5kIzPicQ= X-Received: from seanjc.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:3e5]) (user=seanjc job=sendgmr) by 2002:a05:6a00:1308:b0:4c5:e231:afd4 with SMTP id j8-20020a056a00130800b004c5e231afd4mr2350283pfu.34.1642640856552; Wed, 19 Jan 2022 17:07:36 -0800 (PST) Reply-To: Sean Christopherson Date: Thu, 20 Jan 2022 01:07:18 +0000 In-Reply-To: <20220120010719.711476-1-seanjc@google.com> Message-Id: <20220120010719.711476-9-seanjc@google.com> Mime-Version: 1.0 References: <20220120010719.711476-1-seanjc@google.com> X-Mailer: git-send-email 2.34.1.703.g22d0c6ccf7-goog Subject: [PATCH 8/9] KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT access From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Lendacky , Brijesh Singh , Liam Merwick Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Resume the guest instead of synthesizing a triple fault shutdown if the instruction bytes buffer is empty due to the #NPF being on the code fetch itself or on a page table access. The SMAP errata applies if and only if the code fetch was successful and ucode's subsequent data read from the code page encountered a SMAP violation. In practice, the guest is likely hosed either way, but crashing the guest on a code fetch to emulated MMIO is technically wrong according to the behavior described in the APM. Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/svm.c | 43 +++++++++++++++++++++++++++++++++--------- 1 file changed, 34 insertions(+), 9 deletions(-) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index d324183fc596..a4b02a6217fd 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -4262,6 +4262,7 @@ static bool svm_can_emulate_instruction(struct kvm_vcpu *vcpu, int emul_type, { bool smep, smap, is_user; unsigned long cr4; + u64 error_code; /* Emulation is always possible when KVM has access to all guest state. */ if (!sev_guest(vcpu->kvm)) @@ -4325,22 +4326,31 @@ static bool svm_can_emulate_instruction(struct kvm_vcpu *vcpu, int emul_type, * loap uop with CPL=0 privileges. If the load hits a SMAP #PF, ucode * gives up and does not fill the instruction bytes buffer. * - * Detection: - * KVM reaches this point if the VM is an SEV guest, the CPU supports - * DecodeAssist, a #NPF was raised, KVM's page fault handler triggered - * emulation (e.g. for MMIO), and the CPU returned 0 in GuestIntrBytes - * field of the VMCB. + * As above, KVM reaches this point iff the VM is an SEV guest, the CPU + * supports DecodeAssist, a #NPF was raised, KVM's page fault handler + * triggered emulation (e.g. for MMIO), and the CPU returned 0 in the + * GuestIntrBytes field of the VMCB. * * This does _not_ mean that the erratum has been encountered, as the * DecodeAssist will also fail if the load for CS:RIP hits a legitimate * #PF, e.g. if the guest attempt to execute from emulated MMIO and * encountered a reserved/not-present #PF. * - * To reduce the likelihood of false positives, take action if and only - * if CR4.SMAP=1 (obviously required to hit the erratum) and CR4.SMEP=0 - * or CPL=3. If SMEP=1 and CPL!=3, the erratum cannot have been hit as - * the guest would have encountered a SMEP violation #PF, not a #NPF. + * To hit the erratum, the following conditions must be true: + * 1. CR4.SMAP=1 (obviously). + * 2. CR4.SMEP=0 || CPL=3. If SMEP=1 and CPL<3, the erratum cannot + * have been hit as the guest would have encountered a SMEP + * violation #PF, not a #NPF. + * 3. The #NPF is not due to a code fetch, in which case failure to + * retrieve the instruction bytes is legitimate (see abvoe). + * + * In addition, don't apply the erratum workaround if the #NPF occurred + * while translating guest page tables (see below). */ + error_code = to_svm(vcpu)->vmcb->control.exit_info_1; + if (error_code & (PFERR_GUEST_PAGE_MASK | PFERR_FETCH_MASK)) + goto resume_guest; + cr4 = kvm_read_cr4(vcpu); smep = cr4 & X86_CR4_SMEP; smap = cr4 & X86_CR4_SMAP; @@ -4350,6 +4360,21 @@ static bool svm_can_emulate_instruction(struct kvm_vcpu *vcpu, int emul_type, kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); } +resume_guest: + /* + * If the erratum was not hit, simply resume the guest and let it fault + * again. While awful, e.g. the vCPU may get stuck in an infinite loop + * if the fault is at CPL=0, it's the lesser of all evils. Exiting to + * userspace will kill the guest, and letting the emulator read garbage + * will yield random behavior and potentially corrupt the guest. + * + * Simply resuming the guest is technically not a violation of the SEV + * architecture. AMD's APM states that all code fetches and page table + * accesses for SEV guest are encrypted, regardless of the C-Bit. The + * APM also states that encrypted accesses to MMIO are "ignored", but + * doesn't explicitly define "ignored", i.e. doing nothing and letting + * the guest spin is technically "ignoring" the access. + */ return false; } -- 2.34.1.703.g22d0c6ccf7-goog