Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4845887imw; Tue, 19 Jul 2022 14:36:36 -0700 (PDT) X-Google-Smtp-Source: AGRyM1s2D87JU4jb5VF/P8xD93TPEEFWvewUqZnnkMd7wKL/ChSbftmMWGfBZVBtmfFCZMy9vGh1 X-Received: by 2002:a17:907:a40d:b0:72b:7f56:650 with SMTP id sg13-20020a170907a40d00b0072b7f560650mr31932886ejc.132.1658266595946; Tue, 19 Jul 2022 14:36:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658266595; cv=none; d=google.com; s=arc-20160816; b=o2AiMHnsaQFsD5b/Gt3+IMiyEeiSjCse3/xUhUwYG5XIaZBoqmf7ugOfQ5FwOiOZKt ji2vC4JpW7CTj5PDH/JO9NYWJjIwoFZubxvEr/W3tf5GK60Nrqwp/0wR5SBrVDCptB/h 0J2V/7B0C0h7rPIc0nPYjW0882RrNnHLPiPj4wGScvLrCi0n5efqTgTxXuSvXdSLvo4d +ScBSAFtSTPNm5zwrG3TIijyI6iI786ETES3ZRgiPPqQxJtBj4kGJiuYgrtDzkvbUD9f 5SUdXSTzjYgguYlD5n0xMkFYe0MH3gJXaDvh0/SbHysKFrclidD26Sif5Vu4r1KVtexG 0DNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=cYVp/nlRdcsoI2H32MIQGQAodRMFGI+WBzT8OOmcyxw=; b=K9hA6uzn2zl5ol8Ff3a8VVfGqD7+VK3tdiE4aW9+6MsUYZAaCfhVlf586Zm0thoVMx 5E9PYvcpf4jgZCVwBP2Gs/K+NXzg6Ng89EiKFlHCwgHzvfahyeyCxeSujg18/5lKTRqn 4oatN+8WRJsVn/l3iMt4WS8JacpfynhWBKaqPk3HErI9eDCh+j+3icEgZYs3FWzyj7Aw 9vyM9DQPk6/MTXm7N6blC998EzH42etPO6uDBY2DbuNK3XxmkMsJdKhNZP8ngpUzdvwZ S/K6YL3p+Y43fftqqN5uGPDBvUCuHZRUvKvdVyaNdyXdOveADpqsq/2PllZM+ObABPg7 YUQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=FN47cqTC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sh36-20020a1709076ea400b0072f136ddbc2si15484260ejc.473.2022.07.19.14.36.11; Tue, 19 Jul 2022 14:36:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=FN47cqTC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236222AbiGSVR2 (ORCPT + 99 others); Tue, 19 Jul 2022 17:17:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58836 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235395AbiGSVR1 (ORCPT ); Tue, 19 Jul 2022 17:17:27 -0400 Received: from mail-pl1-x633.google.com (mail-pl1-x633.google.com [IPv6:2607:f8b0:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E331C5E82B for ; Tue, 19 Jul 2022 14:17:25 -0700 (PDT) Received: by mail-pl1-x633.google.com with SMTP id q5so13127215plr.11 for ; Tue, 19 Jul 2022 14:17:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=cYVp/nlRdcsoI2H32MIQGQAodRMFGI+WBzT8OOmcyxw=; b=FN47cqTCWHvViTc/VanAjbyeK5K6/xJChcATpbdMDsb0p1T3Zx4YfI0Q6f4L36zHnv lCIs8nuOTgbW6Khw0Y4RDRBZj2T3P0KYDw/0Ha6zYO/rkeTK+VkCNfPa6+Miq8T+5Mzx Uix3Gaq6nUWrdzSk3/Ab2+UDCu5L7gIcqx3BmoPxzvQyqLw9EiJYZeliUxnL6h4LU1Qe 6QosoYVrSXW16f28U2CoEgMmjiPDcMXgDL6dF4bWzoYPzxtRGCdWJ2N0C76RBszyUVdi QOZzWPZ58UrUZoYpA8UAnhTwc2DVZpeWmjJoufq43mVhO+HZJpf6D6bn1Prl+KauGQWk N8YA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=cYVp/nlRdcsoI2H32MIQGQAodRMFGI+WBzT8OOmcyxw=; b=CXd5aPnHpQXM+zRIIGfsjjgFuPIlQ3jfQZn3ePgmKeXT7+KbNj+3+szPxnD1xPoP/T JSzp0vohSq+dOu/r2QaCrtxuBOPVfMQXvl2dfIsOpNrcij+loyWzhW85P3voVqBqDf++ /Z67scXw/xp4z0RvFqNnCgDQ+l2EkiS2gXcTcpsF0Ze1/pUvKJzx1EeHpYi4IJEpwqER 8tSH27R2lHAcTjBezUGCzpRSpntoWCCCtLWjo+kMuaBZfXbl8f961HocIa/2hB2RnmmX ZGudIBbImRDhqcHqlW5CI3X7pnhxpX4AMmSyLHzQqAW8OfM22qKac6+1IQyX5xSKiewg Hhkw== X-Gm-Message-State: AJIora9IZiyVhm84jKWZRrMgxAETQy7xU5KieLxENZKfoGa1dB1PN+9F KEt0QCPAVGdJaQCeQpfdgry2YTCNmUNE1g== X-Received: by 2002:a17:902:f788:b0:16c:f48b:905e with SMTP id q8-20020a170902f78800b0016cf48b905emr11466413pln.60.1658265445209; Tue, 19 Jul 2022 14:17:25 -0700 (PDT) Received: from google.com (123.65.230.35.bc.googleusercontent.com. [35.230.65.123]) by smtp.gmail.com with ESMTPSA id n17-20020a170902e55100b0016c1b178628sm12217292plf.269.2022.07.19.14.17.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Jul 2022 14:17:24 -0700 (PDT) Date: Tue, 19 Jul 2022 21:17:21 +0000 From: Sean Christopherson To: Lai Jiangshan Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Vitaly Kuznetsov , Maxim Levitsky , David Matlack , Lai Jiangshan Subject: Re: [PATCH V3 01/12] KVM: X86/MMU: Verify PDPTE for nested NPT in PAE paging mode when page fault Message-ID: References: <20220521131700.3661-1-jiangshanlai@gmail.com> <20220521131700.3661-2-jiangshanlai@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220521131700.3661-2-jiangshanlai@gmail.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, May 21, 2022, Lai Jiangshan wrote: > From: Lai Jiangshan > Fixes: e4e517b4be01 ("KVM: MMU: Do not unconditionally read PDPTE from guest memory") > Signed-off-by: Lai Jiangshan > --- > arch/x86/kvm/mmu/paging_tmpl.h | 39 ++++++++++++++++++++++++++++++++++ > 1 file changed, 39 insertions(+) > > diff --git a/arch/x86/kvm/mmu/paging_tmpl.h b/arch/x86/kvm/mmu/paging_tmpl.h > index db80f7ccaa4e..6e3df84e8455 100644 > --- a/arch/x86/kvm/mmu/paging_tmpl.h > +++ b/arch/x86/kvm/mmu/paging_tmpl.h > @@ -870,6 +870,44 @@ static int FNAME(page_fault)(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault > if (is_page_fault_stale(vcpu, fault, mmu_seq)) > goto out_unlock; > > + /* > + * When nested NPT enabled and L1 is PAE paging, mmu->get_pdptrs() > + * which is nested_svm_get_tdp_pdptr() reads the guest NPT's PDPTE > + * from memory unconditionally for each call. > + * > + * The guest PAE root page is not write-protected. I think it's worth calling out that it's simply not feasible to write-protect PDPTEs due to them not covering a full page. And looking at this comment as a whole, while I love detailed comments, I think it'd be better off to avoid referring to mmu->get_pdptrs() and use more generic terminology when talking about KVM. I think this is accurate? /* * If KVM is shadowing nested NPT and L1 is using PAE paging, zap the * root for the PDPTE if the cached value doesn't match the entry at the * time of the page fault, and resume the guest to rebuid the root. * This is effectively a variation of write-protection, where the target * SPTE(s) is zapped on use instead of on write. * * Under SVM with NPT+PAE, the CPU does NOT cache PDPTEs and instead * handles them as it would any other page table entry. I.e. KVM can't * cache PDPTEs at nested VMRUN without violating the SVM architecture. * * KVM doesn't write-protect PDPTEs because CR3 only needs to be 32-byte * aligned and sized when using PAE paging, whereas write-protection * works at page granularity. */ > + * > + * The mmu->get_pdptrs() in FNAME(walk_addr_generic) might get a value > + * different from previous calls or different from the return value of > + * mmu->get_pdptrs() in mmu_alloc_shadow_roots(). > + * > + * It will cause FNAME(fetch) installs the spte in a wrong sp or links > + * a sp to a wrong parent if the return value of mmu->get_pdptrs() > + * is not verified unchanged since FNAME(gpte_changed) can't check > + * this kind of change. > + * > + * Verify the return value of mmu->get_pdptrs() (only the gfn in it > + * needs to be checked) and do kvm_mmu_free_roots() like load_pdptr() > + * if the gfn isn't matched. > + * > + * Do the verifying unconditionally when the guest is PAE paging no > + * matter whether it is nested NPT or not to avoid complicated code. Doing this unconditionally just trades one architecturally incorrect behavior with another. Does any real world use case actually care? Probably not. But the behavior is visible to software, and I don't think it costs us much to get it right. There are a number of ways to handle this, e.g. set a flag in kvm_init_shadow_npt_mmu() and consume it here. We could probably even burn a bit in kvm_mmu_extended_role since we have lots of bits to burn. E.g. if (vcpu->arch.mmu->cpu_role.ext.npt_pae) { } > + */ > + if (vcpu->arch.mmu->cpu_role.base.level == PT32E_ROOT_LEVEL) { > + u64 pdpte = vcpu->arch.mmu->pae_root[(fault->addr >> 30) & 3]; > + struct kvm_mmu_page *sp = NULL; > + > + if (IS_VALID_PAE_ROOT(pdpte)) > + sp = to_shadow_page(pdpte & PT64_BASE_ADDR_MASK); > + > + if (!sp || walker.table_gfn[PT32E_ROOT_LEVEL - 2] != sp->gfn) { > + write_unlock(&vcpu->kvm->mmu_lock); > + kvm_mmu_free_roots(vcpu->kvm, vcpu->arch.mmu, > + KVM_MMU_ROOT_CURRENT); > + goto release_clean; > + } > + } > + > r = make_mmu_pages_available(vcpu); > if (r) > goto out_unlock; > @@ -877,6 +915,7 @@ static int FNAME(page_fault)(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault > > out_unlock: > write_unlock(&vcpu->kvm->mmu_lock); > +release_clean: > kvm_release_pfn_clean(fault->pfn); > return r; > } > -- > 2.19.1.6.gb485710b >