Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp5253593rwl; Sun, 8 Jan 2023 11:21:49 -0800 (PST) X-Google-Smtp-Source: AMrXdXv2p7Dkyg7pc6Rans32EnDWNPKKqF9RsVNLq0j86cuv2yFps0vEXuD3cj+aeuy7f7VlZsVr X-Received: by 2002:a17:907:d109:b0:818:3f54:8df7 with SMTP id uy9-20020a170907d10900b008183f548df7mr69401946ejc.2.1673205709251; Sun, 08 Jan 2023 11:21:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673205709; cv=none; d=google.com; s=arc-20160816; b=x8wDBpHPBLrolK5PL0oFt8i3X3iRvBfV8gNi8Mddg8eYVs5dHdMeLou/PbCScu19sM Wtbp1IPIugbG3S3Zwm1vO7kHF9cPw7Ub22ZrIQxJFwD4nGT+dFXKBgT8T09x2Owyk7oJ JO99rdAaHSlRIIoXtkclkpL1iRXjs2c67yepyx//jWEtNfJWyfzOSMebb4B05C3tFBD5 i776xbYn/jzb79NLi1sAD1WqYnONezEWCYkpwOPt09p68l1QOyWtE7XBKtSU9AZx91w4 aZ+d0dFfMDa8lmbvWUxbYIw/EvvHr3KTCL1K4nsXIQxDBNO3p28Dad3rO3Nglze5wIb+ 1Jqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=TcK/oOjYX5olPMBFZAkzj53ornHTRUc3nsjwLPHRVNY=; b=LTJwNdcXAl8pj8ZjBQeX568iU3SO+sR3kzlFkOOk3hqdq6gn3OJxJL1R3dlyQLRERY 9qhZB8fFsH4FunhvSjtUVOgHYD3xGOz20izwbcL/CpdkPn/fjpYXA3FRqZAE3+sljZ4Z mZRDUyz8yOXo0oOVoJ/P7Jklti9uvej+P2BRWvY85TMA6Cksd1UZGeqbatmwDhvgMRhy pSahXa0sDHwLZqzSsopYJc0AX21jNRA+TD7flRWbjeQWf470+wZBI9HV1ssbtaItyJtF 68vYxTIIw0l7KtEyfVtZHelObq5kRDKNON4RC5XiY0oB2qg+Blc/qOH1UNmKe8J9qOTS d7Bw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IJhDXD9c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id wg10-20020a17090705ca00b007c18ffbf16esi8288716ejb.433.2023.01.08.11.21.37; Sun, 08 Jan 2023 11:21:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IJhDXD9c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236134AbjAHSK2 (ORCPT + 51 others); Sun, 8 Jan 2023 13:10:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42984 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233843AbjAHSKZ (ORCPT ); Sun, 8 Jan 2023 13:10:25 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 33EF1635A for ; Sun, 8 Jan 2023 10:09:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1673201380; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TcK/oOjYX5olPMBFZAkzj53ornHTRUc3nsjwLPHRVNY=; b=IJhDXD9cTAlylkX6A69iNqRuEH+//RQzVh1eGOY03nMrXutl1ZK2z8OCQ6HUT1DoXuygrU MyUUueXWUjNs/LTnKr8IFrXN8HmfvxXbUXKmtS+fD4ommqJJi8bOP0qiSZTLmZR0aIYt11 dTl0o1Ppot71X1ZGSItYJwLIiNUtuIM= Received: from mail-ed1-f72.google.com (mail-ed1-f72.google.com [209.85.208.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-519-F-riHTRmNOa77ucvzCusLg-1; Sun, 08 Jan 2023 13:09:39 -0500 X-MC-Unique: F-riHTRmNOa77ucvzCusLg-1 Received: by mail-ed1-f72.google.com with SMTP id q10-20020a056402518a00b0048e5bc8cb74so4021786edd.5 for ; Sun, 08 Jan 2023 10:09:38 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=TcK/oOjYX5olPMBFZAkzj53ornHTRUc3nsjwLPHRVNY=; b=O9JMXk3pUr+NFTtM2dECKfH+9W91zVVrCJp9wfkWuwJqacAKHJn/yRlsJZl1A6XRGe 7vzpzwx8iAVa/VCpkd8se+6SEJKqBy5jnlHHhdqLHQ0KrrPYgW7XAQYU1gZYeY9Qqq7m 35ykg+NPsOxz+SZ7l/DSwLMaw/MdIQLBUf9yLCAIMJ0haCWzvyog4A3JYdm8BctrLSIZ jwOhJnNFmDYegUTmFb6cRrmbiYkYjnLvHIAJekTAt4r9O1m7I/NUsXc8kUiWM1ycGAdU ddippO/ecv1lM8Doq4OdfudMPbHbuWUxb92tFc8VjtYC0zjxtVfC8W60v+BP00vxU+lu TTsA== X-Gm-Message-State: AFqh2kohKl/oqvoMayZ2wLpmOG8j2FvBJzy3Tx5M4cN52ilmn3jtg3y3 AUnLQ1d23uLIXAZG3bX7iYUHHb4ElNhQgj9QyH6bxOWE2+es6LOYuui9Jef37oJSnfEH2sfFMm9 kvavQUByyXpjxXlxZDi9k49PM X-Received: by 2002:a05:6402:520b:b0:48b:58be:472c with SMTP id s11-20020a056402520b00b0048b58be472cmr42900796edd.18.1673201377733; Sun, 08 Jan 2023 10:09:37 -0800 (PST) X-Received: by 2002:a05:6402:520b:b0:48b:58be:472c with SMTP id s11-20020a056402520b00b0048b58be472cmr42900781edd.18.1673201377523; Sun, 08 Jan 2023 10:09:37 -0800 (PST) Received: from starship ([89.237.103.62]) by smtp.gmail.com with ESMTPSA id u13-20020aa7db8d000000b004833aac6ef9sm2751139edt.62.2023.01.08.10.09.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 Jan 2023 10:09:37 -0800 (PST) Message-ID: <20b6eec1cfa10f0499fc4cd53670503c42d74699.camel@redhat.com> Subject: Re: [PATCH 6/6] KVM: VMX: Intercept reads to invalid and write-only x2APIC registers From: Maxim Levitsky To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Marc Orr , Ben Gardon , Venkatesh Srinivas Date: Sun, 08 Jan 2023 20:09:35 +0200 In-Reply-To: <20230107011025.565472-7-seanjc@google.com> References: <20230107011025.565472-1-seanjc@google.com> <20230107011025.565472-7-seanjc@google.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 2023-01-07 at 01:10 +0000, Sean Christopherson wrote: > Intercept reads to invalid (non-existent) and write-only x2APIC registers > when configuring VMX's MSR bitmaps for x2APIC+APICv. When APICv is fully > enabled, Intel hardware doesn't validate the registers on RDMSR and > instead blindly retrieves data from the vAPIC page, i.e. it's software's > responsibility to intercept reads to non-existent and write-only MSRs. > > Fixes: 8d14695f9542 ("x86, apicv: add virtual x2apic support") > Signed-off-by: Sean Christopherson > --- > arch/x86/kvm/vmx/vmx.c | 8 ++++---- > 1 file changed, 4 insertions(+), 4 deletions(-) > > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > index 82c61c16f8f5..1be2bc7185be 100644 > --- a/arch/x86/kvm/vmx/vmx.c > +++ b/arch/x86/kvm/vmx/vmx.c > @@ -4031,7 +4031,7 @@ static void vmx_update_msr_bitmap_x2apic(struct kvm_vcpu *vcpu) > u64 *msr_bitmap = (u64 *)vmx->vmcs01.msr_bitmap; > u8 mode; > > - if (!cpu_has_vmx_msr_bitmap()) > + if (!cpu_has_vmx_msr_bitmap() || WARN_ON_ONCE(!lapic_in_kernel(vcpu))) > return; > > if (cpu_has_secondary_exec_ctrls() && > @@ -4053,11 +4053,11 @@ static void vmx_update_msr_bitmap_x2apic(struct kvm_vcpu *vcpu) > * Reset the bitmap for MSRs 0x800 - 0x83f. Leave AMD's uber-extended > * registers (0x840 and above) intercepted, KVM doesn't support them. > * Intercept all writes by default and poke holes as needed. Pass > - * through all reads by default in x2APIC+APICv mode, as all registers > - * except the current timer count are passed through for read. > + * through reads for all valid registers by default in x2APIC+APICv > + * mode, only the current timer count needs on-demand emulation by KVM. > */ > if (mode & MSR_BITMAP_MODE_X2APIC_APICV) > - msr_bitmap[read_idx] = 0; > + msr_bitmap[read_idx] = ~kvm_lapic_readable_reg_mask(vcpu->arch.apic); > else > msr_bitmap[read_idx] = ~0ull; > msr_bitmap[write_idx] = ~0ull; Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky