[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250523011756.3243624-1-seanjc@google.com>
Date: Thu, 22 May 2025 18:17:51 -0700
From: Sean Christopherson <seanjc@...gle.com>
To: Sean Christopherson <seanjc@...gle.com>, Paolo Bonzini <pbonzini@...hat.com>
Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>, Borislav Petkov <bp@...en8.de>,
Jim Mattson <jmattson@...gle.com>
Subject: [PATCH 0/5] KVM: VMX: Fix MMIO Stale Data Mitigation
Fix KVM's mitigation of the MMIO Stale Data bug, as the current approach
doesn't actually detect whether or not a guest has access to MMIO. E.g.
KVM_DEV_VFIO_FILE_ADD is entirely optional, and obviously only covers VFIO
devices, and so is a terrible heuristic for "can this vCPU access MMIO?"
To fix the flaw (hopefully), track whether or not a vCPU has access to MMIO
based on the MMU it will run with. KVM already detects host MMIO when
installing PTEs in order to force host MMIO to UC (EPT bypasses MTRRs), so
feeding that information into the MMU is rather straightforward.
Note, I haven't actually verified this mitigates the MMIO Stale Data bug, but
I think it's safe to say no has verified the existing code works either.
All that said, and despite what the subject says, my real interest in this
series it to kill off kvm_arch_{start,end}_assignment(). I.e. preciesly
identifying MMIO is a means to an end. Because as evidenced by the MMIO mess
and other bugs (e.g. vDPA device not getting device posted interrupts),
keying off KVM_DEV_VFIO_FILE_ADD for anything is a bad idea.
The last two patches of this series depend on the stupidly large device
posted interrupts rework:
https://lore.kernel.org/all/20250523010004.3240643-1-seanjc@google.com
which in turn depends on a not-tiny prep series:
https://lore.kernel.org/all/20250519232808.2745331-1-seanjc@google.com
Unless you care deeply about those patches, I honestly recommend just ignoring
them. I posted them as part of this series, because post two patches that
depends on *four* series seemed even more ridiculousr :-)
Side topic: Pawan, I haven't forgotten about your mmio_stale_data_clear =>
cpu_buf_vm_clear rename, I promise I'll review it soon.
Sean Christopherson (5):
KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask
is NULL
KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a
SPTE
KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the
guest
Revert "kvm: detect assigned device via irqbypass manager"
VFIO: KVM: x86: Drop kvm_arch_{start,end}_assignment()
arch/x86/include/asm/kvm_host.h | 3 +--
arch/x86/kvm/irq.c | 9 +------
arch/x86/kvm/mmu/mmu_internal.h | 3 +++
arch/x86/kvm/mmu/spte.c | 43 ++++++++++++++++++++++++++++++---
arch/x86/kvm/mmu/spte.h | 10 ++++++++
arch/x86/kvm/vmx/run_flags.h | 10 +++++---
arch/x86/kvm/vmx/vmx.c | 8 +++++-
arch/x86/kvm/x86.c | 18 --------------
include/linux/kvm_host.h | 18 --------------
virt/kvm/vfio.c | 3 ---
10 files changed, 68 insertions(+), 57 deletions(-)
base-commit: 1f0486097459e53d292db749de70e587339267f5
--
2.49.0.1151.ga128411c76-goog
Powered by blists - more mailing lists