From mboxrd@z Thu Jan 1 00:00:00 1970 From: Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH 2/3 v2] kvm: x86: Guest BNDCFGS requires guest MPX support Date: Wed, 24 May 2017 19:28:00 +0200 Message-ID: <20170524172759.GC8174@potion> References: <201705242033.SXodRpgH%fengguang.wu@intel.com> <20170524162255.183206-1-jmattson@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kvm@vger.kernel.org To: Jim Mattson Return-path: Received: from mx1.redhat.com ([209.132.183.28]:35086 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752700AbdEXR2D (ORCPT ); Wed, 24 May 2017 13:28:03 -0400 Content-Disposition: inline In-Reply-To: <20170524162255.183206-1-jmattson@google.com> Sender: kvm-owner@vger.kernel.org List-ID: 2017-05-24 09:22-0700, Jim Mattson: > The BNDCFGS MSR should only be exposed to the guest if the guest > supports MPX. (cf. the TSC_AUX MSR and RDTSCP.) > > Fixes: 0dd376e709975779 ("KVM: x86: add MSR_IA32_BNDCFGS to msrs_to_save") > Change-Id: I3ad7c01bda616715137ceac878f3fa7e66b6b387 > Signed-off-by: Jim Mattson > --- > diff --git a/arch/x86/kvm/cpuid.h b/arch/x86/kvm/cpuid.h > @@ -144,6 +144,14 @@ static inline bool guest_cpuid_has_rtm(struct kvm_vcpu *vcpu) > return best && (best->ebx & bit(X86_FEATURE_RTM)); > } > > +static inline bool guest_cpuid_has_mpx(struct kvm_vcpu *vcpu) > +{ > + struct kvm_cpuid_entry2 *best; > + > + best = kvm_find_cpuid_entry(vcpu, 7, 0); > + return best && (best->ebx & bit(X86_FEATURE_MPX)); > +} > + > static inline bool guest_cpuid_has_rdtscp(struct kvm_vcpu *vcpu) > { > struct kvm_cpuid_entry2 *best; > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > @@ -3195,7 +3195,7 @@ static int vmx_get_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > msr_info->data = vmcs_readl(GUEST_SYSENTER_ESP); > break; > case MSR_IA32_BNDCFGS: > - if (!kvm_mpx_supported()) > + if (!guest_cpuid_has_mpx(vcpu)) > return 1; > msr_info->data = vmcs_read64(GUEST_BNDCFGS); Userspace can force guest_cpuid_has_mpx() to return true even if the host does not have MPX (GUEST_BNDCFGS in VMCS), which would allow it to trigger vmread/vmwrite errors at will. I think it would make most sense to fail KVM_SET_CPUID that tries to do that, but checking for host support or silently clearing the bit still seem better than the host error. Thanks.