On Wed, Apr 15, 2020 at 11:22:11PM +0200, Thomas Gleixner wrote: > Sean Christopherson <sean.j.christopherson@xxxxxxxxx> writes: > > I don't see any way to avoid having KVM differentiate between sld_warn and > > sld_fatal. Even if KVM is able to virtualize SLD in sld_fatal mode, e.g. > > by telling the guest it must not try to disable SLD, KVM would still need > > to know the kernel is sld_fatal so that it can forward that information to > > the guest. > > Huch? There is absolutely zero code like that. The only place where > sld_state is used is: > > + static inline void vmx_update_sld(struct kvm_vcpu *vcpu, bool on) > + { > + if (sld_state == sld_warn && guest_cpu_has_feature_sld(vcpu) && > + on == test_thread_flag(TIF_SLD)) { > + sld_update_msr(on); > + update_thread_flag(TIF_SLD, !on); > + } > > You might have some faint memories from the previous trainwrecks :) Yeah, I was thinking SLD was only being exposed if the host is sld_warn. I'll work with Xiaoyao to figure out a cleaner interface for this code. > The fatal mode emulation which is used in this patch set is simply that > the guest can 'write' to the MSR but it's not propagated to the real > MSR. It's just stored in the guest state. There is no way that you can > tell the guest that the MSR is there but fake. > > The alternative solution is to prevent the exposure of SLD to the guest > in fatal mode. But that does not buy anything. > > The detection is anyway incomplete. If the SLD #AC is raised in guest's > user mode and the guest has user #AC enabled then the exception is > injected into the guest unconditionally and independent of the host's > and guest's SLD state. That's entirely correct because a SLD #AC in user > mode is also a user mode alignment violation; it's not distinguishable. > > You could of course analyse the offending instruction and check for a > lock prefix and a cache line overlap, but that still does not prevent > false positives. When the guest is non-malicious and has proper user #AC > handling in place then it would be wrong or at least very surprising to > kill it just because the detection code decided that it is a dangerous > split lock attempt. > > So we can go with the proposed mode of allowing the write but not > propagating it. If the resulting split lock #AC originates from CPL != 3 > then the guest will be killed with SIGBUS. If it originates from CPL == > 3 and the guest has user #AC disabled then it will be killed as well. An idea that's been floated around to avoid killing the guest on a CPL==3 split-lock #AC is to add a STICKY bit to MSR_TEST_CTRL that KVM can virtualize to tell the guest that attempting to disable SLD is futile, e.g. so that the guest can kill its misbehaving userspace apps instead of trying to disable SLD and getting killed by the host. I've discussed it with a few folks internally and it sounds like getting such a bit added to the SDM would be doable, even if Intel never ships hardware that supports the bit. The thought is that getting the STICKY bit architecturally defined would give KVM/Linux leverage to persuade guest kernels to add support for the bit. But anything that touches the SDM doesn't exactly happen quickly :-/.