All of lore.kernel.org
 help / color / mirror / Atom feed
From: Binbin Wu <binbin.wu@linux.intel.com>
To: kvm@vger.kernel.org
Cc: pbonzini@redhat.com, seanjc@google.com,
	rick.p.edgecombe@intel.com, xiaoyao.li@intel.com,
	chao.gao@intel.com, kai.huang@intel.com
Subject: Re: [RFC PATCH 22/27] KVM: x86: Verify userspace CPUID inputs in paranoid mode
Date: Wed, 22 Apr 2026 16:59:43 +0800	[thread overview]
Message-ID: <ce8ae1eb-77ae-43b3-973e-ef27cc0c6832@linux.intel.com> (raw)
In-Reply-To: <20260417073610.3246316-23-binbin.wu@linux.intel.com>

Below are responses to issues reported by sashiko. [1]
[1] https://sashiko.dev/#/patchset/20260417073610.3246316-1-binbin.wu%40linux.intel.com?part=22

> diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
> index 08f5bc1d26b10..2027230a1f426 100644
> --- a/arch/x86/kvm/cpuid.c
> +++ b/arch/x86/kvm/cpuid.c
[ ... ]
> +static int cpuid_check_and_set_vcpu_caps(struct kvm_vcpu *vcpu,
> +					 struct kvm_cpuid_entry2 *entry)
> +{
[ ... ]
> +		/*
> +		 * A vCPU has a feature if it's supported by KVM and is enabled
> +		 * in guest CPUID.  Note, this includes features that are
> +		 * supported by KVM but aren't advertised to userspace!
> +		 */
> +		vcpu->arch.cpu_caps[leaf] = supported;
> +		vcpu->arch.cpu_caps[leaf] &= cpuid_get_reg_unsafe(entry, reg);
> +	}
> +
> +	return 0;
> +}
> +
> +int kvm_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu)
> +{
[ ... ]
> +	/*
> +	 * If CPUID paranoid mode is enabled, KVM rejects userspace's guest
> +	 * CPUID definition if it contains any bits that aren't supported or
> +	 * unknown by KVM.  Otherwise, reset guest capabilities to userspace's
> +	 * guest CPUID definition, i.e. honor userspace's definition for
> +	 * features that don't require KVM or hardware management/support (or
> +	 * that KVM simply doesn't care about).
> +	 */
> +	for (int i = 0; i < vcpu->arch.cpuid_nent; i++) {
> +		r = cpuid_check_and_set_vcpu_caps(vcpu, &vcpu->arch.cpuid_entries[i]);

Issue #1:
"KVM_SET_CPUID2 allows userspace to pass an array of CPUID entries which may
include duplicates. Because this loop iterates sequentially over the entries,
if duplicates are provided, won't vcpu->arch.cpu_caps reflect the
capabilities of the last matching entry in the array?
KVM's guest CPUID emulation uses kvm_find_cpuid_entry(), which searches the
array sequentially and returns the first matching entry. Could this cause a
state mismatch where KVM enforces access controls and emulates behaviors using
the capabilities defined in the last entry, but the guest software makes
decisions based on the first entry?"

Indeed.

I am not sure whether CPUID paranoid mode should reject userspace's input
if there are duplicated entries.
There could be two options:
- Detect whether a vcpu cap has been set, if there is a duplicated entry,
  reject the whole input or ignore the later one.
- Split the cpuid paranoid check out.


> +		/*
> +		 * No need to worry about the changes having been made if any
> +		 * check fails, all the changes will be reverted when returning
> +		 * an error on the set CPUID patch.
> +		 */
> +		if (r)
> +			return r;

Issue #2:
"The comment mentions all changes will be reverted on error, but is
vcpu->arch.xen.cpuid fully restored if we fail here?
When kvm_set_cpuid() updates vcpu->arch.xen.cpuid with the Xen base and limit
from the new entries, it happens before calling kvm_vcpu_after_set_cpuid().
If this paranoid check fails and returns -EINVAL, the error recovery in
kvm_set_cpuid() restores the old CPUID entries and cpu_caps, but it appears
to miss vcpu->arch.xen.cpuid.
Could this leave vcpu->arch.xen.cpuid out-of-sync with the restored CPUID
array, potentially allowing a malicious VMM to expose Xen-specific emulations
at a ghost CPUID leaf?"

It's the same issue as below:
https://lore.kernel.org/kvm/1931c7d3-b21e-4704-9012-4a16597bbebf@linux.intel.com/

>  	}
>  
>  	kvm_update_cpuid_runtime(vcpu);


  reply	other threads:[~2026-04-22  8:59 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-17  7:35 [RFC PATCH 00/27] KVM: x86: Add a paranoid mode for CPUID verification Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 01/27] KVM: x86: Fix emulated CPUID features being applied to wrong sub-leaf Binbin Wu
2026-05-15  9:03   ` Xiaoyao Li
2026-04-17  7:35 ` [RFC PATCH 02/27] KVM: x86: Reorder the features for CPUID 7 Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 03/27] KVM: x86: Add definitions for CPUID overlays Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 04/27] KVM: x86: Extend F() and its variants " Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 05/27] KVM: x86: Extend kvm_cpu_cap_{set/clear}() to configure overlays Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 06/27] KVM: x86: Populate TDX CPUID overlay with supported feature bits Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 07/27] KVM: x86: Support KVM_GET_{SUPPORTED,EMULATED}_CPUID as VM scope ioctls Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 08/27] KVM: x86: Thread @kvm to KVM CPU capability helpers Binbin Wu
2026-04-21  6:18   ` Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 09/27] KVM: x86: Use overlays of KVM CPU capabilities Binbin Wu
2026-04-21  5:31   ` Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 10/27] KVM: x86: Use vendor-specific overlay flags instead of F_CPUID_DEFAULT Binbin Wu
2026-04-21  6:43   ` Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 11/27] KVM: SVM: Drop unnecessary clears of unsupported common x86 features Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 12/27] KVM: x86: Split KVM CPU cap leafs into two parts Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 13/27] KVM: x86: Add a helper to initialize CPUID multi-bit fields Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 14/27] KVM: x86: Add a helper to init multiple feature bits based on raw CPUID Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 15/27] KVM: x86: Add infrastructure to track CPUID entries ignored in paranoid mode Binbin Wu
2026-04-17  7:35 ` [RFC PATCH 16/27] KVM: x86: Init allowed masks for basic CPUID range " Binbin Wu
2026-04-21  6:51   ` Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 17/27] KVM: x86: Init allowed masks for extended " Binbin Wu
2026-04-21  7:55   ` Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 18/27] KVM: x86: Handle Centaur CPUID leafs " Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 19/27] KVM: x86: Track KVM PV CPUID features for " Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 20/27] KVM: x86: Add per-VM flag to track CPUID " Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 21/27] KVM: x86: Make kvm_vcpu_after_set_cpuid() return an error code Binbin Wu
2026-04-22  8:22   ` Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 22/27] KVM: x86: Verify userspace CPUID inputs in paranoid mode Binbin Wu
2026-04-22  8:59   ` Binbin Wu [this message]
2026-04-17  7:36 ` [RFC PATCH 23/27] KVM: x86: Account for runtime CPUID features " Binbin Wu
2026-04-23  2:41   ` Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 24/27] KVM: x86: Skip paranoid CPUID check for KVM PV leafs when base is relocated Binbin Wu
2026-04-23  3:02   ` Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 25/27] KVM: x86: Add new KVM_CAP_X86_CPUID_PARANOID Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 26/27] KVM: x86: Add a helper to query the allowed CPUID mask Binbin Wu
2026-04-17  7:36 ` [RFC PATCH 27/27] KVM: TDX: Replace hardcoded CPUID filtering with the allowed mask Binbin Wu
2026-04-23  3:25   ` Binbin Wu
2026-05-15  8:08 ` [RFC PATCH 00/27] KVM: x86: Add a paranoid mode for CPUID verification Xiaoyao Li
2026-05-15 15:45   ` Edgecombe, Rick P

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ce8ae1eb-77ae-43b3-973e-ef27cc0c6832@linux.intel.com \
    --to=binbin.wu@linux.intel.com \
    --cc=chao.gao@intel.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=rick.p.edgecombe@intel.com \
    --cc=seanjc@google.com \
    --cc=xiaoyao.li@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.