From: Sean Christopherson <seanjc@google.com>
To: Xin Li <xin@zytor.com>
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org,
linux-doc@vger.kernel.org, pbonzini@redhat.com, corbet@lwn.net,
tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com,
luto@kernel.org, peterz@infradead.org,
andrew.cooper3@citrix.com, chao.gao@intel.com,
hch@infradead.org
Subject: Re: [PATCH v6 06/20] KVM: VMX: Set FRED MSR intercepts
Date: Tue, 26 Aug 2025 11:11:31 -0700 [thread overview]
Message-ID: <aK340-6yIE_qujUm@google.com> (raw)
In-Reply-To: <2dd8c323-7654-4a28-86f1-d743b70d10b1@zytor.com>
On Sun, Aug 24, 2025, Xin Li wrote:
> On 8/21/2025 3:36 PM, Xin Li (Intel) wrote:
> > + /*
> > + * MSR_IA32_FRED_RSP0 and MSR_IA32_PL0_SSP (aka MSR_IA32_FRED_SSP0) are
> > + * designated for event delivery while executing in userspace. Since
> > + * KVM operates exclusively in kernel mode (the CPL is always 0 after
> > + * any VM exit), KVM can safely retain and operate with the guest-defined
> > + * values for MSR_IA32_FRED_RSP0 and MSR_IA32_PL0_SSP.
> > + *
> > + * Therefore, interception of MSR_IA32_FRED_RSP0 and MSR_IA32_PL0_SSP
> > + * is not required.
> > + *
> > + * Note, save and restore of MSR_IA32_PL0_SSP belong to CET supervisor
> > + * context management. However the FRED SSP MSRs, including
> > + * MSR_IA32_PL0_SSP, are supported by any processor that enumerates FRED.
> > + * If such a processor does not support CET, FRED transitions will not
> > + * use the MSRs, but the MSRs would still be accessible using MSR-access
> > + * instructions (e.g., RDMSR, WRMSR).
> > + */
> > + vmx_set_intercept_for_msr(vcpu, MSR_IA32_FRED_RSP0, MSR_TYPE_RW, intercept);
> > + vmx_set_intercept_for_msr(vcpu, MSR_IA32_PL0_SSP, MSR_TYPE_RW, intercept);
>
> Hi Sean,
>
> I'd like to bring up an issue concerning MSR_IA32_PL0_SSP.
>
> The FRED spec claims:
>
> The FRED SSP MSRs are supported by any processor that enumerates
> CPUID.(EAX=7,ECX=1):EAX.FRED[bit 17] as 1. If such a processor does not
> support CET, FRED transitions will not use the MSRs (because shadow stacks
> are not enabled), but the MSRs would still be accessible using MSR-access
> instructions (e.g., RDMSR, WRMSR).
>
> It means KVM needs to handle MSR_IA32_PL0_SSP even when FRED is supported
> but CET is not. And this can be broken down into two subtasks:
>
> 1) Allow such a guest to access MSR_IA32_PL0_SSP w/o triggering #GP. And
> this behavior is already implemented in patch 8 of this series.
>
> 2) Save and restore MSR_IA32_PL0_SSP in both KVM and Qemu for such a guest.
What novel work needs to be done in KVM? For QEMU, I assume it's just adding an
"or FRED" somewhere. For KVM, I'm missing what additional work would be required
that wouldn't be naturally covered by patch 8 (assuming patch 8 is bug-free).
> I have the patches for 2) but they are not included in this series, because
>
> 1) how much do we care the value in MSR_IA32_PL0_SSP in such a guest?
>
> Yes, Chao told me that you are the one saying that MSRs can be used as
> clobber registers and KVM should preserve the value. Does MSR_IA32_PL0_SSP
> in such a guest count?
If the architecture says that MSR_IA32_PL0_SSP exists and is accessible, then
KVM needs to honor that.
> 2) Saving/restoring MSR_IA32_PL0_SSP adds complexity, though it's seldom
> used. Is it worth it?
Honoring the architecture is generally not optional. There are extreme cases
where KVM violates that rule and takes (often undocumented) erratum, e.g. APIC
base relocation would require an absurd amount of complexity for no real world
benefit. But I would be very surprised if the complexity in KVM or QEMU to support
this scenario is at all meaningful, let alone enough to justify diverging from
the architectural spec.
> BTW I'm still working on a KVM unit test for it, using a L1 VMM that
> enumerates FRED but not CET.
>
> Thanks!
> Xin
next prev parent reply other threads:[~2025-08-26 18:11 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-21 22:36 [PATCH v6 00/20] Enable FRED with KVM VMX Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 01/20] KVM: VMX: Add support for the secondary VM exit controls Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 02/20] KVM: VMX: Initialize VM entry/exit FRED controls in vmcs_config Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 03/20] KVM: VMX: Disable FRED if FRED consistency checks fail Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 04/20] x86/cea: Export an API to get per CPU exception stacks for KVM to use Xin Li (Intel)
2025-08-27 17:33 ` Dave Hansen
2025-08-27 22:18 ` Xin Li
2025-08-21 22:36 ` [PATCH v6 05/20] KVM: VMX: Initialize VMCS FRED fields Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 06/20] KVM: VMX: Set FRED MSR intercepts Xin Li (Intel)
2025-08-25 2:51 ` Xin Li
2025-08-26 18:11 ` Sean Christopherson [this message]
2025-08-26 21:59 ` Xin Li
2025-08-26 22:17 ` Sean Christopherson
2025-08-27 22:24 ` Xin Li
2025-08-27 22:43 ` Xin Li
2025-08-28 23:32 ` Sean Christopherson
2025-08-26 18:50 ` Andrew Cooper
2025-08-26 22:03 ` Xin Li
2025-08-26 22:20 ` Andrew Cooper
2025-08-21 22:36 ` [PATCH v6 07/20] KVM: VMX: Save/restore guest FRED RSP0 Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 08/20] KVM: VMX: Add support for FRED context save/restore Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 09/20] KVM: x86: Add a helper to detect if FRED is enabled for a vCPU Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 10/20] KVM: VMX: Virtualize FRED event_data Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 11/20] KVM: VMX: Virtualize FRED nested exception tracking Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 12/20] KVM: x86: Save/restore the nested flag of an exception Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 13/20] KVM: x86: Mark CR4.FRED as not reserved Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 14/20] KVM: VMX: Dump FRED context in dump_vmcs() Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 15/20] KVM: x86: Advertise support for FRED Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 16/20] KVM: nVMX: Add support for the secondary VM exit controls Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 17/20] KVM: nVMX: Add FRED VMCS fields to nested VMX context handling Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 18/20] KVM: nVMX: Add FRED-related VMCS field checks Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 19/20] KVM: nVMX: Add prerequisites to SHADOW_FIELD_R[OW] macros Xin Li (Intel)
2025-08-21 22:36 ` [PATCH v6 20/20] KVM: nVMX: Allow VMX FRED controls Xin Li (Intel)
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aK340-6yIE_qujUm@google.com \
--to=seanjc@google.com \
--cc=andrew.cooper3@citrix.com \
--cc=bp@alien8.de \
--cc=chao.gao@intel.com \
--cc=corbet@lwn.net \
--cc=dave.hansen@linux.intel.com \
--cc=hch@infradead.org \
--cc=hpa@zytor.com \
--cc=kvm@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=peterz@infradead.org \
--cc=tglx@linutronix.de \
--cc=x86@kernel.org \
--cc=xin@zytor.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).