Skip to content

Commit 9e985cb

Browse files
committed
KVM: x86/pmu: Disable support for adaptive PEBS
Drop support for virtualizing adaptive PEBS, as KVM's implementation is architecturally broken without an obvious/easy path forward, and because exposing adaptive PEBS can leak host LBRs to the guest, i.e. can leak host kernel addresses to the guest. Bug #1 is that KVM doesn't account for the upper 32 bits of IA32_FIXED_CTR_CTRL when (re)programming fixed counters, e.g fixed_ctrl_field() drops the upper bits, reprogram_fixed_counters() stores local variables as u8s and truncates the upper bits too, etc. Bug #2 is that, because KVM _always_ sets precise_ip to a non-zero value for PEBS events, perf will _always_ generate an adaptive record, even if the guest requested a basic record. Note, KVM will also enable adaptive PEBS in individual *counter*, even if adaptive PEBS isn't exposed to the guest, but this is benign as MSR_PEBS_DATA_CFG is guaranteed to be zero, i.e. the guest will only ever see Basic records. Bug #3 is in perf. intel_pmu_disable_fixed() doesn't clear the upper bits either, i.e. leaves ICL_FIXED_0_ADAPTIVE set, and intel_pmu_enable_fixed() effectively doesn't clear ICL_FIXED_0_ADAPTIVE either. I.e. perf _always_ enables ADAPTIVE counters, regardless of what KVM requests. Bug #4 is that adaptive PEBS *might* effectively bypass event filters set by the host, as "Updated Memory Access Info Group" records information that might be disallowed by userspace via KVM_SET_PMU_EVENT_FILTER. Bug #5 is that KVM doesn't ensure LBR MSRs hold guest values (or at least zeros) when entering a vCPU with adaptive PEBS, which allows the guest to read host LBRs, i.e. host RIPs/addresses, by enabling "LBR Entries" records. Disable adaptive PEBS support as an immediate fix due to the severity of the LBR leak in particular, and because fixing all of the bugs will be non-trivial, e.g. not suitable for backporting to stable kernels. Note! This will break live migration, but trying to make KVM play nice with live migration would be quite complicated, wouldn't be guaranteed to work (i.e. KVM might still kill/confuse the guest), and it's not clear that there are any publicly available VMMs that support adaptive PEBS, let alone live migrate VMs that support adaptive PEBS, e.g. QEMU doesn't support PEBS in any capacity. Link: https://lore.kernel.org/all/[email protected] Link: https://lore.kernel.org/all/[email protected] Fixes: c59a1f1 ("KVM: x86/pmu: Add IA32_PEBS_ENABLE MSR emulation for extended PEBS") Cc: [email protected] Cc: Like Xu <[email protected]> Cc: Mingwei Zhang <[email protected]> Cc: Zhenyu Wang <[email protected]> Cc: Zhang Xiong <[email protected]> Cc: Lv Zhiyuan <[email protected]> Cc: Dapeng Mi <[email protected]> Cc: Jim Mattson <[email protected]> Acked-by: Like Xu <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Sean Christopherson <[email protected]>
1 parent fc62a4e commit 9e985cb

File tree

1 file changed

+22
-2
lines changed

1 file changed

+22
-2
lines changed

arch/x86/kvm/vmx/vmx.c

+22-2
Original file line numberDiff line numberDiff line change
@@ -7882,8 +7882,28 @@ static u64 vmx_get_perf_capabilities(void)
78827882

78837883
if (vmx_pebs_supported()) {
78847884
perf_cap |= host_perf_cap & PERF_CAP_PEBS_MASK;
7885-
if ((perf_cap & PERF_CAP_PEBS_FORMAT) < 4)
7886-
perf_cap &= ~PERF_CAP_PEBS_BASELINE;
7885+
7886+
/*
7887+
* Disallow adaptive PEBS as it is functionally broken, can be
7888+
* used by the guest to read *host* LBRs, and can be used to
7889+
* bypass userspace event filters. To correctly and safely
7890+
* support adaptive PEBS, KVM needs to:
7891+
*
7892+
* 1. Account for the ADAPTIVE flag when (re)programming fixed
7893+
* counters.
7894+
*
7895+
* 2. Gain support from perf (or take direct control of counter
7896+
* programming) to support events without adaptive PEBS
7897+
* enabled for the hardware counter.
7898+
*
7899+
* 3. Ensure LBR MSRs cannot hold host data on VM-Entry with
7900+
* adaptive PEBS enabled and MSR_PEBS_DATA_CFG.LBRS=1.
7901+
*
7902+
* 4. Document which PMU events are effectively exposed to the
7903+
* guest via adaptive PEBS, and make adaptive PEBS mutually
7904+
* exclusive with KVM_SET_PMU_EVENT_FILTER if necessary.
7905+
*/
7906+
perf_cap &= ~PERF_CAP_PEBS_BASELINE;
78877907
}
78887908

78897909
return perf_cap;

0 commit comments

Comments
 (0)