]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
KVM: x86/mmu: WARN on attempt to check permissions for Shadow Stack #PF
authorSean Christopherson <seanjc@google.com>
Fri, 19 Sep 2025 22:32:28 +0000 (15:32 -0700)
committerSean Christopherson <seanjc@google.com>
Tue, 23 Sep 2025 16:16:53 +0000 (09:16 -0700)
Add PFERR_SS_MASK, a.k.a. Shadow Stack access, and WARN if KVM attempts to
check permissions for a Shadow Stack access as KVM hasn't been taught to
understand the magic Writable=0,Dirty=1 combination that is required for
Shadow Stack accesses, and likely will never learn.  There are no plans to
support Shadow Stacks with the Shadow MMU, and the emulator rejects all
instructions that affect Shadow Stacks, i.e. it should be impossible for
KVM to observe a #PF due to a shadow stack access.

Reviewed-by: Binbin Wu <binbin.wu@linux.intel.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Link: https://lore.kernel.org/r/20250919223258.1604852-22-seanjc@google.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
arch/x86/include/asm/kvm_host.h
arch/x86/kvm/mmu.h

index 5865c9b77b6d280d0857b387d0c1b2d9b2f7dc26..e8d74e949f9113c4c0d10924858e7bab6e651754 100644 (file)
@@ -267,6 +267,7 @@ enum x86_intercept_stage;
 #define PFERR_RSVD_MASK                BIT(3)
 #define PFERR_FETCH_MASK       BIT(4)
 #define PFERR_PK_MASK          BIT(5)
+#define PFERR_SS_MASK          BIT(6)
 #define PFERR_SGX_MASK         BIT(15)
 #define PFERR_GUEST_RMP_MASK   BIT_ULL(31)
 #define PFERR_GUEST_FINAL_MASK BIT_ULL(32)
index b4b6860ab971cd0f98c97c8e64c72381259c7df4..f63074048ec61dd2f7f5acec1c9fe4fecf23fe5e 100644 (file)
@@ -212,7 +212,7 @@ static inline u8 permission_fault(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu,
 
        fault = (mmu->permissions[index] >> pte_access) & 1;
 
-       WARN_ON(pfec & (PFERR_PK_MASK | PFERR_RSVD_MASK));
+       WARN_ON_ONCE(pfec & (PFERR_PK_MASK | PFERR_SS_MASK | PFERR_RSVD_MASK));
        if (unlikely(mmu->pkru_mask)) {
                u32 pkru_bits, offset;