[PATCH v4 2/8] KVM: x86: nSVM: Cache and validate vmcb12 g_pat

Jim Mattson posted 8 patches 1 month, 2 weeks ago
There is a newer version of this series
[PATCH v4 2/8] KVM: x86: nSVM: Cache and validate vmcb12 g_pat
Posted by Jim Mattson 1 month, 2 weeks ago
Cache g_pat from vmcb12 in vmcb_save_area_cached to avoid TOCTTOU issues,
and add a validity check so that when nested paging is enabled for vmcb12,
an invalid g_pat at emulated VMRUN causes an immediate VMEXIT with exit
code VMEXIT_INVALID, as specified in the APM, volume 2: "Nested Paging and
VMRUN/VMEXIT."

Fixes: 3d6368ef580a ("KVM: SVM: Add VMRUN handler")
Signed-off-by: Jim Mattson <jmattson@google.com>
---
 arch/x86/kvm/svm/nested.c | 17 +++++++++++++----
 arch/x86/kvm/svm/svm.h    |  1 +
 2 files changed, 14 insertions(+), 4 deletions(-)

diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
index b72a1f3c4144..91b35adb83f8 100644
--- a/arch/x86/kvm/svm/nested.c
+++ b/arch/x86/kvm/svm/nested.c
@@ -426,7 +426,8 @@ static bool nested_vmcb_check_controls(struct kvm_vcpu *vcpu,
 
 /* Common checks that apply to both L1 and L2 state.  */
 static bool nested_vmcb_check_save(struct kvm_vcpu *vcpu,
-				   struct vmcb_save_area_cached *save)
+				   struct vmcb_save_area_cached *save,
+				   bool check_gpat)
 {
 	if (CC(!(save->efer & EFER_SVME)))
 		return false;
@@ -462,6 +463,9 @@ static bool nested_vmcb_check_save(struct kvm_vcpu *vcpu,
 	if (CC(!kvm_valid_efer(vcpu, save->efer)))
 		return false;
 
+	if (check_gpat && CC(!kvm_pat_valid(save->g_pat)))
+		return false;
+
 	return true;
 }
 
@@ -573,6 +577,7 @@ static void __nested_copy_vmcb_save_to_cache(struct vmcb_save_area_cached *to,
 
 	to->rax = from->rax;
 	to->cr2 = from->cr2;
+	to->g_pat = from->g_pat;
 
 	svm_copy_lbrs(to, from);
 }
@@ -1036,7 +1041,8 @@ int enter_svm_guest_mode(struct kvm_vcpu *vcpu, u64 vmcb12_gpa, bool from_vmrun)
 
 	enter_guest_mode(vcpu);
 
-	if (!nested_vmcb_check_save(vcpu, &svm->nested.save) ||
+	if (!nested_vmcb_check_save(vcpu, &svm->nested.save,
+				    nested_npt_enabled(svm)) ||
 	    !nested_vmcb_check_controls(vcpu, &svm->nested.ctl,
 					svm->vmcb01.ptr->save.cr0))
 		return -EINVAL;
@@ -2006,13 +2012,16 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu,
 
 	/*
 	 * Validate host state saved from before VMRUN (see
-	 * nested_svm_check_permissions).
+	 * nested_svm_check_permissions). Note that the g_pat field is not
+	 * validated, because (a) it may have been clobbered by SMM before
+	 * KVM_GET_NESTED_STATE, and (b) it is not loaded at emulated
+	 * #VMEXIT.
 	 */
 	__nested_copy_vmcb_save_to_cache(&save_cached, save);
 	if (!(save->cr0 & X86_CR0_PG) ||
 	    !(save->cr0 & X86_CR0_PE) ||
 	    (save->rflags & X86_EFLAGS_VM) ||
-	    !nested_vmcb_check_save(vcpu, &save_cached))
+	    !nested_vmcb_check_save(vcpu, &save_cached, false))
 		goto out_free;
 
 
diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h
index 9850ed01e16e..a49c48459e0b 100644
--- a/arch/x86/kvm/svm/svm.h
+++ b/arch/x86/kvm/svm/svm.h
@@ -161,6 +161,7 @@ struct vmcb_save_area_cached {
 	u64 isst_addr;
 	u64 rax;
 	u64 cr2;
+	u64 g_pat;
 	u64 dbgctl;
 	u64 br_from;
 	u64 br_to;
-- 
2.53.0.239.g8d8fc8a987-goog
Re: [PATCH v4 2/8] KVM: x86: nSVM: Cache and validate vmcb12 g_pat
Posted by Yosry Ahmed 1 month, 2 weeks ago
On Thu, Feb 12, 2026 at 07:58:50AM -0800, Jim Mattson wrote:
> Cache g_pat from vmcb12 in vmcb_save_area_cached to avoid TOCTTOU issues,
> and add a validity check so that when nested paging is enabled for vmcb12,
> an invalid g_pat at emulated VMRUN causes an immediate VMEXIT with exit
> code VMEXIT_INVALID, as specified in the APM, volume 2: "Nested Paging and
> VMRUN/VMEXIT."
> 
> Fixes: 3d6368ef580a ("KVM: SVM: Add VMRUN handler")
> Signed-off-by: Jim Mattson <jmattson@google.com>
> ---
>  arch/x86/kvm/svm/nested.c | 17 +++++++++++++----
>  arch/x86/kvm/svm/svm.h    |  1 +
>  2 files changed, 14 insertions(+), 4 deletions(-)
> 
> diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
> index b72a1f3c4144..91b35adb83f8 100644
> --- a/arch/x86/kvm/svm/nested.c
> +++ b/arch/x86/kvm/svm/nested.c
> @@ -426,7 +426,8 @@ static bool nested_vmcb_check_controls(struct kvm_vcpu *vcpu,
>  
>  /* Common checks that apply to both L1 and L2 state.  */
>  static bool nested_vmcb_check_save(struct kvm_vcpu *vcpu,
> -				   struct vmcb_save_area_cached *save)
> +				   struct vmcb_save_area_cached *save,
> +				   bool check_gpat)
>  {
>  	if (CC(!(save->efer & EFER_SVME)))
>  		return false;
> @@ -462,6 +463,9 @@ static bool nested_vmcb_check_save(struct kvm_vcpu *vcpu,
>  	if (CC(!kvm_valid_efer(vcpu, save->efer)))
>  		return false;
>  
> +	if (check_gpat && CC(!kvm_pat_valid(save->g_pat)))
> +		return false;
> +
>  	return true;
>  }
>  
> @@ -573,6 +577,7 @@ static void __nested_copy_vmcb_save_to_cache(struct vmcb_save_area_cached *to,
>  
>  	to->rax = from->rax;
>  	to->cr2 = from->cr2;
> +	to->g_pat = from->g_pat;
>  
>  	svm_copy_lbrs(to, from);
>  }
> @@ -1036,7 +1041,8 @@ int enter_svm_guest_mode(struct kvm_vcpu *vcpu, u64 vmcb12_gpa, bool from_vmrun)
>  
>  	enter_guest_mode(vcpu);
>  
> -	if (!nested_vmcb_check_save(vcpu, &svm->nested.save) ||
> +	if (!nested_vmcb_check_save(vcpu, &svm->nested.save,
> +				    nested_npt_enabled(svm)) ||
>  	    !nested_vmcb_check_controls(vcpu, &svm->nested.ctl,
>  					svm->vmcb01.ptr->save.cr0))
>  		return -EINVAL;
> @@ -2006,13 +2012,16 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu,
>  
>  	/*
>  	 * Validate host state saved from before VMRUN (see
> -	 * nested_svm_check_permissions).
> +	 * nested_svm_check_permissions). Note that the g_pat field is not
> +	 * validated, because (a) it may have been clobbered by SMM before
> +	 * KVM_GET_NESTED_STATE, and (b) it is not loaded at emulated
> +	 * #VMEXIT.

(b) here means that svm_copy_vmrun_state() does not copy it to vmcb01,
and the value is restored by KVM_SET_MSRS, right?

If my understanding is correct:

Reviewed-by: Yosry Ahmed <yosry.ahmed@linux.dev>

>  	 */
>  	__nested_copy_vmcb_save_to_cache(&save_cached, save);
>  	if (!(save->cr0 & X86_CR0_PG) ||
>  	    !(save->cr0 & X86_CR0_PE) ||
>  	    (save->rflags & X86_EFLAGS_VM) ||
> -	    !nested_vmcb_check_save(vcpu, &save_cached))
> +	    !nested_vmcb_check_save(vcpu, &save_cached, false))
>  		goto out_free;
>  
>  
> diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h
> index 9850ed01e16e..a49c48459e0b 100644
> --- a/arch/x86/kvm/svm/svm.h
> +++ b/arch/x86/kvm/svm/svm.h
> @@ -161,6 +161,7 @@ struct vmcb_save_area_cached {
>  	u64 isst_addr;
>  	u64 rax;
>  	u64 cr2;
> +	u64 g_pat;
>  	u64 dbgctl;
>  	u64 br_from;
>  	u64 br_to;
> -- 
> 2.53.0.239.g8d8fc8a987-goog
>
Re: [PATCH v4 2/8] KVM: x86: nSVM: Cache and validate vmcb12 g_pat
Posted by Jim Mattson 1 month, 1 week ago
On Thu, Feb 12, 2026 at 4:22 PM Yosry Ahmed <yosry.ahmed@linux.dev> wrote:

> > @@ -2006,13 +2012,16 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu,
> >
> >       /*
> >        * Validate host state saved from before VMRUN (see
> > -      * nested_svm_check_permissions).
> > +      * nested_svm_check_permissions). Note that the g_pat field is not
> > +      * validated, because (a) it may have been clobbered by SMM before
> > +      * KVM_GET_NESTED_STATE, and (b) it is not loaded at emulated
> > +      * #VMEXIT.
>
> (b) here means that svm_copy_vmrun_state() does not copy it to vmcb01,
> and the value is restored by KVM_SET_MSRS, right?

Actually, (b) refers to the open-coded block of assignments in
nested_svm_vmexit() under the comment:

        /*
         * Restore processor state that had been saved in vmcb01
         */

> If my understanding is correct:
>
> Reviewed-by: Yosry Ahmed <yosry.ahmed@linux.dev>
Re: [PATCH v4 2/8] KVM: x86: nSVM: Cache and validate vmcb12 g_pat
Posted by Yosry Ahmed 1 month, 1 week ago
February 21, 2026 at 12:26 AM, "Jim Mattson" <jmattson@google.com> wrote:
> 
> On Thu, Feb 12, 2026 at 4:22 PM Yosry Ahmed <> wrote:
> 
> > 
> > @@ -2006,13 +2012,16 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu,
> > 
> >  /*
> >  * Validate host state saved from before VMRUN (see
> >  - * nested_svm_check_permissions).
> >  + * nested_svm_check_permissions). Note that the g_pat field is not
> >  + * validated, because (a) it may have been clobbered by SMM before
> >  + * KVM_GET_NESTED_STATE, and (b) it is not loaded at emulated
> >  + * #VMEXIT.
> > 
> >  (b) here means that svm_copy_vmrun_state() does not copy it to vmcb01,
> >  and the value is restored by KVM_SET_MSRS, right?
> > 
> Actually, (b) refers to the open-coded block of assignments in
> nested_svm_vmexit() under the comment:
> 
>  /*
>  * Restore processor state that had been saved in vmcb01
>  */
>

Yeah IIUC it's the same thing, we migrate them and copy them here to vmcb01 so that we can restore them in nested_svm_vmexit().