lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3f15f8d5-6129-e202-f56e-a5809c41782c@amazon.com>
Date:   Wed, 4 Sep 2019 17:58:08 +0200
From:   Alexander Graf <graf@...zon.com>
To:     Sean Christopherson <sean.j.christopherson@...el.com>
CC:     <kvm@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
        <x86@...nel.org>, "H. Peter Anvin" <hpa@...or.com>,
        Borislav Petkov <bp@...en8.de>, Ingo Molnar <mingo@...hat.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Joerg Roedel <joro@...tes.org>,
        Jim Mattson <jmattson@...gle.com>,
        Wanpeng Li <wanpengli@...cent.com>,
        Vitaly Kuznetsov <vkuznets@...hat.com>,
        Radim Krčmář <rkrcmar@...hat.com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        Liran Alon <liran.alon@...cle.com>
Subject: Re: [PATCH v2 1/2] KVM: VMX: Disable posted interrupts for odd IRQs



On 04.09.19 17:51, Sean Christopherson wrote:
> On Wed, Sep 04, 2019 at 05:36:39PM +0200, Alexander Graf wrote:
>>
>>
>> On 04.09.19 16:40, Sean Christopherson wrote:
>>> On Wed, Sep 04, 2019 at 03:35:10PM +0200, Alexander Graf wrote:
>>>> We can easily route hardware interrupts directly into VM context when
>>>> they target the "Fixed" or "LowPriority" delivery modes.
>>>>
>>>> However, on modes such as "SMI" or "Init", we need to go via KVM code
>>>> to actually put the vCPU into a different mode of operation, so we can
>>>> not post the interrupt
>>>>
>>>> Add code in the VMX PI logic to explicitly refuse to establish posted
>>>> mappings for advanced IRQ deliver modes. This reflects the logic in
>>>> __apic_accept_irq() which also only ever passes Fixed and LowPriority
>>>> interrupts as posted interrupts into the guest.
>>>>
>>>> This fixes a bug I have with code which configures real hardware to
>>>> inject virtual SMIs into my guest.
>>>>
>>>> Signed-off-by: Alexander Graf <graf@...zon.com>
>>>> Reviewed-by: Liran Alon <liran.alon@...cle.com>
>>>>
>>>> ---
>>>>
>>>> v1 -> v2:
>>>>
>>>>    - Make error message more unique
>>>>    - Update commit message to point to __apic_accept_irq()
>>>> ---
>>>>   arch/x86/kvm/vmx/vmx.c | 22 ++++++++++++++++++++++
>>>>   1 file changed, 22 insertions(+)
>>>>
>>>> diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
>>>> index 570a233e272b..8029fe658c30 100644
>>>> --- a/arch/x86/kvm/vmx/vmx.c
>>>> +++ b/arch/x86/kvm/vmx/vmx.c
>>>> @@ -7401,6 +7401,28 @@ static int vmx_update_pi_irte(struct kvm *kvm, unsigned int host_irq,
>>>>   			continue;
>>>>   		}
>>>> +		switch (irq.delivery_mode) {
>>>> +		case dest_Fixed:
>>>> +		case dest_LowestPrio:
>>>> +			break;
>>>> +		default:
>>>> +			/*
>>>> +			 * For non-trivial interrupt events, we need to go
>>>> +			 * through the full KVM IRQ code, so refuse to take
>>>> +			 * any direct PI assignments here.
>>>> +			 */
>>>
>>> IMO, a beefy comment is unnecessary, anyone that is digging through this
>>> code has hopefully read the PI spec or at least understands the basic
>>> concepts.  I.e. it should be obvious that PI can't be used for SMI, etc...
>>>
>>>> +			ret = irq_set_vcpu_affinity(host_irq, NULL);
>>>> +			if (ret < 0) {
>>>> +				printk(KERN_INFO
>>>> +				    "non-std IRQ failed to recover, irq: %u\n",
>>>> +				    host_irq);
>>>> +				goto out;
>>>> +			}
>>>> +
>>>> +			continue;
>>>
>>> Using a switch to filter out two types is a bit of overkill.  It also
>>
>> The switch should compile into the same as the if() below, it's just a
>> matter of being more verbose in code.
>>
>>> probably makes sense to perform the deliver_mode checks before calling
>>> kvm_intr_is_single_vcpu().  Why not simply something like this?  The
>>> existing comment and error message are even generic enough to keep as is.
>>
>> Ok, so how about this, even though it goes against Liran's comment on the
>> combined debug print?
> 
> I missed that comment.
> 
> How often do we expect irq_set_vcpu_affinity() to fail?  If it's frequent
> enough that the debug message matters, maybe it should be a tracepoint.

I don't expect to ever hit that debug print, so I don't think it matters 
really.

>   
>> If you think it's reasonable despite the broken formatting, I'll be happy to
>> fold the patches and submit as v3.
>>
>>
>> Alex
>>
>>
>> diff --git a/arch/x86/include/asm/kvm_host.h
>> b/arch/x86/include/asm/kvm_host.h
>> index 44a5ce57a905..55f68fb0d791 100644
>> --- a/arch/x86/include/asm/kvm_host.h
>> +++ b/arch/x86/include/asm/kvm_host.h
>> @@ -1581,6 +1581,12 @@ bool kvm_intr_is_single_vcpu(struct kvm *kvm, struct
>> kvm_lapic_irq *irq,
>>   void kvm_set_msi_irq(struct kvm *kvm, struct kvm_kernel_irq_routing_entry
>> *e,
>>   		     struct kvm_lapic_irq *irq);
>>
>> +static inline bool kvm_irq_is_generic(struct kvm_lapic_irq *irq)
>> +{
>> +	return (irq->delivery_mode == dest_Fixed ||
>> +		irq->delivery_mode == dest_LowestPrio);
>> +}
>> +
>>   static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu)
>>   {
>>   	if (kvm_x86_ops->vcpu_blocking)
>> diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
>> index 1f220a85514f..34cc59518cbb 100644
>> --- a/arch/x86/kvm/svm.c
>> +++ b/arch/x86/kvm/svm.c
>> @@ -5260,7 +5260,8 @@ get_pi_vcpu_info(struct kvm *kvm, struct
>> kvm_kernel_irq_routing_entry *e,
>>
>>   	kvm_set_msi_irq(kvm, e, &irq);
>>
>> -	if (!kvm_intr_is_single_vcpu(kvm, &irq, &vcpu)) {
>> +	if (!kvm_intr_is_single_vcpu(kvm, &irq, &vcpu) ||
>> +	    !kvm_irq_is_generic(&irq)) {
> 
> I've never heard/seen the term generic used to describe x86 interrupts.
> Maybe kvm_irq_is_intr() or kvm_irq_is_vectored_intr()?

I was trying to come up with any name that describes "interrupt that we 
can post". If "intr" is that, I'll be happy to take it. Vectored_intr 
sounds even worse IMHO :).

> 
>>   		pr_debug("SVM: %s: use legacy intr remap mode for irq %u\n",
>>   			 __func__, irq.vector);
>>   		return -1;
>> @@ -5314,6 +5315,7 @@ static int svm_update_pi_irte(struct kvm *kvm,
>> unsigned int host_irq,
>>   		 * 1. When cannot target interrupt to a specific vcpu.
>>   		 * 2. Unsetting posted interrupt.
>>   		 * 3. APIC virtialization is disabled for the vcpu.
>> +		 * 4. IRQ has extended delivery mode (SMI, INIT, etc)
> 
> Similarly, 'extended delivery mode' isn't really a thing, it's simply the
> delivery mode.

s/extended/incompatible/ maybe?


Alex



Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Ralf Herbrich
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ