lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c3205ac001776585d2a1fd14ebfec631d8ff7d3a.camel@intel.com>
Date: Tue, 13 Aug 2024 05:22:28 +0000
From: "Huang, Kai" <kai.huang@...el.com>
To: "seanjc@...gle.com" <seanjc@...gle.com>
CC: "kvm@...r.kernel.org" <kvm@...r.kernel.org>, "pbonzini@...hat.com"
	<pbonzini@...hat.com>, "linux-kernel@...r.kernel.org"
	<linux-kernel@...r.kernel.org>, "Gao, Chao" <chao.gao@...el.com>
Subject: Re: [PATCH v3 4/8] KVM: Add a module param to allow enabling
 virtualization when KVM is loaded

On Mon, 2024-08-12 at 19:31 -0700, Sean Christopherson wrote:
> On Fri, Aug 02, 2024, Kai Huang wrote:
> > 
> > > +static void kvm_uninit_virtualization(void)
> > > +{
> > > +	if (enable_virt_at_load)
> > > +		kvm_disable_virtualization();
> > > +
> > > +	WARN_ON(kvm_usage_count);
> > > +}
> > > 
> > 
> > Hi Sean,
> > 
> > The above "WARN_ON(kvm_usage_count);" assumes the
> > kvm_uninit_virtualization() is the last call of
> > kvm_disable_virtualization(), and it is called ...
> > 
> > > @@ -6433,6 +6468,8 @@ void kvm_exit(void)
> > >  	 */
> > >  	misc_deregister(&kvm_dev);
> > >  
> > > +	kvm_uninit_virtualization();
> > > +
> > > 
> > 
> > ... from kvm_exit().
> > 
> > Accordingly, kvm_init_virtualization() is called in kvm_init().
> > 
> > For TDX, we want to "explicitly call kvm_enable_virtualization() +
> > initializing TDX module" before kvm_init() in vt_init(), since kvm_init()
> > is supposed to be the last step after initializing TDX.
> > 
> > In the exit path, accordingly, for TDX we want to call kvm_exit() first,
> > and then "do TDX cleanup staff + explicitly call
> > kvm_disable_virtualizaation()".
> > 
> > This will trigger the above "WARN_ON(kvm_usage_count);" when
> > enable_virt_at_load is true, because kvm_uninit_virtualization() isn't
> > the last call of kvm_disable_virtualization().
> > 
> > To resolve, I think one way is we can move kvm_init_virtualization() out
> > of kvm_init(), but I am not sure whether there's another common place
> > that kvm_init_virtualization() can be called for all ARCHs.
> > 
> > Do you have any comments?
> 
> Drat.  That's my main coment, though not the exact word I used :-)
> 
> I managed to completely forget about TDX needing to enable virtualization to do
> its setup before creating /dev/kvm.  A few options jump to mind:
> 
>  1. Expose kvm_enable_virtualization() to arch code and delete the WARN_ON().
> 
>  2. Move kvm_init_virtualization() as you suggested.
> 
>  3. Move the call to misc_register() out of kvm_init(), so that arch code can
>     do additional setup between kvm_init() and kvm_register_dev_kvm() or whatever.
> 
> I'm leaning towards #1.  IIRC, that was my original intent before going down the
> "enable virtualization at module load" path.  And it's not mutually exclusive
> with allowing virtualization to be forced on at module load.
> 
> If #1 isn't a good option for whatever reason, I'd lean slightly for #3 over #2,
> purely because it's less arbitrary (registering /dev/kvm is the only thing that
> has strict ordering requirements).  But I don't know that having a separate
> registration API would be a net positive, e.g. it's kinda nice that kvm_init()
> needs to be last, because it helps ensure some amount of guaranteed ordering
> between common KVM and arch code.

I agree with option 1).  We just allow arch code to do additional
kvm_enable_virtualization() before kvm_init() and kvm_disable_virtualization()
after kvm_exit().  I think it's kinda normal behaviour anyway.

And this is exactly what I am doing :-)

https://github.com/intel/tdx/commit/2f7cef685527a5ef952346ff5ab9adbb8bb6f371
https://github.com/intel/tdx/commit/6c76ffa47a98ca370fad389271dc3cedf304df2d

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ