Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8114683imu; Tue, 4 Dec 2018 03:15:08 -0800 (PST) X-Google-Smtp-Source: AFSGD/VJ8yV8VlnzJ1/Va6cP8Cc4NmPEfnqKqLt82hdKYqFFckjooGwSTteryNGSNWThsCZyQI1w X-Received: by 2002:a62:546:: with SMTP id 67mr19175466pff.99.1543922107980; Tue, 04 Dec 2018 03:15:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543922107; cv=none; d=google.com; s=arc-20160816; b=KnL/XkpdFETd7AZEozvxosJrpaVeEpLS/4Hs3MjVCv19BHx2pM7GMYfI9m18ahXinQ upEb6Z8lWWeyXaYfLR0/PD9cN1n+4yHZ7cq07JOGv/CLZe2CzgHKFI/pKesHl6+fkhmT Ri3Ua4iitMbl+zwdeQOGWYi+9O7NOh73N2xrRaWVOiOBGwawUNvnhC0H1Pei1S2vKiCq xX7iIevMLPNOH4uFK2QyC4bREwUtACk2F1EHAWK5lHjpnaETIYRS4RYqeaOK7F+fNhrg 62ivW89cdQwDEFf1TbB9eTKFmrEm6RDsOL/1r9p0sRU45eskUsHTVQ9SbhEE1QI4PJuN hglQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nRB5Mo8tx0eEapP13ID0Sl3ardNvpjKgSvnxFpJdbA8=; b=LLqwS6E0YyYIu3OmJv+bQTGcTFadKvYeJQV1+UEj3s+Gn2UwMobsBPoEm9JJsD5aWZ IaBJKgsuzuPxswxd4luzon7kGm8XowPUEl//0KkayB3Z/8nBWeLa3NvpQf7hjUriYGfG h1M+lE2GOtPCvr96EIqkndNsYH4GcGJU8ZP26iWI9FJbgC1w//rYb7/P/3/4hZXLXkdj BIEZPTRCRRlTC2e5SwDY7KE/sKY8xszoRN/4z1OBWHCZ5h2Y6y9mOgGkaS+RpNbOosaU SMFRB5uBEz+ZGchSuFou6QzBW3OY4EKcj3mLDlsTOqsL3EipUVgU8lHoSZaAn4G3s0XZ jpoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="QM/B2twe"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33si4072723plt.228.2018.12.04.03.14.52; Tue, 04 Dec 2018 03:15:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="QM/B2twe"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728441AbeLDLOL (ORCPT + 99 others); Tue, 4 Dec 2018 06:14:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:56020 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728398AbeLDLHF (ORCPT ); Tue, 4 Dec 2018 06:07:05 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EBF8321508; Tue, 4 Dec 2018 11:07:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921624; bh=6B22mIB0VZuTvpm0AtuvTvH94jsahbQJaxjk1HGjFe4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QM/B2twe06e85a1PZODGRu0iZ7y0DsFNOMpnvRiy8il4APgqPmCZegxfb3aZN5UMw J8BVjyfWdf5VD36wZoVdDg4bedh25fZ91fBQj92TBK/TCKR8/0DrZQZJRpsk2BVmIK J3sk7hZzrEgWzzH74NhLl6imaJbSnb/2oE4dVINc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Junaid Shahid , Wanpeng Li , Paolo Bonzini Subject: [PATCH 4.14 109/146] kvm: mmu: Fix race in emulated page table writes Date: Tue, 4 Dec 2018 11:49:55 +0100 Message-Id: <20181204103731.212838462@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103726.750894136@linuxfoundation.org> References: <20181204103726.750894136@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Junaid Shahid commit 0e0fee5c539b61fdd098332e0e2cc375d9073706 upstream. When a guest page table is updated via an emulated write, kvm_mmu_pte_write() is called to update the shadow PTE using the just written guest PTE value. But if two emulated guest PTE writes happened concurrently, it is possible that the guest PTE and the shadow PTE end up being out of sync. Emulated writes do not mark the shadow page as unsync-ed, so this inconsistency will not be resolved even by a guest TLB flush (unless the page was marked as unsync-ed at some other point). This is fixed by re-reading the current value of the guest PTE after the MMU lock has been acquired instead of just using the value that was written prior to calling kvm_mmu_pte_write(). Signed-off-by: Junaid Shahid Reviewed-by: Wanpeng Li Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/mmu.c | 27 +++++++++------------------ 1 file changed, 9 insertions(+), 18 deletions(-) --- a/arch/x86/kvm/mmu.c +++ b/arch/x86/kvm/mmu.c @@ -4734,9 +4734,9 @@ static bool need_remote_flush(u64 old, u } static u64 mmu_pte_write_fetch_gpte(struct kvm_vcpu *vcpu, gpa_t *gpa, - const u8 *new, int *bytes) + int *bytes) { - u64 gentry; + u64 gentry = 0; int r; /* @@ -4748,22 +4748,12 @@ static u64 mmu_pte_write_fetch_gpte(stru /* Handle a 32-bit guest writing two halves of a 64-bit gpte */ *gpa &= ~(gpa_t)7; *bytes = 8; - r = kvm_vcpu_read_guest(vcpu, *gpa, &gentry, 8); - if (r) - gentry = 0; - new = (const u8 *)&gentry; } - switch (*bytes) { - case 4: - gentry = *(const u32 *)new; - break; - case 8: - gentry = *(const u64 *)new; - break; - default: - gentry = 0; - break; + if (*bytes == 4 || *bytes == 8) { + r = kvm_vcpu_read_guest_atomic(vcpu, *gpa, &gentry, *bytes); + if (r) + gentry = 0; } return gentry; @@ -4876,8 +4866,6 @@ static void kvm_mmu_pte_write(struct kvm pgprintk("%s: gpa %llx bytes %d\n", __func__, gpa, bytes); - gentry = mmu_pte_write_fetch_gpte(vcpu, &gpa, new, &bytes); - /* * No need to care whether allocation memory is successful * or not since pte prefetch is skiped if it does not have @@ -4886,6 +4874,9 @@ static void kvm_mmu_pte_write(struct kvm mmu_topup_memory_caches(vcpu); spin_lock(&vcpu->kvm->mmu_lock); + + gentry = mmu_pte_write_fetch_gpte(vcpu, &gpa, &bytes); + ++vcpu->kvm->stat.mmu_pte_write; kvm_mmu_audit(vcpu, AUDIT_PRE_PTE_WRITE);