Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp4238270pxb; Tue, 17 Nov 2020 15:27:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJxz5+Uq8J+hAtVWLivva1lmNHo7PxZDcYn95y7W70X5S3syWJAWcPorOMlqYLD7NGRWGE8Q X-Received: by 2002:a17:906:60c8:: with SMTP id f8mr22595907ejk.14.1605655631895; Tue, 17 Nov 2020 15:27:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605655631; cv=none; d=google.com; s=arc-20160816; b=PtBF2wMZniFiE0JNE2NkBk8WIuFmxw9rbFON9Lj1ziLP1bT89h07XjmY1nF1RATVmi C2hDseoHrv6Z/2x2dbdR8kevqJNLwde7aImCVEdB0+8YGmLpP4GSziBSWeLfkECYuDVw I4v7iOIbZ55oj3xbTt5iILvdlfLCuh3vIZqpvDeWbgp70KnA4r2FDCSgJR8i1xVY6AQ8 VZlSrhxLAguKu+0MNwdIplp3bjM+D9Q7x026NE01pYDAb+ooCCl84o0Be2Vd+LyoXIeb s85Ao+Z0zAiy3JsuxZ3ZRCtXmPxmq46NcjHxZkgZ1XJm3UKJ+q3b0QHbajjjQ/PmCLzw xg9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=3fHch99jqHexf8ELMflOi+vYlHHWLr5MUIuOKUC+7v8=; b=pitXmpOlsHeO+Nam0xksdVFnFtZYYCS4lB5okUtD54tl7h/agcgL+VV1hG+UpKMArW cTkI/vsOrkVAwhniSl++Cl03PX13C9CcxNxJrin/pZ5pz26oSrLXfIYmc+Wg7AiTmLM5 dU6IuNSsWg5xsf25R4F4BNl1Th49sO4hhdrXnHXqYnqOT73K71QonxtBUJ+qGU3DjDjM P/n5PVXODmfnX7n3SjHO+va7ODGxw9jZw5/ui+QdJ6Vp/bVrmm/P9ihRdOfIHvD67zq/ jgJ2FaC+YTrHcokDroITEF0o9nuWoK00aHrVeEDAwCcXJPUsCgI/ipEw/Iygbyf6nLAv u+tQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=wnFZvyup; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f19si14041494ejh.370.2020.11.17.15.26.49; Tue, 17 Nov 2020 15:27:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=wnFZvyup; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729238AbgKQXU4 (ORCPT + 99 others); Tue, 17 Nov 2020 18:20:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39978 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729196AbgKQXUw (ORCPT ); Tue, 17 Nov 2020 18:20:52 -0500 Received: from mail-qv1-xf43.google.com (mail-qv1-xf43.google.com [IPv6:2607:f8b0:4864:20::f43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6216EC0613CF for ; Tue, 17 Nov 2020 15:20:52 -0800 (PST) Received: by mail-qv1-xf43.google.com with SMTP id a15so112078qvk.5 for ; Tue, 17 Nov 2020 15:20:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=3fHch99jqHexf8ELMflOi+vYlHHWLr5MUIuOKUC+7v8=; b=wnFZvyupplTu6/MkWq8GfsCFKvXem5LUAekMD+BUcrc+FOBPknQW99s1zRVuNqfwa8 0II+ih8ORrG7Bcho8DCooWjQeJctC82cd5KNxwdPiuF6qV3Mh+I0RzJ0Fic4AdCPX1+e igWDyrdvxpwRE9TOsfDLWBetS2T5WCrzUrgWo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=3fHch99jqHexf8ELMflOi+vYlHHWLr5MUIuOKUC+7v8=; b=ZWCYXAnEje34qMnHbD78c3yfoDZQ7qpSzfIlUFfekoACntkRKTWMrnaZNTpwm4/TNn g7YJgK/pcRxHq7+WopRJ/NVyw1F6x//fyDYECyRFsxbrhONu0K0qXxBe9WzbkgDv5JKm HaXloB7Rfz6b9jVcDBd4yE15gu6Wx2JzYxByZPTbvanEG4j3LROoDIRMmK/LjnvwugRm WMr7j00/DEYLSOgO5vRIjcuvNzukoXq1V5ZAdrSanrRWnh8ycpDM4Hytyr0ccsj5dUkg l3DPKRVtqB95V5jv8WN88RWQacdtN/iTmGGKMhIGtBQyj1D4FtTXAUy2P/MGiFD9LItd Clsg== X-Gm-Message-State: AOAM533rDkFu7x2Wl71/OGeU8zczf5UUembnRpKV7BYp9LoFmgcTaAp1 ilbQlHd+kZo+1JlIDIJjJnoo/w== X-Received: by 2002:a05:6214:32f:: with SMTP id j15mr2235450qvu.35.1605655251608; Tue, 17 Nov 2020 15:20:51 -0800 (PST) Received: from joelaf.cam.corp.google.com ([2620:15c:6:411:cad3:ffff:feb3:bd59]) by smtp.gmail.com with ESMTPSA id d12sm14555544qtp.77.2020.11.17.15.20.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Nov 2020 15:20:51 -0800 (PST) From: "Joel Fernandes (Google)" To: Nishanth Aravamudan , Julien Desfossez , Peter Zijlstra , Tim Chen , Vineeth Pillai , Aaron Lu , Aubrey Li , tglx@linutronix.de, linux-kernel@vger.kernel.org Cc: mingo@kernel.org, torvalds@linux-foundation.org, fweisbec@gmail.com, keescook@chromium.org, kerrnel@google.com, Phil Auld , Valentin Schneider , Mel Gorman , Pawan Gupta , Paolo Bonzini , joel@joelfernandes.org, vineeth@bitbyteword.org, Chen Yu , Christian Brauner , Agata Gruza , Antonio Gomez Iglesias , graf@amazon.com, konrad.wilk@oracle.com, dfaggioli@suse.com, pjt@google.com, rostedt@goodmis.org, derkling@google.com, benbjiang@tencent.com, Alexandre Chartre , James.Bottomley@hansenpartnership.com, OWeisse@umich.edu, Dhaval Giani , Junaid Shahid , jsbarnes@google.com, chris.hyser@oracle.com, Ben Segall , Josh Don , Hao Luo , Tom Lendacky , Aubrey Li , "Paul E. McKenney" , Tim Chen Subject: [PATCH -tip 20/32] entry/kvm: Protect the kernel when entering from guest Date: Tue, 17 Nov 2020 18:19:50 -0500 Message-Id: <20201117232003.3580179-21-joel@joelfernandes.org> X-Mailer: git-send-email 2.29.2.299.gdc1121823c-goog In-Reply-To: <20201117232003.3580179-1-joel@joelfernandes.org> References: <20201117232003.3580179-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vineeth Pillai Similar to how user to kernel mode transitions are protected in earlier patches, protect the entry into kernel from guest mode as well. Tested-by: Julien Desfossez Reviewed-by: Joel Fernandes (Google) Reviewed-by: Alexandre Chartre Signed-off-by: Vineeth Pillai Signed-off-by: Joel Fernandes (Google) --- arch/x86/kvm/x86.c | 2 ++ include/linux/entry-kvm.h | 12 ++++++++++++ kernel/entry/kvm.c | 33 +++++++++++++++++++++++++++++++++ 3 files changed, 47 insertions(+) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 447edc0d1d5a..a50be74f70f1 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -8910,6 +8910,7 @@ static int vcpu_enter_guest(struct kvm_vcpu *vcpu) */ smp_mb__after_srcu_read_unlock(); + kvm_exit_to_guest_mode(); /* * This handles the case where a posted interrupt was * notified with kvm_vcpu_kick. @@ -9003,6 +9004,7 @@ static int vcpu_enter_guest(struct kvm_vcpu *vcpu) } } + kvm_enter_from_guest_mode(); local_irq_enable(); preempt_enable(); diff --git a/include/linux/entry-kvm.h b/include/linux/entry-kvm.h index 9b93f8584ff7..67da6dcf442b 100644 --- a/include/linux/entry-kvm.h +++ b/include/linux/entry-kvm.h @@ -77,4 +77,16 @@ static inline bool xfer_to_guest_mode_work_pending(void) } #endif /* CONFIG_KVM_XFER_TO_GUEST_WORK */ +/** + * kvm_enter_from_guest_mode - Hook called just after entering kernel from guest. + * Caller should ensure interrupts are off. + */ +void kvm_enter_from_guest_mode(void); + +/** + * kvm_exit_to_guest_mode - Hook called just before entering guest from kernel. + * Caller should ensure interrupts are off. + */ +void kvm_exit_to_guest_mode(void); + #endif diff --git a/kernel/entry/kvm.c b/kernel/entry/kvm.c index 49972ee99aff..3b603e8bd5da 100644 --- a/kernel/entry/kvm.c +++ b/kernel/entry/kvm.c @@ -50,3 +50,36 @@ int xfer_to_guest_mode_handle_work(struct kvm_vcpu *vcpu) return xfer_to_guest_mode_work(vcpu, ti_work); } EXPORT_SYMBOL_GPL(xfer_to_guest_mode_handle_work); + +/** + * kvm_enter_from_guest_mode - Hook called just after entering kernel from guest. + * Caller should ensure interrupts are off. + */ +void kvm_enter_from_guest_mode(void) +{ + if (!entry_kernel_protected()) + return; + sched_core_unsafe_enter(); +} +EXPORT_SYMBOL_GPL(kvm_enter_from_guest_mode); + +/** + * kvm_exit_to_guest_mode - Hook called just before entering guest from kernel. + * Caller should ensure interrupts are off. + */ +void kvm_exit_to_guest_mode(void) +{ + if (!entry_kernel_protected()) + return; + sched_core_unsafe_exit(); + + /* + * Wait here instead of in xfer_to_guest_mode_handle_work(). The reason + * is because in vcpu_run(), xfer_to_guest_mode_handle_work() is called + * when a vCPU was either runnable or blocked. However, we only care + * about the runnable case (VM entry/exit) which is handled by + * vcpu_enter_guest(). + */ + sched_core_wait_till_safe(XFER_TO_GUEST_MODE_WORK); +} +EXPORT_SYMBOL_GPL(kvm_exit_to_guest_mode); -- 2.29.2.299.gdc1121823c-goog