Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp6589698rwp; Tue, 18 Jul 2023 02:53:49 -0700 (PDT) X-Google-Smtp-Source: APBJJlFvyzQgqu5gO51zkAIbrZXMjezxQfiRtV5xFrVh9tL57SGkn/lgpbxlaNpVQE6p5L5tLvh0 X-Received: by 2002:a05:6358:7e41:b0:135:99fa:a125 with SMTP id p1-20020a0563587e4100b0013599faa125mr10372419rwm.1.1689674029310; Tue, 18 Jul 2023 02:53:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689674029; cv=none; d=google.com; s=arc-20160816; b=C9WPKpKE4raLOr+Mdr+FGzwpbw5mGQy+qJv0gPGExyMD26fKnSeWqHwU0IIynaXz49 jGFTkzg8ajpWicDcxcp+u9h3vY5FmP3x3BXCRCEGov8GTEku8tL/2dbKYz2H+8ROQqOR Se7l4W4pJS2XgZANmml5XRupvPpUpyks+jhSNGSav38IPcxtL+EDtuy/o1R0q6pzxvFl /oUA4ujTJAW7cYueSTkkv5Yta58x7Fr4S/lMzcCMUDfcyV/yU/WewKkLOnxt8rbrkuer qdsPy0TejRK+Lafe6Ex/nIZVk8Y+wq9gkkXz2SpPSGJexQVDUWO5sWL1vW4IkRQjDp1V eryw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=i0Za5rKgUBZTxkAktgjwNM5+Kehhc/iwdSkhd6KTsmE=; fh=h+09CC2YFXYXA44jAN2W/XszUAPEuokN58P13gOP3bQ=; b=VMFB3taM3yESvYMYk/vgQM/HNdUuT/cJDHxg2tv3AgrNcsCblUQ5jFCODrdUegu9+w Hso+0Umg3feLAOopB2js0TFGDmJbWojLEyywRTgHcXNHI6xFHwxAi3gv0ZdX6qeiv+gz Bw4AMB04ChinIWUWOEVb6T6MsefiwUX96WlbWZDJQb1NdqGvnysICG/c77gVN5ef3P23 0rzBBX35AOusc1Fs4ImoLBra9oAWwlv+ltclGT1wxogW2CXwl/TJdK5Oz7ocLRCMpOfW wKrUATE1Wg9bw3bypQxmY7hVz/HLHxB4xln/tgQ+kgBPXFPaKPou3C28N6CtnKRxhKeF o45Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IG+OaGoV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k8-20020aa788c8000000b006688882d4d8si1311690pff.403.2023.07.18.02.53.33; Tue, 18 Jul 2023 02:53:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IG+OaGoV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232237AbjGRJOc (ORCPT + 99 others); Tue, 18 Jul 2023 05:14:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53246 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232171AbjGRJOS (ORCPT ); Tue, 18 Jul 2023 05:14:18 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BC322E5F for ; Tue, 18 Jul 2023 02:13:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1689671610; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=i0Za5rKgUBZTxkAktgjwNM5+Kehhc/iwdSkhd6KTsmE=; b=IG+OaGoVqM/d6IMrGhCO7lKJhP9aeVOl3tQ8IXHcr6mM0dleHtzlRaOK4Lv4EEqiKsl/pu p+iR9P52scHzWwJb3Mj+RO+XElxd/LnGbbiV/UtTFaBvE8BwdtgT1bTvARYja2z8Mt3TOL NMeFmjR2PbbG0VWeXBc2+F6bEl0Ycgw= Received: from mimecast-mx02.redhat.com (66.187.233.73 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-611-q8j76lraNJGR3zgugEfZsA-1; Tue, 18 Jul 2023 05:13:24 -0400 X-MC-Unique: q8j76lraNJGR3zgugEfZsA-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 12E972A59543; Tue, 18 Jul 2023 09:13:24 +0000 (UTC) Received: from localhost.localdomain (unknown [10.45.224.28]) by smtp.corp.redhat.com (Postfix) with ESMTP id 95ACD1454142; Tue, 18 Jul 2023 09:13:21 +0000 (UTC) From: Maxim Levitsky To: kvm@vger.kernel.org Cc: "H. Peter Anvin" , Sean Christopherson , linux-kernel@vger.kernel.org, Thomas Gleixner , Paolo Bonzini , Ingo Molnar , Dave Hansen , x86@kernel.org, Borislav Petkov , Maxim Levitsky Subject: [PATCH 3/3] KVM: x86: check the kvm_cpu_get_interrupt result before using it Date: Tue, 18 Jul 2023 12:13:10 +0300 Message-Id: <20230718091310.119672-4-mlevitsk@redhat.com> In-Reply-To: <20230718091310.119672-1-mlevitsk@redhat.com> References: <20230718091310.119672-1-mlevitsk@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.7 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The code was blindly assuming that kvm_cpu_get_interrupt never returns -1 when there is a pending interrupt. While this should be true, a bug in KVM can still cause this. If -1 is returned, the code before this patch was converting it to 0xFF, and 0xFF interrupt was injected to the guest, which results in an issue which was hard to debug. Add WARN_ON_ONCE to catch this case and skip the injection if this happens again. Signed-off-by: Maxim Levitsky --- arch/x86/kvm/x86.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index c0778ca39650f4..37162c589e8d0e 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -10190,9 +10190,13 @@ static int kvm_check_and_inject_events(struct kvm_vcpu *vcpu, if (r < 0) goto out; if (r) { - kvm_queue_interrupt(vcpu, kvm_cpu_get_interrupt(vcpu), false); - static_call(kvm_x86_inject_irq)(vcpu, false); - WARN_ON(static_call(kvm_x86_interrupt_allowed)(vcpu, true) < 0); + int irq = kvm_cpu_get_interrupt(vcpu); + + if (!WARN_ON_ONCE(irq == -1)) { + kvm_queue_interrupt(vcpu, irq, false); + static_call(kvm_x86_inject_irq)(vcpu, false); + WARN_ON(static_call(kvm_x86_interrupt_allowed)(vcpu, true) < 0); + } } if (kvm_cpu_has_injectable_intr(vcpu)) static_call(kvm_x86_enable_irq_window)(vcpu); -- 2.26.3