From: Sean Christopherson <seanjc@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: Zhao Liu <zhao1.liu@intel.com>,
Binbin Wu <binbin.wu@linux.intel.com>,
xiaoyao.li@intel.com, qemu-devel@nongnu.org,
michael.roth@amd.com, rick.p.edgecombe@intel.com,
isaku.yamahata@intel.com, farrah.chen@intel.com,
kvm@vger.kernel.org
Subject: Re: [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
Date: Thu, 12 Dec 2024 11:13:13 -0800 [thread overview]
Message-ID: <Z1s1yeWKnvmh718N@google.com> (raw)
In-Reply-To: <1a5e2988-9a7d-4415-86ad-8a7a98dbc5eb@redhat.com>
On Thu, Dec 12, 2024, Paolo Bonzini wrote:
> On 12/12/24 09:07, Zhao Liu wrote:
> > On Thu, Dec 12, 2024 at 11:26:28AM +0800, Binbin Wu wrote:
> > > Date: Thu, 12 Dec 2024 11:26:28 +0800
> > > From: Binbin Wu <binbin.wu@linux.intel.com>
> > > Subject: [PATCH] i386/kvm: Set return value after handling
> > > KVM_EXIT_HYPERCALL
> > > X-Mailer: git-send-email 2.46.0
> > >
> > > Userspace should set the ret field of hypercall after handling
> > > KVM_EXIT_HYPERCALL. Otherwise, a stale value could be returned to KVM.
> > >
> > > Fixes: 47e76d03b15 ("i386/kvm: Add KVM_EXIT_HYPERCALL handling for KVM_HC_MAP_GPA_RANGE")
> > > Reported-by: Farrah Chen <farrah.chen@intel.com>
> > > Signed-off-by: Binbin Wu <binbin.wu@linux.intel.com>
> > > Tested-by: Farrah Chen <farrah.chen@intel.com>
> > > ---
> > > To test the TDX code in kvm-coco-queue, please apply the patch to the QEMU,
> > > otherwise, TDX guest boot could fail.
> > > A matching QEMU tree including this patch is here:
> > > https://github.com/intel-staging/qemu-tdx/releases/tag/tdx-qemu-upstream-v6.1-fix_kvm_hypercall_return_value
> > >
> > > Previously, the issue was not triggered because no one would modify the ret
> > > value. But with the refactor patch for __kvm_emulate_hypercall() in KVM,
> > > https://lore.kernel.org/kvm/20241128004344.4072099-7-seanjc@google.com/, the
> > > value could be modified.
> >
> > Could you explain the specific reasons here in detail? It would be
> > helpful with debugging or reproducing the issue.
> >
> > > ---
> > > target/i386/kvm/kvm.c | 8 ++++++--
> > > 1 file changed, 6 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c
> > > index 8e17942c3b..4bcccb48d1 100644
> > > --- a/target/i386/kvm/kvm.c
> > > +++ b/target/i386/kvm/kvm.c
> > > @@ -6005,10 +6005,14 @@ static int kvm_handle_hc_map_gpa_range(struct kvm_run *run)
> > > static int kvm_handle_hypercall(struct kvm_run *run)
> > > {
> > > + int ret = -EINVAL;
> > > +
> > > if (run->hypercall.nr == KVM_HC_MAP_GPA_RANGE)
> > > - return kvm_handle_hc_map_gpa_range(run);
> > > + ret = kvm_handle_hc_map_gpa_range(run);
> > > +
> > > + run->hypercall.ret = ret;
> >
> > ret may be negative but hypercall.ret is u64. Do we need to set it to
> > -ret?
>
> If ret is less than zero, will stop the VM anyway as
> RUN_STATE_INTERNAL_ERROR.
>
> If this has to be fixed in QEMU, I think there's no need to set anything
> if ret != 0; also because kvm_convert_memory() returns -1 on error and
> that's not how the error would be passed to the guest.
>
> However, I think the right fix should simply be this in KVM:
>
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index 83fe0a78146f..e2118ba93ef6 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -10066,6 +10066,7 @@ unsigned long __kvm_emulate_hypercall(struct kvm_vcpu *vcpu, unsigned long nr,
> }
> vcpu->run->exit_reason = KVM_EXIT_HYPERCALL;
> + vcpu->run->ret = 0;
vcpu->run->hypercall.ret
> vcpu->run->hypercall.nr = KVM_HC_MAP_GPA_RANGE;
> vcpu->run->hypercall.args[0] = gpa;
> vcpu->run->hypercall.args[1] = npages;
>
> While there is arguably a change in behavior of the kernel both with
> the patches in kvm-coco-queue and with the above one, _in practice_
> the above change is one that userspace will not notice.
I agree that KVM should initialize "ret", but I don't think '0' is the right
value. KVM shouldn't assume userspace will successfully handle the hypercall.
What happens if KVM sets vcpu->run->hypercall.ret to a non-zero value, e.g. -KVM_ENOSYS?
next prev parent reply other threads:[~2024-12-12 19:13 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-12-12 3:26 [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL Binbin Wu
2024-12-12 3:41 ` Yao Yuan
2024-12-12 3:44 ` Xiaoyao Li
2024-12-12 5:18 ` Binbin Wu
2024-12-12 7:09 ` Xiaoyao Li
2024-12-12 7:24 ` Binbin Wu
2024-12-12 8:07 ` Zhao Liu
2024-12-12 16:03 ` Paolo Bonzini
2024-12-12 19:13 ` Sean Christopherson [this message]
2024-12-12 21:28 ` Paolo Bonzini
2024-12-12 22:11 ` Sean Christopherson
2024-12-13 1:46 ` Binbin Wu
2024-12-13 1:52 ` Binbin Wu
2024-12-13 1:56 ` Binbin Wu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Z1s1yeWKnvmh718N@google.com \
--to=seanjc@google.com \
--cc=binbin.wu@linux.intel.com \
--cc=farrah.chen@intel.com \
--cc=isaku.yamahata@intel.com \
--cc=kvm@vger.kernel.org \
--cc=michael.roth@amd.com \
--cc=pbonzini@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=rick.p.edgecombe@intel.com \
--cc=xiaoyao.li@intel.com \
--cc=zhao1.liu@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox