* [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1
@ 2022-11-08 10:01 Vincent Donnefort
2022-11-28 16:21 ` Vincent Donnefort
0 siblings, 1 reply; 5+ messages in thread
From: Vincent Donnefort @ 2022-11-08 10:01 UTC (permalink / raw)
Cc: Marc Zyngier, stable, Vincent Donnefort
From: Marc Zyngier <maz@kernel.org>
The kernel has an awfully complicated boot sequence in order to cope
with the various EL2 configurations, including those that "enhanced"
the architecture. We go from EL2 to EL1, then back to EL2, staying
at EL2 if VHE capable and otherwise go back to EL1.
Here's a paracetamol tablet for you.
The cpu_resume path follows the same logic, because coming up with
two versions of a square wheel is hard.
However, things aren't this straightforward with pKVM, as the host
resume path is always proxied by the hypervisor, which means that
the kernel is always entered at EL1. Which contradicts what the
__boot_cpu_mode[] array contains (it obviously says EL2).
This thus triggers a HVC call from EL1 to EL2 in a vain attempt
to upgrade from EL1 to EL2 VHE, which we are, funnily enough,
reluctant to grant to the host kernel. This is also completely
unexpected, and puzzles your average EL2 hacker.
Address it by fixing up the boot mode at the point the host gets
deprivileged. is_hyp_mode_available() and co already have a static
branch to deal with this, making it pretty safe.
Cc: <stable@vger.kernel.org> # 5.15+
Reported-by: Vincent Donnefort <vdonnefort@google.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Tested-by: Vincent Donnefort <vdonnefort@google.com>
---
This patch doesn't have an upstream version. It's been fixed by the side
effect of another upstream patch. see conversation [1]
[1] https://lore.kernel.org/all/20221011165400.1241729-1-maz@kernel.org/
diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c
index 4cb265e15361..3fe816c244ce 100644
--- a/arch/arm64/kvm/arm.c
+++ b/arch/arm64/kvm/arm.c
@@ -2000,6 +2000,17 @@ static int pkvm_drop_host_privileges(void)
* once the host stage 2 is installed.
*/
static_branch_enable(&kvm_protected_mode_initialized);
+
+ /*
+ * Fixup the boot mode so that we don't take spurious round
+ * trips via EL2 on cpu_resume. Flush to the PoC for a good
+ * measure, so that it can be observed by a CPU coming out of
+ * suspend with the MMU off.
+ */
+ __boot_cpu_mode[0] = __boot_cpu_mode[1] = BOOT_CPU_MODE_EL1;
+ dcache_clean_poc((unsigned long)__boot_cpu_mode,
+ (unsigned long)(__boot_cpu_mode + 2));
+
on_each_cpu(_kvm_host_prot_finalize, &ret, 1);
return ret;
}
--
2.38.1.431.g37b22c650d-goog
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1
2022-11-08 10:01 [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1 Vincent Donnefort
@ 2022-11-28 16:21 ` Vincent Donnefort
2022-11-28 17:19 ` Greg KH
0 siblings, 1 reply; 5+ messages in thread
From: Vincent Donnefort @ 2022-11-28 16:21 UTC (permalink / raw)
To: Marc Zyngier, stable, gregkh; +Cc: kernel-team
On Tue, Nov 08, 2022 at 10:01:38AM +0000, Vincent Donnefort wrote:
> From: Marc Zyngier <maz@kernel.org>
>
> The kernel has an awfully complicated boot sequence in order to cope
> with the various EL2 configurations, including those that "enhanced"
> the architecture. We go from EL2 to EL1, then back to EL2, staying
> at EL2 if VHE capable and otherwise go back to EL1.
>
> Here's a paracetamol tablet for you.
>
> The cpu_resume path follows the same logic, because coming up with
> two versions of a square wheel is hard.
>
> However, things aren't this straightforward with pKVM, as the host
> resume path is always proxied by the hypervisor, which means that
> the kernel is always entered at EL1. Which contradicts what the
> __boot_cpu_mode[] array contains (it obviously says EL2).
>
> This thus triggers a HVC call from EL1 to EL2 in a vain attempt
> to upgrade from EL1 to EL2 VHE, which we are, funnily enough,
> reluctant to grant to the host kernel. This is also completely
> unexpected, and puzzles your average EL2 hacker.
>
> Address it by fixing up the boot mode at the point the host gets
> deprivileged. is_hyp_mode_available() and co already have a static
> branch to deal with this, making it pretty safe.
>
> Cc: <stable@vger.kernel.org> # 5.15+
> Reported-by: Vincent Donnefort <vdonnefort@google.com>
> Signed-off-by: Marc Zyngier <maz@kernel.org>
> Tested-by: Vincent Donnefort <vdonnefort@google.com>
>
> ---
>
> This patch doesn't have an upstream version. It's been fixed by the side
> effect of another upstream patch. see conversation [1]
>
> [1] https://lore.kernel.org/all/20221011165400.1241729-1-maz@kernel.org/
>
> diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c
> index 4cb265e15361..3fe816c244ce 100644
> --- a/arch/arm64/kvm/arm.c
> +++ b/arch/arm64/kvm/arm.c
> @@ -2000,6 +2000,17 @@ static int pkvm_drop_host_privileges(void)
> * once the host stage 2 is installed.
> */
> static_branch_enable(&kvm_protected_mode_initialized);
> +
> + /*
> + * Fixup the boot mode so that we don't take spurious round
> + * trips via EL2 on cpu_resume. Flush to the PoC for a good
> + * measure, so that it can be observed by a CPU coming out of
> + * suspend with the MMU off.
> + */
> + __boot_cpu_mode[0] = __boot_cpu_mode[1] = BOOT_CPU_MODE_EL1;
> + dcache_clean_poc((unsigned long)__boot_cpu_mode,
> + (unsigned long)(__boot_cpu_mode + 2));
> +
> on_each_cpu(_kvm_host_prot_finalize, &ret, 1);
> return ret;
> }
> --
> 2.38.1.431.g37b22c650d-goog
>
Hi Greg,
Any chance to pick this fix for 5.15?
Thanks!
--
Vincent.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1
2022-11-28 16:21 ` Vincent Donnefort
@ 2022-11-28 17:19 ` Greg KH
2022-11-28 17:24 ` Vincent Donnefort
0 siblings, 1 reply; 5+ messages in thread
From: Greg KH @ 2022-11-28 17:19 UTC (permalink / raw)
To: Vincent Donnefort; +Cc: Marc Zyngier, stable, kernel-team
On Mon, Nov 28, 2022 at 04:21:28PM +0000, Vincent Donnefort wrote:
> On Tue, Nov 08, 2022 at 10:01:38AM +0000, Vincent Donnefort wrote:
> > From: Marc Zyngier <maz@kernel.org>
> >
> > The kernel has an awfully complicated boot sequence in order to cope
> > with the various EL2 configurations, including those that "enhanced"
> > the architecture. We go from EL2 to EL1, then back to EL2, staying
> > at EL2 if VHE capable and otherwise go back to EL1.
> >
> > Here's a paracetamol tablet for you.
> >
> > The cpu_resume path follows the same logic, because coming up with
> > two versions of a square wheel is hard.
> >
> > However, things aren't this straightforward with pKVM, as the host
> > resume path is always proxied by the hypervisor, which means that
> > the kernel is always entered at EL1. Which contradicts what the
> > __boot_cpu_mode[] array contains (it obviously says EL2).
> >
> > This thus triggers a HVC call from EL1 to EL2 in a vain attempt
> > to upgrade from EL1 to EL2 VHE, which we are, funnily enough,
> > reluctant to grant to the host kernel. This is also completely
> > unexpected, and puzzles your average EL2 hacker.
> >
> > Address it by fixing up the boot mode at the point the host gets
> > deprivileged. is_hyp_mode_available() and co already have a static
> > branch to deal with this, making it pretty safe.
> >
> > Cc: <stable@vger.kernel.org> # 5.15+
> > Reported-by: Vincent Donnefort <vdonnefort@google.com>
> > Signed-off-by: Marc Zyngier <maz@kernel.org>
> > Tested-by: Vincent Donnefort <vdonnefort@google.com>
> >
> > ---
> >
> > This patch doesn't have an upstream version. It's been fixed by the side
> > effect of another upstream patch. see conversation [1]
> >
> > [1] https://lore.kernel.org/all/20221011165400.1241729-1-maz@kernel.org/
> >
> > diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c
> > index 4cb265e15361..3fe816c244ce 100644
> > --- a/arch/arm64/kvm/arm.c
> > +++ b/arch/arm64/kvm/arm.c
> > @@ -2000,6 +2000,17 @@ static int pkvm_drop_host_privileges(void)
> > * once the host stage 2 is installed.
> > */
> > static_branch_enable(&kvm_protected_mode_initialized);
> > +
> > + /*
> > + * Fixup the boot mode so that we don't take spurious round
> > + * trips via EL2 on cpu_resume. Flush to the PoC for a good
> > + * measure, so that it can be observed by a CPU coming out of
> > + * suspend with the MMU off.
> > + */
> > + __boot_cpu_mode[0] = __boot_cpu_mode[1] = BOOT_CPU_MODE_EL1;
> > + dcache_clean_poc((unsigned long)__boot_cpu_mode,
> > + (unsigned long)(__boot_cpu_mode + 2));
> > +
> > on_each_cpu(_kvm_host_prot_finalize, &ret, 1);
> > return ret;
> > }
> > --
> > 2.38.1.431.g37b22c650d-goog
> >
>
> Hi Greg,
>
> Any chance to pick this fix for 5.15?
<formletter>
This is not the correct way to submit patches for inclusion in the
stable kernel tree. Please read:
https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html
for how to do this properly.
</formletter>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1
2022-11-28 17:19 ` Greg KH
@ 2022-11-28 17:24 ` Vincent Donnefort
2022-11-28 18:01 ` Greg KH
0 siblings, 1 reply; 5+ messages in thread
From: Vincent Donnefort @ 2022-11-28 17:24 UTC (permalink / raw)
To: Greg KH; +Cc: Marc Zyngier, stable, kernel-team
On Mon, Nov 28, 2022 at 06:19:15PM +0100, Greg KH wrote:
> On Mon, Nov 28, 2022 at 04:21:28PM +0000, Vincent Donnefort wrote:
> > On Tue, Nov 08, 2022 at 10:01:38AM +0000, Vincent Donnefort wrote:
> > > From: Marc Zyngier <maz@kernel.org>
> > >
> > > The kernel has an awfully complicated boot sequence in order to cope
> > > with the various EL2 configurations, including those that "enhanced"
> > > the architecture. We go from EL2 to EL1, then back to EL2, staying
> > > at EL2 if VHE capable and otherwise go back to EL1.
> > >
> > > Here's a paracetamol tablet for you.
> > >
> > > The cpu_resume path follows the same logic, because coming up with
> > > two versions of a square wheel is hard.
> > >
> > > However, things aren't this straightforward with pKVM, as the host
> > > resume path is always proxied by the hypervisor, which means that
> > > the kernel is always entered at EL1. Which contradicts what the
> > > __boot_cpu_mode[] array contains (it obviously says EL2).
> > >
> > > This thus triggers a HVC call from EL1 to EL2 in a vain attempt
> > > to upgrade from EL1 to EL2 VHE, which we are, funnily enough,
> > > reluctant to grant to the host kernel. This is also completely
> > > unexpected, and puzzles your average EL2 hacker.
> > >
> > > Address it by fixing up the boot mode at the point the host gets
> > > deprivileged. is_hyp_mode_available() and co already have a static
> > > branch to deal with this, making it pretty safe.
> > >
> > > Cc: <stable@vger.kernel.org> # 5.15+
> > > Reported-by: Vincent Donnefort <vdonnefort@google.com>
> > > Signed-off-by: Marc Zyngier <maz@kernel.org>
> > > Tested-by: Vincent Donnefort <vdonnefort@google.com>
> > >
> > > ---
> > >
> > > This patch doesn't have an upstream version. It's been fixed by the side
> > > effect of another upstream patch. see conversation [1]
> > >
> > > [1] https://lore.kernel.org/all/20221011165400.1241729-1-maz@kernel.org/
> > >
> > > diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c
> > > index 4cb265e15361..3fe816c244ce 100644
> > > --- a/arch/arm64/kvm/arm.c
> > > +++ b/arch/arm64/kvm/arm.c
> > > @@ -2000,6 +2000,17 @@ static int pkvm_drop_host_privileges(void)
> > > * once the host stage 2 is installed.
> > > */
> > > static_branch_enable(&kvm_protected_mode_initialized);
> > > +
> > > + /*
> > > + * Fixup the boot mode so that we don't take spurious round
> > > + * trips via EL2 on cpu_resume. Flush to the PoC for a good
> > > + * measure, so that it can be observed by a CPU coming out of
> > > + * suspend with the MMU off.
> > > + */
> > > + __boot_cpu_mode[0] = __boot_cpu_mode[1] = BOOT_CPU_MODE_EL1;
> > > + dcache_clean_poc((unsigned long)__boot_cpu_mode,
> > > + (unsigned long)(__boot_cpu_mode + 2));
> > > +
> > > on_each_cpu(_kvm_host_prot_finalize, &ret, 1);
> > > return ret;
> > > }
> > > --
> > > 2.38.1.431.g37b22c650d-goog
> > >
> >
> > Hi Greg,
> >
> > Any chance to pick this fix for 5.15?
>
> <formletter>
>
> This is not the correct way to submit patches for inclusion in the
> stable kernel tree. Please read:
> https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html
> for how to do this properly.
>
> </formletter>
Sadly this patch doesn't have an upstream version equivalent. The reason is it's
been fixed as a side effect of another feature introduction, hence the
stable-only fix made by Marc. [1]
Not sure how to handle that case.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1
2022-11-28 17:24 ` Vincent Donnefort
@ 2022-11-28 18:01 ` Greg KH
0 siblings, 0 replies; 5+ messages in thread
From: Greg KH @ 2022-11-28 18:01 UTC (permalink / raw)
To: Vincent Donnefort; +Cc: Marc Zyngier, stable, kernel-team
On Mon, Nov 28, 2022 at 05:24:42PM +0000, Vincent Donnefort wrote:
> On Mon, Nov 28, 2022 at 06:19:15PM +0100, Greg KH wrote:
> > On Mon, Nov 28, 2022 at 04:21:28PM +0000, Vincent Donnefort wrote:
> > > On Tue, Nov 08, 2022 at 10:01:38AM +0000, Vincent Donnefort wrote:
> > > > From: Marc Zyngier <maz@kernel.org>
> > > >
> > > > The kernel has an awfully complicated boot sequence in order to cope
> > > > with the various EL2 configurations, including those that "enhanced"
> > > > the architecture. We go from EL2 to EL1, then back to EL2, staying
> > > > at EL2 if VHE capable and otherwise go back to EL1.
> > > >
> > > > Here's a paracetamol tablet for you.
> > > >
> > > > The cpu_resume path follows the same logic, because coming up with
> > > > two versions of a square wheel is hard.
> > > >
> > > > However, things aren't this straightforward with pKVM, as the host
> > > > resume path is always proxied by the hypervisor, which means that
> > > > the kernel is always entered at EL1. Which contradicts what the
> > > > __boot_cpu_mode[] array contains (it obviously says EL2).
> > > >
> > > > This thus triggers a HVC call from EL1 to EL2 in a vain attempt
> > > > to upgrade from EL1 to EL2 VHE, which we are, funnily enough,
> > > > reluctant to grant to the host kernel. This is also completely
> > > > unexpected, and puzzles your average EL2 hacker.
> > > >
> > > > Address it by fixing up the boot mode at the point the host gets
> > > > deprivileged. is_hyp_mode_available() and co already have a static
> > > > branch to deal with this, making it pretty safe.
> > > >
> > > > Cc: <stable@vger.kernel.org> # 5.15+
> > > > Reported-by: Vincent Donnefort <vdonnefort@google.com>
> > > > Signed-off-by: Marc Zyngier <maz@kernel.org>
> > > > Tested-by: Vincent Donnefort <vdonnefort@google.com>
> > > >
> > > > ---
> > > >
> > > > This patch doesn't have an upstream version. It's been fixed by the side
> > > > effect of another upstream patch. see conversation [1]
> > > >
> > > > [1] https://lore.kernel.org/all/20221011165400.1241729-1-maz@kernel.org/
> > > >
> > > > diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c
> > > > index 4cb265e15361..3fe816c244ce 100644
> > > > --- a/arch/arm64/kvm/arm.c
> > > > +++ b/arch/arm64/kvm/arm.c
> > > > @@ -2000,6 +2000,17 @@ static int pkvm_drop_host_privileges(void)
> > > > * once the host stage 2 is installed.
> > > > */
> > > > static_branch_enable(&kvm_protected_mode_initialized);
> > > > +
> > > > + /*
> > > > + * Fixup the boot mode so that we don't take spurious round
> > > > + * trips via EL2 on cpu_resume. Flush to the PoC for a good
> > > > + * measure, so that it can be observed by a CPU coming out of
> > > > + * suspend with the MMU off.
> > > > + */
> > > > + __boot_cpu_mode[0] = __boot_cpu_mode[1] = BOOT_CPU_MODE_EL1;
> > > > + dcache_clean_poc((unsigned long)__boot_cpu_mode,
> > > > + (unsigned long)(__boot_cpu_mode + 2));
> > > > +
> > > > on_each_cpu(_kvm_host_prot_finalize, &ret, 1);
> > > > return ret;
> > > > }
> > > > --
> > > > 2.38.1.431.g37b22c650d-goog
> > > >
> > >
> > > Hi Greg,
> > >
> > > Any chance to pick this fix for 5.15?
> >
> > <formletter>
> >
> > This is not the correct way to submit patches for inclusion in the
> > stable kernel tree. Please read:
> > https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html
> > for how to do this properly.
> >
> > </formletter>
>
> Sadly this patch doesn't have an upstream version equivalent. The reason is it's
> been fixed as a side effect of another feature introduction, hence the
> stable-only fix made by Marc. [1]
>
> Not sure how to handle that case.
It needs to really really really document why this is not relevant for
newer kernels and what commit fixed this instead and why this is all
happening in the changelog text, AND give us a clue in maybe the subject
line [PATCH 5.15] to show that this is only for a specific tree.
it was not obvious here at all, sorry, I missed the --- comments in the
normal flood of other patches.
thanks,
gre gk-h
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2022-11-28 18:18 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-11-08 10:01 [PATCH] KVM: arm64: pkvm: Fixup boot mode to reflect that the kernel resumes from EL1 Vincent Donnefort
2022-11-28 16:21 ` Vincent Donnefort
2022-11-28 17:19 ` Greg KH
2022-11-28 17:24 ` Vincent Donnefort
2022-11-28 18:01 ` Greg KH
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).