Re: [PATCH v2] kvm: x86: fix stale mmio cache bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/05/2014 05:10 AM, David Matlack wrote:
> The following events can lead to an incorrect KVM_EXIT_MMIO bubbling
> up to userspace:
> 
> (1) Guest accesses gpa X without a memory slot. The gfn is cached in
> struct kvm_vcpu_arch (mmio_gfn). On Intel EPT-enabled hosts, KVM sets
> the SPTE write-execute-noread so that future accesses cause
> EPT_MISCONFIGs.
> 
> (2) Host userspace creates a memory slot via KVM_SET_USER_MEMORY_REGION
> covering the page just accessed.
> 
> (3) Guest attempts to read or write to gpa X again. On Intel, this
> generates an EPT_MISCONFIG. The memory slot generation number that
> was incremented in (2) would normally take care of this but we fast
> path mmio faults through quickly_check_mmio_pf(), which only checks
> the per-vcpu mmio cache. Since we hit the cache, KVM passes a
> KVM_EXIT_MMIO up to userspace.
> 
> This patch fixes the issue by doing the following:
>   - Tag the mmio cache with the memslot generation and use it to
>     validate mmio cache lookups.
>   - Extend vcpu_clear_mmio_info to clear mmio_gfn in addition to
>     mmio_gva, since both can be used to fast path mmio faults.
>   - In mmu_sync_roots, unconditionally clear the mmio cache since
>     even direct_map (e.g. tdp) hosts use it.

It's not needed.

direct map only uses gpa (and never cache gva) and
vcpu_clear_mmio_info only clears gva.

> +static inline void vcpu_cache_mmio_info(struct kvm_vcpu *vcpu,
> +					gva_t gva, gfn_t gfn, unsigned access)
> +{
> +	vcpu->arch.mmio_gen = kvm_current_mmio_generation(vcpu->kvm);
> +
> +	/*
> +	 * Ensure that the mmio_gen is set before the rest of the cache entry.
> +	 * Otherwise we might see a new generation number attached to an old
> +	 * cache entry if creating/deleting a memslot races with mmio caching.
> +	 * The inverse case is possible (old generation number with new cache
> +	 * info), but that is safe. The next access will just miss the cache
> +	 * when it should have hit.
> +	 */
> +	smp_wmb();

The memory barrier can't help us, consider this scenario:

CPU 0                                      CPU 1
page-fault
see gpa is not mapped in memslot

                              create new memslot containing gpa from Qemu
                                  update the slots's generation number
cache mmio info

!!! later when vcpu accesses gpa again
it will cause mmio-exit.

The easy way to fix this is that we update slots's generation-number
after synchronize_srcu_expedited when memslot is being updated that
ensures other sides can see the new generation-number only after
finishing update.


--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux