On Thu, May 01, 2025, Peter Zijlstra wrote: > On Thu, May 01, 2025 at 12:30:38PM +0200, Peter Zijlstra wrote: > > On Wed, Apr 30, 2025 at 09:06:00PM +0200, Peter Zijlstra wrote: > > > On Wed, Apr 30, 2025 at 07:24:15AM -0700, H. Peter Anvin wrote: > > > > > > > >KVM has another; the VMX interrupt injection stuff calls the IDT > > > > >handler > > > > >directly. Is there an alternative? Can we keep a table of Linux > > > > >functions > > > > >slighly higher up the call stack (asm_\cfunc ?) and add CFI to those? > > > > > > > We do have a table of handlers higher up in the stack in the form of > > > > the dispatch tables for FRED. They don't in general even need the > > > > assembly entry stubs, either. > > > > > > Oh, right. I'll go have a look at those. > > > > Right, so perhaps the easiest way around this is to setup the FRED entry > > tables unconditionally, have VMX mandate CONFIG_FRED and then have it > > always use the FRED entry points. > > > > Let me see how ugly that gets. > > Something like so... except this is broken. Its reporting spurious > interrupts on vector 0x00, so something is buggered passing that vector > along.
Uh, aren't you making this way more complex than it needs to be? IIUC, KVM never uses the FRED hardware entry points, i.e. the FRED entry tables don't need to be in place because they'll never be used. The only bits of code KVM needs is the __fred_entry_from_kvm() glue. Lightly tested, but this combo works for IRQs and NMIs on non-FRED hardware. -- >From 664468143109ab7c525c0babeba62195fa4c657e Mon Sep 17 00:00:00 2001 From: Sean Christopherson <sea...@google.com> Date: Thu, 1 May 2025 11:20:29 -0700 Subject: [PATCH 1/2] x86/fred: Play nice with invoking asm_fred_entry_from_kvm() on non-FRED hardware Modify asm_fred_entry_from_kvm() to allow it to be invoked by KVM even when FRED isn't fully enabled, e.g. when running with CONFIG_X86_FRED=y on non-FRED hardware. This will allow forcing KVM to always use the FRED entry points for 64-bit kernels, which in turn will eliminate a rather gross non-CFI indirect call that KVM uses to trampoline IRQs by doing IDT lookups. When FRED isn't enabled, simply skip ERETS and restore RBP and RSP from the stack frame prior to doing a "regular" RET back to KVM (in quotes because of all the RET mitigation horrors). Signed-off-by: Sean Christopherson <sea...@google.com> --- arch/x86/entry/entry_64_fred.S | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/x86/entry/entry_64_fred.S b/arch/x86/entry/entry_64_fred.S index 29c5c32c16c3..7aff2f0a285f 100644 --- a/arch/x86/entry/entry_64_fred.S +++ b/arch/x86/entry/entry_64_fred.S @@ -116,7 +116,8 @@ SYM_FUNC_START(asm_fred_entry_from_kvm) movq %rsp, %rdi /* %rdi -> pt_regs */ call __fred_entry_from_kvm /* Call the C entry point */ POP_REGS - ERETS + + ALTERNATIVE "", __stringify(ERETS), X86_FEATURE_FRED 1: /* * Objtool doesn't understand what ERETS does, this hint tells it that @@ -124,7 +125,7 @@ SYM_FUNC_START(asm_fred_entry_from_kvm) * isn't strictly needed, but it's the simplest form. */ UNWIND_HINT_RESTORE - pop %rbp + leave RET SYM_FUNC_END(asm_fred_entry_from_kvm) base-commit: 45eb29140e68ffe8e93a5471006858a018480a45 -- 2.49.0.906.g1f30a19c02-goog >From c50fb5a8a46058bbcfdcac0a100c2aa0f7f68f1c Mon Sep 17 00:00:00 2001 From: Sean Christopherson <sea...@google.com> Date: Thu, 1 May 2025 11:10:39 -0700 Subject: [PATCH 2/2] x86/fred: KVM: VMX: Always use FRED for IRQ+NMI when CONFIG_X86_FRED=y Now that FRED provides C-code entry points for handling IRQ and NMI exits, use the FRED infrastructure for forwarding all such events even if FRED isn't supported in hardware. Avoiding the non-FRED assembly trampolines into the IDT handlers for IRQs eliminates the associated non-CFI indirect call (KVM performs a CALL by doing a lookup on the IDT using the IRQ vector). Force FRED for 64-bit kernels if KVM_INTEL is enabled, as the benefits of eliminating the IRQ trampoline usage far outwieghts the code overhead for FRED. Suggested-by: Peter Zijlstra <pet...@infradead.org> Signed-off-by: Sean Christopherson <sea...@google.com> --- arch/x86/kvm/Kconfig | 1 + arch/x86/kvm/vmx/vmx.c | 4 ++-- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig index 2eeffcec5382..712a2ff28ce4 100644 --- a/arch/x86/kvm/Kconfig +++ b/arch/x86/kvm/Kconfig @@ -95,6 +95,7 @@ config KVM_SW_PROTECTED_VM config KVM_INTEL tristate "KVM for Intel (and compatible) processors support" depends on KVM && IA32_FEAT_CTL + select X86_FRED if X86_64 select KVM_GENERIC_PRIVATE_MEM if INTEL_TDX_HOST select KVM_GENERIC_MEMORY_ATTRIBUTES if INTEL_TDX_HOST help diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index ef2d7208dd20..2ea89985107d 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -6995,7 +6995,7 @@ static void handle_external_interrupt_irqoff(struct kvm_vcpu *vcpu, return; kvm_before_interrupt(vcpu, KVM_HANDLING_IRQ); - if (cpu_feature_enabled(X86_FEATURE_FRED)) + if (IS_ENABLED(CONFIG_X86_FRED)) fred_entry_from_kvm(EVENT_TYPE_EXTINT, vector); else vmx_do_interrupt_irqoff(gate_offset((gate_desc *)host_idt_base + vector)); @@ -7268,7 +7268,7 @@ noinstr void vmx_handle_nmi(struct kvm_vcpu *vcpu) return; kvm_before_interrupt(vcpu, KVM_HANDLING_NMI); - if (cpu_feature_enabled(X86_FEATURE_FRED)) + if (IS_ENABLED(CONFIG_X86_FRED)) fred_entry_from_kvm(EVENT_TYPE_NMI, NMI_VECTOR); else vmx_do_nmi_irqoff(); -- 2.49.0.906.g1f30a19c02-goog