KVM: arm/arm64: Disallow userspace control of in-kernel IRQ lines
authorChristoffer Dall <cdall@linaro.org>
Tue, 16 May 2017 10:41:18 +0000 (12:41 +0200)
committerChristoffer Dall <cdall@linaro.org>
Thu, 8 Jun 2017 15:58:40 +0000 (17:58 +0200)
When injecting an IRQ to the VGIC, you now have to present an owner
token for that IRQ line to show that you are the owner of that line.

IRQ lines driven from userspace or via an irqfd do not have an owner and
will simply pass a NULL pointer.

Also get rid of the unused kvm_vgic_inject_mapped_irq prototype.

Signed-off-by: Christoffer Dall <cdall@linaro.org>
Acked-by: Marc Zyngier <marc.zyngier@arm.com>
include/kvm/arm_vgic.h
virt/kvm/arm/arch_timer.c
virt/kvm/arm/arm.c
virt/kvm/arm/pmu.c
virt/kvm/arm/vgic/vgic-irqfd.c
virt/kvm/arm/vgic/vgic.c

index 5d5b34534ce93f4ee4708de900fca1b4255660af..131668f8599c7282de8f113cf8e0a61cffaedf23 100644 (file)
@@ -300,9 +300,7 @@ int kvm_vgic_hyp_init(void);
 void kvm_vgic_init_cpu_hardware(void);
 
 int kvm_vgic_inject_irq(struct kvm *kvm, int cpuid, unsigned int intid,
-                       bool level);
-int kvm_vgic_inject_mapped_irq(struct kvm *kvm, int cpuid, unsigned int intid,
-                              bool level);
+                       bool level, void *owner);
 int kvm_vgic_map_phys_irq(struct kvm_vcpu *vcpu, u32 virt_irq, u32 phys_irq);
 int kvm_vgic_unmap_phys_irq(struct kvm_vcpu *vcpu, unsigned int virt_irq);
 bool kvm_vgic_map_is_active(struct kvm_vcpu *vcpu, unsigned int virt_irq);
index 07f6f9bfc1f2e64ff2f82fc9072d74ad79741e19..8e89d63005c7f21565b84646478ae654cfcecaff 100644 (file)
@@ -226,7 +226,8 @@ static void kvm_timer_update_irq(struct kvm_vcpu *vcpu, bool new_level,
        if (likely(irqchip_in_kernel(vcpu->kvm))) {
                ret = kvm_vgic_inject_irq(vcpu->kvm, vcpu->vcpu_id,
                                          timer_ctx->irq.irq,
-                                         timer_ctx->irq.level);
+                                         timer_ctx->irq.level,
+                                         timer_ctx);
                WARN_ON(ret);
        }
 }
index 72816d3f23a7ce9a33d6d8432f4035c807061c55..a265acc53e39688e039b0bccaf6867ef183037b3 100644 (file)
@@ -832,7 +832,7 @@ int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level *irq_level,
                if (irq_num < VGIC_NR_SGIS || irq_num >= VGIC_NR_PRIVATE_IRQS)
                        return -EINVAL;
 
-               return kvm_vgic_inject_irq(kvm, vcpu->vcpu_id, irq_num, level);
+               return kvm_vgic_inject_irq(kvm, vcpu->vcpu_id, irq_num, level, NULL);
        case KVM_ARM_IRQ_TYPE_SPI:
                if (!irqchip_in_kernel(kvm))
                        return -ENXIO;
@@ -840,7 +840,7 @@ int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level *irq_level,
                if (irq_num < VGIC_NR_PRIVATE_IRQS)
                        return -EINVAL;
 
-               return kvm_vgic_inject_irq(kvm, 0, irq_num, level);
+               return kvm_vgic_inject_irq(kvm, 0, irq_num, level, NULL);
        }
 
        return -EINVAL;
index 3f0866925b6bb40ddc061954643cb42eaa22df1e..9923eb90cdc73e20385b051401ca8d33581f8f9a 100644 (file)
@@ -215,7 +215,8 @@ static void kvm_pmu_check_overflow(struct kvm_vcpu *vcpu)
 
        if (likely(irqchip_in_kernel(vcpu->kvm))) {
                int ret = kvm_vgic_inject_irq(vcpu->kvm, vcpu->vcpu_id,
-                                             pmu->irq_num, overflow);
+                                             pmu->irq_num, overflow,
+                                             &vcpu->arch.pmu);
                WARN_ON(ret);
        }
 }
index f138ed2e9c635b51e1f0094f6f5c3c7706b0a6fd..b7baf581611ae8730bb480d6e465607eb3cb3d2a 100644 (file)
@@ -34,7 +34,7 @@ static int vgic_irqfd_set_irq(struct kvm_kernel_irq_routing_entry *e,
 
        if (!vgic_valid_spi(kvm, spi_id))
                return -EINVAL;
-       return kvm_vgic_inject_irq(kvm, 0, spi_id, level);
+       return kvm_vgic_inject_irq(kvm, 0, spi_id, level, NULL);
 }
 
 /**
index 9628945234e46aac045c00fcd0b2531a106760c8..fed717e07938f35f6ba183d57550ab0913f70f26 100644 (file)
@@ -235,10 +235,14 @@ static void vgic_sort_ap_list(struct kvm_vcpu *vcpu)
 
 /*
  * Only valid injection if changing level for level-triggered IRQs or for a
- * rising edge.
+ * rising edge, and in-kernel connected IRQ lines can only be controlled by
+ * their owner.
  */
-static bool vgic_validate_injection(struct vgic_irq *irq, bool level)
+static bool vgic_validate_injection(struct vgic_irq *irq, bool level, void *owner)
 {
+       if (irq->owner != owner)
+               return false;
+
        switch (irq->config) {
        case VGIC_CONFIG_LEVEL:
                return irq->line_level != level;
@@ -350,13 +354,16 @@ retry:
  *                           false: to ignore the call
  *          Level-sensitive  true:  raise the input signal
  *                           false: lower the input signal
+ * @owner:   The opaque pointer to the owner of the IRQ being raised to verify
+ *           that the caller is allowed to inject this IRQ.  Userspace
+ *           injections will have owner == NULL.
  *
  * The VGIC is not concerned with devices being active-LOW or active-HIGH for
  * level-sensitive interrupts.  You can think of the level parameter as 1
  * being HIGH and 0 being LOW and all devices being active-HIGH.
  */
 int kvm_vgic_inject_irq(struct kvm *kvm, int cpuid, unsigned int intid,
-                       bool level)
+                       bool level, void *owner)
 {
        struct kvm_vcpu *vcpu;
        struct vgic_irq *irq;
@@ -378,7 +385,7 @@ int kvm_vgic_inject_irq(struct kvm *kvm, int cpuid, unsigned int intid,
 
        spin_lock(&irq->irq_lock);
 
-       if (!vgic_validate_injection(irq, level)) {
+       if (!vgic_validate_injection(irq, level, owner)) {
                /* Nothing to see here, move along... */
                spin_unlock(&irq->irq_lock);
                vgic_put_irq(kvm, irq);