All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] KVM: arm/arm64: BUG: Fix losing level-sensitive interrupts
@ 2015-08-26  6:46 Pavel Fedin
  2015-08-26  8:27 ` Marc Zyngier
  2015-08-26 14:02 ` Christoffer Dall
  0 siblings, 2 replies; 9+ messages in thread
From: Pavel Fedin @ 2015-08-26  6:46 UTC (permalink / raw)
  To: kvmarm, kvm; +Cc: Marc Zyngier, Christoffer Dall, Alex Bennée

Commit 71760950bf3dc796e5e53ea3300dec724a09f593
("arm/arm64: KVM: add a common vgic_queue_irq_to_lr fn") introduced
vgic_queue_irq_to_lr() function which checks vgic_dist_irq_is_pending()
before setting LR_STATE_PENDING bit. However, in some cases, the following
race condition is possible:
1. Userland injects an IRQ with level == 1, this ends up in
   vgic_update_irq_pending(), which in turn calls
   vgic_dist_irq_set_pending() for this IRQ.
2. vCPU gets kicked. But kernel does not manage to reschedule it quickly
   (!!!)
3. Userland quickly resets the IRQ to level == 0. vgic_update_irq_pending()
   in this case will call vgic_dist_irq_clear_pending() and reset the
   pending flag.
4. vCPU finally wakes up. It successfully rolls through through
   __kvm_vgic_flush_hwstate(), which populates vGIC registers. Before the
   aforementioned commit LR_STATE_PENDING bit was set unconditionally, and
   nothing bad happened. However, now vgic_queue_irq_to_lr() does not set
   any state bits on this LR at all, because vgic_dist_irq_is_pending()
   returns zero (it was reset in step 3). Since this is level-sensitive
   IRQ, we end up in LR containing only LR_EOI_INT bit. The guest will not
   get this interrupt.

This patch fixes the problem by bringing back unconditional setting of
LR_STATE_PENDING bit.

The bug was caught on Cavium ThunderX machine, kernel v4.1.6, running
qemu "virt" guest, where it affected pl011 driver.

Signed-off-by: Pavel Fedin <p.fedin@samsung.com>
---
 virt/kvm/arm/vgic.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/virt/kvm/arm/vgic.c b/virt/kvm/arm/vgic.c
index fdcad86..90d1671 100644
--- a/virt/kvm/arm/vgic.c
+++ b/virt/kvm/arm/vgic.c
@@ -1111,7 +1111,7 @@ static void vgic_queue_irq_to_lr(struct kvm_vcpu *vcpu, int irq,
 		kvm_debug("Set active, clear distributor: 0x%x\n", vlr.state);
 		vgic_irq_clear_active(vcpu, irq);
 		vgic_update_state(vcpu->kvm);
-	} else if (vgic_dist_irq_is_pending(vcpu, irq)) {
+	} else {
 		vlr.state |= LR_STATE_PENDING;
 		kvm_debug("Set pending: 0x%x\n", vlr.state);
 	}
-- 
2.4.4


^ permalink raw reply related	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2015-08-26 14:26 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-08-26  6:46 [PATCH] KVM: arm/arm64: BUG: Fix losing level-sensitive interrupts Pavel Fedin
2015-08-26  8:27 ` Marc Zyngier
2015-08-26 10:58   ` Pavel Fedin
2015-08-26 11:13     ` Marc Zyngier
2015-08-26 11:33       ` Pavel Fedin
2015-08-26 13:11       ` Pavel Fedin
2015-08-26 14:03   ` Christoffer Dall
2015-08-26 14:02 ` Christoffer Dall
2015-08-26 14:26   ` Pavel Fedin

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.