aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRadim Krčmář <rkrcmar@redhat.com>2015-10-08 14:23:34 -0400
committerPaolo Bonzini <pbonzini@redhat.com>2015-10-14 10:41:08 -0400
commitdb2bdcbbbd32e5500b822d5e74ef8b5bd777e687 (patch)
treeddcb2bf5b396e9e24f5926f380f85455dc630ad5
parentc77f3fab441c3e466b4c3601a475fc31ce156b06 (diff)
KVM: x86: fix edge EOI and IOAPIC reconfig race
KVM uses eoi_exit_bitmap to track vectors that need an action on EOI. The problem is that IOAPIC can be reconfigured while an interrupt with old configuration is pending and eoi_exit_bitmap only remembers the newest configuration; thus EOI from the pending interrupt is not recognized. (Reconfiguration is not a problem for level interrupts, because IOAPIC sends interrupt with the new configuration.) For an edge interrupt with ACK notifiers, like i8254 timer; things can happen in this order 1) IOAPIC inject a vector from i8254 2) guest reconfigures that vector's VCPU and therefore eoi_exit_bitmap on original VCPU gets cleared 3) guest's handler for the vector does EOI 4) KVM's EOI handler doesn't pass that vector to IOAPIC because it is not in that VCPU's eoi_exit_bitmap 5) i8254 stops working A simple solution is to set the IOAPIC vector in eoi_exit_bitmap if the vector is in PIR/IRR/ISR. This creates an unwanted situation if the vector is reused by a non-IOAPIC source, but I think it is so rare that we don't want to make the solution more sophisticated. The simple solution also doesn't work if we are reconfiguring the vector. (Shouldn't happen in the wild and I'd rather fix users of ACK notifiers instead of working around that.) The are no races because ioapic injection and reconfig are locked. Fixes: b053b2aef25d ("KVM: x86: Add EOI exit bitmap inference") [Before b053b2aef25d, this bug happened only with APICv.] Fixes: c7c9c56ca26f ("x86, apicv: add virtual interrupt delivery support") Cc: <stable@vger.kernel.org> Signed-off-by: Radim Krčmář <rkrcmar@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
-rw-r--r--arch/x86/kvm/ioapic.c4
-rw-r--r--arch/x86/kvm/x86.c4
2 files changed, 6 insertions, 2 deletions
diff --git a/arch/x86/kvm/ioapic.c b/arch/x86/kvm/ioapic.c
index 2dcda0f188ba..88d0a92d3f94 100644
--- a/arch/x86/kvm/ioapic.c
+++ b/arch/x86/kvm/ioapic.c
@@ -246,7 +246,9 @@ void kvm_ioapic_scan_entry(struct kvm_vcpu *vcpu, u64 *eoi_exit_bitmap)
246 kvm_irq_has_notifier(ioapic->kvm, KVM_IRQCHIP_IOAPIC, index) || 246 kvm_irq_has_notifier(ioapic->kvm, KVM_IRQCHIP_IOAPIC, index) ||
247 index == RTC_GSI) { 247 index == RTC_GSI) {
248 if (kvm_apic_match_dest(vcpu, NULL, 0, 248 if (kvm_apic_match_dest(vcpu, NULL, 0,
249 e->fields.dest_id, e->fields.dest_mode)) 249 e->fields.dest_id, e->fields.dest_mode) ||
250 (e->fields.trig_mode == IOAPIC_EDGE_TRIG &&
251 kvm_apic_pending_eoi(vcpu, e->fields.vector)))
250 __set_bit(e->fields.vector, 252 __set_bit(e->fields.vector,
251 (unsigned long *)eoi_exit_bitmap); 253 (unsigned long *)eoi_exit_bitmap);
252 } 254 }
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index e28954d2698a..e33aebbf189e 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -6201,8 +6201,10 @@ static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu)
6201 6201
6202 if (irqchip_split(vcpu->kvm)) 6202 if (irqchip_split(vcpu->kvm))
6203 kvm_scan_ioapic_routes(vcpu, vcpu->arch.eoi_exit_bitmap); 6203 kvm_scan_ioapic_routes(vcpu, vcpu->arch.eoi_exit_bitmap);
6204 else 6204 else {
6205 kvm_x86_ops->sync_pir_to_irr(vcpu);
6205 kvm_ioapic_scan_entry(vcpu, vcpu->arch.eoi_exit_bitmap); 6206 kvm_ioapic_scan_entry(vcpu, vcpu->arch.eoi_exit_bitmap);
6207 }
6206 kvm_x86_ops->load_eoi_exitmap(vcpu); 6208 kvm_x86_ops->load_eoi_exitmap(vcpu);
6207} 6209}
6208 6210