Re: KVM: x86: fix kvmclock write race

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 17, 2015 at 4:38 PM, Marcelo Tosatti <mtosatti@xxxxxxxxxx> wrote:
>
> From: Radim Krčmář <rkrcmar@xxxxxxxxxx>
>
> As noted by Andy Lutomirski, kvm does not follow the documented version
> protocol. Fix it.
>
> Note: this bug results in a race which can occur if the following three
> conditions are met:
>
> 1) There is KVM guest time update (there is one every 5 minutes).
>
> 2) Which races with a thread in the guest in the following way:
> The execution of these 29 instructions has to take at _least_
> 2 seconds (rebalance interval is 1 second).
>
> lsl    %r9w,%esi
> mov    %esi,%r8d
> and    $0x3f,%esi
> and    $0xfff,%r8d
> test   $0xfc0,%r8d
> jne    0xa12 <vread_pvclock+210>
> shl    $0x6,%rsi
> mov    -0xa01000(%rsi),%r10d
> data32 xchg %ax,%ax
> data32 xchg %ax,%ax
> rdtsc
> shl    $0x20,%rdx
> mov    %eax,%eax
> movsbl -0xa00fe4(%rsi),%ecx
> or     %rax,%rdx
> sub    -0xa00ff8(%rsi),%rdx
> mov    -0xa00fe8(%rsi),%r11d
> mov    %rdx,%rax
> shl    %cl,%rax
> test   %ecx,%ecx
> js     0xa08 <vread_pvclock+200>
> mov    %r11d,%edx
> movzbl -0xa00fe3(%rsi),%ecx
> mov    -0xa00ff0(%rsi),%r11
> mul    %rdx
> shrd   $0x20,%rdx,%rax
> data32 xchg %ax,%ax
> data32 xchg %ax,%ax
> lsl    %r9w,%edx
>
> 3) Scheduler moves the task, while executing these 29 instructions, to a
> destination processor, then back to the source processor.
>
> 4) Source processor, after has been moved back from destination,
> perceives data out of order as written by processor performing guest
> time update (item 1), with string mov.
>
> Given the rarity of this condition, and the fact it was never observed
> or reported, reverting pvclock vsyscall on systems whose host is
> susceptible to the race, seems unnecessary.
>
> Signed-off-by: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
>
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index cc2c759f69a3..8658599e0024 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -1658,12 +1658,24 @@ static int kvm_guest_time_update(struct kvm_vcpu *v)
>                 &guest_hv_clock, sizeof(guest_hv_clock))))
>                 return 0;
>
> -       /*
> -        * The interface expects us to write an even number signaling that the
> -        * update is finished. Since the guest won't see the intermediate
> -        * state, we just increase by 2 at the end.
> +       /* A guest can read other VCPU's kvmclock; specification says that
> +        * version is odd if data is being modified and even after it is
> +        * consistent.
> +        * We write three times to be sure.
> +        *  1) update version to odd number
> +        *  2) write modified data (version is still odd)
> +        *  3) update version to even number
> +        *
> +        * TODO: optimize
> +        *  - only two writes should be enough -- version is first
> +        *  - the second write could update just version

You're relying on lots of barely-defined behavior here, since I think
that both copies could use fast string operations.  Those are
explicitly unordered internally, so I think you really do need three
writes.

Personally, if I wanted to optimize this (I'm not convinced it
matters), I'd add a write-a-single-word primitive and use that for the
version.

Anyway, I think this code looks okay as is.

--Andy
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux