KVM: x86: race between KVM_SET_GSI_ROUTING and KVM_CREATE_IRQCHIP
authorDavid Hildenbrand <david@redhat.com>
Fri, 7 Apr 2017 08:50:18 +0000 (10:50 +0200)
committerRadim Krčmář <rkrcmar@redhat.com>
Wed, 12 Apr 2017 18:17:13 +0000 (20:17 +0200)
Avoid races between KVM_SET_GSI_ROUTING and KVM_CREATE_IRQCHIP by taking
the kvm->lock when setting up routes.

If KVM_CREATE_IRQCHIP fails, KVM_SET_GSI_ROUTING could have already set
up routes pointing at pic/ioapic, being silently removed already.

Also, as a side effect, this patch makes sure that KVM_SET_GSI_ROUTING
and KVM_CAP_SPLIT_IRQCHIP cannot run in parallel.

Signed-off-by: David Hildenbrand <david@redhat.com>
Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
virt/kvm/kvm_main.c

index f489167839c48b49aad6982bc3bee4dc858f56c2..357e67cba32eeddab73323356dbdc79d5736ae24 100644 (file)
@@ -3069,8 +3069,11 @@ static long kvm_vm_ioctl(struct file *filp,
                                           routing.nr * sizeof(*entries)))
                                goto out_free_irq_routing;
                }
+               /* avoid races with KVM_CREATE_IRQCHIP on x86 */
+               mutex_lock(&kvm->lock);
                r = kvm_set_irq_routing(kvm, entries, routing.nr,
                                        routing.flags);
+               mutex_unlock(&kvm->lock);
 out_free_irq_routing:
                vfree(entries);
                break;