Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp597785pxj; Tue, 18 May 2021 09:58:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwhUc+JYFw4VbsD2AUy0ioWIL0QB3vJX0vNODlOv/+anvFPpD5aBfVViGS+O8DLDRA/mDuq X-Received: by 2002:a17:906:3c56:: with SMTP id i22mr6978611ejg.147.1621357091258; Tue, 18 May 2021 09:58:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621357091; cv=none; d=google.com; s=arc-20160816; b=MohFc6rwxu7jLjIFip5fhxBEfRoijr+btQv0wWTnVqEg2zRPeGxXrrFc8zfgAoOEFY Z0KV1nJUi2q4X0eEg8VBUDlXCeaSw11Cnb2DdBIqJi+S+3jI4fM55YuwberzU6v5XWsR L8G9FqG4Nu3TiYcGmDubgVGZtRvQMbSPjmeMz30N4rKPCpxfpnOSPEYx7U8KOH/UlZHE uRhQVM/eZriqvKFQrqn9L04veBcFFdB776CMbXg9Pr5fiaQNepAzYeBIBImt9kneZ1rR MGMDPt4twuHdu752cDt57s7kfleE5UXRFQ+s2G+Z3aLTBMp+FT5e4jXjme1+LIvsN6/5 pRYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=H70ek6zfuvvu+nhDsfF0YfL0u/YN7/gphwU9MrakYGo=; b=pVIDfvY+iy/nqIfvjSBt3yPvCMj3mS4Gw5CMeK5kcJEGG2tSWNxVoHCOdIHxgt2hEx j3nV4/4IVzZRfhFLnsBDsPVEkqu7uuXvZpAldUEnxfAgqigWhx/EAk6D/jww+3ucxP22 YM5Oa1+PPuuG2uCy2PxL8R+vi56meJH1cR0e4mR9t0tN84B37MrBMN7Ebc/bAGG92mPg 2BIeRoAEfV2KVWZwKoGIt84WcspMVY1lCNLCStWqdDx4/PGRdSGnyUcIpZWD4wo55D/k 6Kv/O07WrqQMLyA25NjnxWm71Qgo9inRXllmd06I+n79vGTapqZrNxHaf9gUqWi1Ea6/ AQyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=maZuwdIF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g12si18768318edn.564.2021.05.18.09.57.12; Tue, 18 May 2021 09:58:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=maZuwdIF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344181AbhEQQDl (ORCPT + 99 others); Mon, 17 May 2021 12:03:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:55918 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344231AbhEQPng (ORCPT ); Mon, 17 May 2021 11:43:36 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 783DC61D17; Mon, 17 May 2021 14:42:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621262566; bh=rrXgdlquzhVxhlBSvfvyvLtfvJpDldGl34VLfs9Aez8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=maZuwdIFtdUEAcgbvUcKRnyiGvlwujbXr7dCtMNeUCMLLRXTHl8Wpn7w/SreKGTkT kyNobP/6+zEZvrxbu4jx8A07KXOUcpyOeQr4I5lbwlk35pEjRpD2ZUmRcMGa9HT718 tXxoaoG8k9HJwnqn/dC/DNZ55urWe9afiZ0QDS8A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+6beae4000559d41d80f8@syzkaller.appspotmail.com, Thomas Gleixner , Paolo Bonzini , Sasha Levin Subject: [PATCH 5.10 215/289] KVM: x86: Prevent deadlock against tk_core.seq Date: Mon, 17 May 2021 16:02:20 +0200 Message-Id: <20210517140312.366086775@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210517140305.140529752@linuxfoundation.org> References: <20210517140305.140529752@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Gleixner [ Upstream commit 3f804f6d201ca93adf4c3df04d1bfd152c1129d6 ] syzbot reported a possible deadlock in pvclock_gtod_notify(): CPU 0 CPU 1 write_seqcount_begin(&tk_core.seq); pvclock_gtod_notify() spin_lock(&pool->lock); queue_work(..., &pvclock_gtod_work) ktime_get() spin_lock(&pool->lock); do { seq = read_seqcount_begin(tk_core.seq) ... } while (read_seqcount_retry(&tk_core.seq, seq); While this is unlikely to happen, it's possible. Delegate queue_work() to irq_work() which postpones it until the tk_core.seq write held region is left and interrupts are reenabled. Fixes: 16e8d74d2da9 ("KVM: x86: notifier for clocksource changes") Reported-by: syzbot+6beae4000559d41d80f8@syzkaller.appspotmail.com Signed-off-by: Thomas Gleixner Message-Id: <87h7jgm1zy.ffs@nanos.tec.linutronix.de> Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- arch/x86/kvm/x86.c | 22 ++++++++++++++++++---- 1 file changed, 18 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 4bd99f046b0c..39ab3d78bf57 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -7848,6 +7848,18 @@ static void pvclock_gtod_update_fn(struct work_struct *work) static DECLARE_WORK(pvclock_gtod_work, pvclock_gtod_update_fn); +/* + * Indirection to move queue_work() out of the tk_core.seq write held + * region to prevent possible deadlocks against time accessors which + * are invoked with work related locks held. + */ +static void pvclock_irq_work_fn(struct irq_work *w) +{ + queue_work(system_long_wq, &pvclock_gtod_work); +} + +static DEFINE_IRQ_WORK(pvclock_irq_work, pvclock_irq_work_fn); + /* * Notification about pvclock gtod data update. */ @@ -7859,13 +7871,14 @@ static int pvclock_gtod_notify(struct notifier_block *nb, unsigned long unused, update_pvclock_gtod(tk); - /* disable master clock if host does not trust, or does not - * use, TSC based clocksource. + /* + * Disable master clock if host does not trust, or does not use, + * TSC based clocksource. Delegate queue_work() to irq_work as + * this is invoked with tk_core.seq write held. */ if (!gtod_is_based_on_tsc(gtod->clock.vclock_mode) && atomic_read(&kvm_guest_has_master_clock) != 0) - queue_work(system_long_wq, &pvclock_gtod_work); - + irq_work_queue(&pvclock_irq_work); return 0; } @@ -7981,6 +7994,7 @@ void kvm_arch_exit(void) cpuhp_remove_state_nocalls(CPUHP_AP_X86_KVM_CLK_ONLINE); #ifdef CONFIG_X86_64 pvclock_gtod_unregister_notifier(&pvclock_gtod_notifier); + irq_work_sync(&pvclock_irq_work); cancel_work_sync(&pvclock_gtod_work); #endif kvm_x86_ops.hardware_enable = NULL; -- 2.30.2