From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:55418) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1e1h0G-0006w5-Sw for qemu-devel@nongnu.org; Mon, 09 Oct 2017 18:58:29 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1e1h0D-0005aJ-Qa for qemu-devel@nongnu.org; Mon, 09 Oct 2017 18:58:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50474) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1e1h0D-0005a5-K9 for qemu-devel@nongnu.org; Mon, 09 Oct 2017 18:58:25 -0400 From: =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= Date: Tue, 10 Oct 2017 00:56:15 +0200 Message-Id: <20171009225623.29232-35-marcandre.lureau@redhat.com> In-Reply-To: <20171009225623.29232-1-marcandre.lureau@redhat.com> References: <20171009225623.29232-1-marcandre.lureau@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Subject: [Qemu-devel] [PATCH 34/42] tpm-passthrough: workaround a possible race List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: amarnath.valluri@intel.com, stefanb@linux.vnet.ibm.com, =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= The TPM backend processing thread has common shared variable race issues. (they should not be so easy to reach since guest interaction with the device is slow compared to host emulation) An obvious one is setting op_cancelled from device thread after calling write(cancel_fd). The backend thread may return before the device thread has set the variable. Instead set it before cancellation. Even if the write() failed, the end result is command get possibly cancelled (even if cancellation came from external sources it doesn't matter much). It's worth to consider removing the backend processing thread for now. Signed-off-by: Marc-Andr=C3=A9 Lureau --- hw/tpm/tpm_passthrough.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hw/tpm/tpm_passthrough.c b/hw/tpm/tpm_passthrough.c index 0806cf86af..d71d64e8aa 100644 --- a/hw/tpm/tpm_passthrough.c +++ b/hw/tpm/tpm_passthrough.c @@ -89,6 +89,7 @@ static int tpm_passthrough_unix_tx_bufs(TPMPassthruStat= e *tpm_pt, bool is_selftest; const struct tpm_resp_hdr *hdr; =20 + /* FIXME: protect shared variables or use other sync mechanism */ tpm_pt->tpm_op_canceled =3D false; tpm_pt->tpm_executing =3D true; *selftest_done =3D false; @@ -178,12 +179,11 @@ static void tpm_passthrough_cancel_cmd(TPMBackend *= tb) */ if (tpm_pt->tpm_executing) { if (tpm_pt->cancel_fd >=3D 0) { + tpm_pt->tpm_op_canceled =3D true; n =3D write(tpm_pt->cancel_fd, "-", 1); if (n !=3D 1) { error_report("Canceling TPM command failed: %s", strerror(errno)); - } else { - tpm_pt->tpm_op_canceled =3D true; } } else { error_report("Cannot cancel TPM command due to missing " --=20 2.14.1.146.gd35faa819