diff options
author | Michael S. Tsirkin <mst@redhat.com> | 2012-09-16 04:50:30 -0400 |
---|---|---|
committer | Marcelo Tosatti <mtosatti@redhat.com> | 2012-09-17 12:46:32 -0400 |
commit | 9fc77441e5e1bf80b794cc546d2243ee9f4afb75 (patch) | |
tree | 4661976f4fea7606a54b3f5276c0ecb45760979c /arch/x86/kvm | |
parent | 7454766f7bead388251aedee35a478356a7f4e72 (diff) |
KVM: make processes waiting on vcpu mutex killable
vcpu mutex can be held for unlimited time so
taking it with mutex_lock on an ioctl is wrong:
one process could be passed a vcpu fd and
call this ioctl on the vcpu used by another process,
it will then be unkillable until the owner exits.
Call mutex_lock_killable instead and return status.
Note: mutex_lock_interruptible would be even nicer,
but I am not sure all users are prepared to handle EINTR
from these ioctls. They might misinterpret it as an error.
Cleanup paths expect a vcpu that can't be used by
any userspace so this will always succeed - catch bugs
by calling BUG_ON.
Catch callers that don't check return state by adding
__must_check.
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Diffstat (limited to 'arch/x86/kvm')
-rw-r--r-- | arch/x86/kvm/x86.c | 12 |
1 files changed, 9 insertions, 3 deletions
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index c4d451ed1573..19047eafa38d 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c | |||
@@ -6016,7 +6016,9 @@ int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) | |||
6016 | int r; | 6016 | int r; |
6017 | 6017 | ||
6018 | vcpu->arch.mtrr_state.have_fixed = 1; | 6018 | vcpu->arch.mtrr_state.have_fixed = 1; |
6019 | vcpu_load(vcpu); | 6019 | r = vcpu_load(vcpu); |
6020 | if (r) | ||
6021 | return r; | ||
6020 | r = kvm_arch_vcpu_reset(vcpu); | 6022 | r = kvm_arch_vcpu_reset(vcpu); |
6021 | if (r == 0) | 6023 | if (r == 0) |
6022 | r = kvm_mmu_setup(vcpu); | 6024 | r = kvm_mmu_setup(vcpu); |
@@ -6027,9 +6029,11 @@ int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) | |||
6027 | 6029 | ||
6028 | void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu) | 6030 | void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu) |
6029 | { | 6031 | { |
6032 | int r; | ||
6030 | vcpu->arch.apf.msr_val = 0; | 6033 | vcpu->arch.apf.msr_val = 0; |
6031 | 6034 | ||
6032 | vcpu_load(vcpu); | 6035 | r = vcpu_load(vcpu); |
6036 | BUG_ON(r); | ||
6033 | kvm_mmu_unload(vcpu); | 6037 | kvm_mmu_unload(vcpu); |
6034 | vcpu_put(vcpu); | 6038 | vcpu_put(vcpu); |
6035 | 6039 | ||
@@ -6275,7 +6279,9 @@ int kvm_arch_init_vm(struct kvm *kvm, unsigned long type) | |||
6275 | 6279 | ||
6276 | static void kvm_unload_vcpu_mmu(struct kvm_vcpu *vcpu) | 6280 | static void kvm_unload_vcpu_mmu(struct kvm_vcpu *vcpu) |
6277 | { | 6281 | { |
6278 | vcpu_load(vcpu); | 6282 | int r; |
6283 | r = vcpu_load(vcpu); | ||
6284 | BUG_ON(r); | ||
6279 | kvm_mmu_unload(vcpu); | 6285 | kvm_mmu_unload(vcpu); |
6280 | vcpu_put(vcpu); | 6286 | vcpu_put(vcpu); |
6281 | } | 6287 | } |