From: Christian Ehrhardt <ehrhardt@linux.vnet.ibm.com>
To: Avi Kivity <avi@redhat.com>
Cc: kvm@vger.kernel.org,
Christian Borntraeger <borntraeger@de.ibm.com>,
Carsten Otte <cotte@de.ibm.com>
Subject: Re: [PATCH 4/6] kvm-s390: Unlink vcpu on destroy
Date: Mon, 11 May 2009 15:00:35 +0200 [thread overview]
Message-ID: <4A082173.9010001@linux.vnet.ibm.com> (raw)
In-Reply-To: <4A017E8C.4010700@redhat.com>
Avi Kivity wrote:
> ehrhardt@linux.vnet.ibm.com wrote:
>> From: Carsten Otte <cotte@de.ibm.com>
>>
>> This patch makes sure we do unlink a vcpu's sie control block
>> from the system control area in kvm_arch_vcpu_destroy. This
>> prevents illegal accesses to the sie control block from other
>> virtual cpus after free.
>>
>> Reported-by: Mijo Safradin <mijo@linux.vnet.ibm.com>
>> Signed-off-by: Carsten Otte <cotte@de.ibm.com>
>> ---
>> arch/s390/kvm/kvm-s390.c | 9 +++++++--
>> 1 file changed, 7 insertions(+), 2 deletions(-)
>>
>> Index: kvm/arch/s390/kvm/kvm-s390.c
>> ===================================================================
>> --- kvm.orig/arch/s390/kvm/kvm-s390.c
>> +++ kvm/arch/s390/kvm/kvm-s390.c
>> @@ -195,6 +195,9 @@ out_nokvm:
>> void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
>> {
>> VCPU_EVENT(vcpu, 3, "%s", "free cpu");
>> + if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
>> + (__u64) vcpu->arch.sie_block)
>> + vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
>> free_page((unsigned long)(vcpu->arch.sie_block));
>>
>>
>
> If this is accessed by hardware on a different cpu, don't you need a
> memory barrier here?
>
>
Right, will be in v2
--
Grüsse / regards,
Christian Ehrhardt
IBM Linux Technology Center, Open Virtualization
next prev parent reply other threads:[~2009-05-11 13:00 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-05-05 14:39 [PATCH 0/6] kvm-s390: collection of kvm-s390 fixes ehrhardt
2009-05-05 14:39 ` [PATCH 1/6] kvm-s390: Fix memory slot versus run ehrhardt
2009-05-06 12:01 ` Avi Kivity
2009-05-11 13:00 ` Christian Ehrhardt
2009-05-11 13:15 ` Avi Kivity
2009-05-11 13:46 ` Christian Ehrhardt
2009-05-11 14:02 ` Avi Kivity
2009-05-11 14:42 ` Christian Ehrhardt
2009-05-11 15:01 ` Avi Kivity
2009-05-12 9:15 ` Christian Ehrhardt
2009-05-12 11:35 ` Avi Kivity
2009-05-12 13:33 ` Christian Ehrhardt
2009-05-17 22:31 ` Avi Kivity
2009-05-20 12:05 ` Christian Ehrhardt
2009-05-05 14:39 ` [PATCH 2/6] kvm-s390: use hrtimer for clock wakeup from idle ehrhardt
2009-05-06 12:10 ` Avi Kivity
2009-05-06 12:36 ` Christian Borntraeger
2009-05-07 10:19 ` Avi Kivity
2009-05-07 10:34 ` Christian Borntraeger
2009-05-20 15:48 ` Hollis Blanchard
2009-05-05 14:39 ` [PATCH 3/6] kvm-s390: optimize float int lock: spin_lock_bh --> spin_lock ehrhardt
2009-05-05 14:39 ` [PATCH 4/6] kvm-s390: Unlink vcpu on destroy ehrhardt
2009-05-06 12:11 ` Avi Kivity
2009-05-11 13:00 ` Christian Ehrhardt [this message]
2009-05-05 14:39 ` [PATCH 5/6] kvm-s390: Sanity check on validity intercept ehrhardt
2009-05-05 14:39 ` [PATCH 6/6] kvm-s390: Verify memory in kvm run ehrhardt
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4A082173.9010001@linux.vnet.ibm.com \
--to=ehrhardt@linux.vnet.ibm.com \
--cc=avi@redhat.com \
--cc=borntraeger@de.ibm.com \
--cc=cotte@de.ibm.com \
--cc=kvm@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).