From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1MvcL1-0001Xg-GE for qemu-devel@nongnu.org; Wed, 07 Oct 2009 15:38:15 -0400 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1MvcKw-0001Sp-Qb for qemu-devel@nongnu.org; Wed, 07 Oct 2009 15:38:15 -0400 Received: from [199.232.76.173] (port=54268 helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1MvcKw-0001Sc-BT for qemu-devel@nongnu.org; Wed, 07 Oct 2009 15:38:10 -0400 Received: from mx1.redhat.com ([209.132.183.28]:12003) by monty-python.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1MvcKv-0007Q8-Jz for qemu-devel@nongnu.org; Wed, 07 Oct 2009 15:38:09 -0400 From: Glauber Costa Date: Wed, 7 Oct 2009 16:38:03 -0300 Message-Id: <1254944284-12688-2-git-send-email-glommer@redhat.com> In-Reply-To: <1254944284-12688-1-git-send-email-glommer@redhat.com> References: <1254944284-12688-1-git-send-email-glommer@redhat.com> Subject: [Qemu-devel] [PATCH 1/2] unlock iothread mutex before running kvm ioctl List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: aliguori@us.ibm.com Without this, kvm will hold the mutex while it issues its run ioctl, and never be able to step out of it, causing a deadlock. Signed-off-by: Glauber Costa --- kvm-all.c | 2 ++ qemu-common.h | 3 +++ vl.c | 8 ++++---- 3 files changed, 9 insertions(+), 4 deletions(-) diff --git a/kvm-all.c b/kvm-all.c index 7dcc553..11f4414 100644 --- a/kvm-all.c +++ b/kvm-all.c @@ -605,7 +605,9 @@ int kvm_cpu_exec(CPUState *env) } kvm_arch_pre_run(env, run); + qemu_mutex_unlock_iothread(); ret = kvm_vcpu_ioctl(env, KVM_RUN, 0); + qemu_mutex_lock_iothread(); kvm_arch_post_run(env, run); if (ret == -EINTR || ret == -EAGAIN) { diff --git a/qemu-common.h b/qemu-common.h index 12e7dd0..820dd37 100644 --- a/qemu-common.h +++ b/qemu-common.h @@ -146,6 +146,9 @@ char *qemu_strndup(const char *str, size_t size); void *get_mmap_addr(unsigned long size); +void qemu_mutex_lock_iothread(void); +void qemu_mutex_unlock_iothread(void); + /* Error handling. */ void QEMU_NORETURN hw_error(const char *fmt, ...) diff --git a/vl.c b/vl.c index eb01da7..3012141 100644 --- a/vl.c +++ b/vl.c @@ -3445,8 +3445,8 @@ void qemu_notify_event(void) } } -#define qemu_mutex_lock_iothread() do { } while (0) -#define qemu_mutex_unlock_iothread() do { } while (0) +void qemu_mutex_lock_iothread(void) {} +void qemu_mutex_unlock_iothread(void) {} void vm_stop(int reason) { @@ -3640,7 +3640,7 @@ static void qemu_signal_lock(unsigned int msecs) qemu_mutex_unlock(&qemu_fair_mutex); } -static void qemu_mutex_lock_iothread(void) +void qemu_mutex_lock_iothread(void) { if (kvm_enabled()) { qemu_mutex_lock(&qemu_fair_mutex); @@ -3650,7 +3650,7 @@ static void qemu_mutex_lock_iothread(void) qemu_signal_lock(100); } -static void qemu_mutex_unlock_iothread(void) +void qemu_mutex_unlock_iothread(void) { qemu_mutex_unlock(&qemu_global_mutex); } -- 1.6.2.5