On Tue, Jul 14, 2009 at 05:30:45PM +0300, Gleb Natapov wrote:
> @@ -147,14 +149,13 @@ int kvm_set_irq(struct kvm *kvm, int irq_source_id, int
> irq, int level)
> * writes to the unused one.
> */
> rcu_read_lock();
> - for (e = rcu_dereference(kvm->irq_routing); e && e->set; e++) {
> - if (e->gsi == irq) {
> - int r = e->set(e, kvm, sig_level);
> - if (r < 0)
> - continue;
> + irq_rt = rcu_dereference(kvm->irq_routing);
> + hlist_for_each_entry(e, n, &irq_rt->map[irq], link) {
Don't you need to range-check irq? E.g. with irqfd, gsi is
controlled by guest.
> + int r = e->set(e, kvm, sig_level);
> + if (r < 0)
> + continue;
>
> - ret = r + ((ret < 0) ? 0 : ret);
> - }
> + ret = r + ((ret < 0) ? 0 : ret);
> }
> rcu_read_unlock();
> return ret;
> @@ -162,21 +163,16 @@ int kvm_set_irq(struct kvm *kvm, int irq_source_id, int
> irq, int level)
>
> void kvm_notify_acked_irq(struct kvm *kvm, unsigned irqchip, unsigned pin)
> {
> - struct kvm_kernel_irq_routing_entry *e;
> struct kvm_irq_ack_notifier *kian;
> struct hlist_node *n;
> - unsigned gsi = pin;
> + unsigned gsi;
>
> trace_kvm_ack_irq(irqchip, pin);
>
> rcu_read_lock();
> - for (e = rcu_dereference(kvm->irq_routing); e && e->set; e++) {
> - if (e->irqchip.irqchip == irqchip &&
> - e->irqchip.pin == pin) {
> - gsi = e->gsi;
> - break;
> - }
> - }
> + gsi = rcu_dereference(kvm->irq_routing)->chip[irqchip][pin];
And possibly here as well. Can guest control pin?
> + if (gsi == -1)
> + gsi = pin;
>
> hlist_for_each_entry_rcu(kian, n, &kvm->irq_ack_notifier_list, link)
> if (kian->gsi == gsi)
> @@ -277,7 +273,8 @@ void kvm_free_irq_routing(struct kvm *kvm)
> kfree(kvm->irq_routing);
> }
>
> -static int setup_routing_entry(struct kvm_kernel_irq_routing_entry *e,
> +static int setup_routing_entry(struct kvm_irq_routing_table *rt,
> + struct kvm_kernel_irq_routing_entry *e,
> const struct kvm_irq_routing_entry *ue)
> {
> int r = -EINVAL;
> @@ -303,6 +300,7 @@ static int setup_routing_entry(struct
> kvm_kernel_irq_routing_entry *e,
> }
> e->irqchip.irqchip = ue->u.irqchip.irqchip;
> e->irqchip.pin = ue->u.irqchip.pin + delta;
> + rt->chip[ue->u.irqchip.irqchip][e->irqchip.pin] = ue->gsi;
> break;
> case KVM_IRQ_ROUTING_MSI:
> e->set = kvm_set_msi;
> @@ -313,6 +311,8 @@ static int setup_routing_entry(struct
> kvm_kernel_irq_routing_entry *e,
> default:
> goto out;
> }
> +
> + hlist_add_head(&e->link, &rt->map[e->gsi]);
> r = 0;
> out:
> return r;
> @@ -324,23 +324,37 @@ int kvm_set_irq_routing(struct kvm *kvm,
> unsigned nr,
> unsigned flags)
> {
> - struct kvm_kernel_irq_routing_entry *new, *old;
> - unsigned i;
> + struct kvm_irq_routing_table *new, *old;
> + u32 i, j, max_gsi = 0;
> int r;
>
> - /* last elemet is left zeored and indicates the end of the array */
> - new = kzalloc(sizeof(*new) * (nr + 1), GFP_KERNEL);
> + for (i = 0; i < nr; ++i) {
> + if (ue[i].gsi >= KVM_MAX_IRQ_ROUTES)
> + return -EINVAL;
> + max_gsi = max(max_gsi, ue[i].gsi);
> + }
> +
> + max_gsi += 1;
> +
> + new = kzalloc(sizeof(*new) + (max_gsi * sizeof(struct hlist_head)) +
> + (nr * sizeof(struct kvm_kernel_irq_routing_entry)),
> + GFP_KERNEL);
>
> if (!new)
> return -ENOMEM;
>
> + new->rt_entries = (void *)&new->map[max_gsi];
> +
> + new->max_gsi = max_gsi;
> + for (i = 0; i < 3; i++)
> + for (j = 0; j < KVM_IOAPIC_NUM_PINS; j++)
> + new->chip[i][j] = -1;
> +
> for (i = 0; i < nr; ++i) {
> r = -EINVAL;
> - if (ue->gsi >= KVM_MAX_IRQ_ROUTES)
> - goto out;
> if (ue->flags)
> goto out;
> - r = setup_routing_entry(new + i, ue);
> + r = setup_routing_entry(new, &new->rt_entries[i], ue);
> if (r)
> goto out;
> ++ue;
> --
> 1.6.2.1
>
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to [email protected]
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html