diff options
| author | David Woodhouse <[email protected]> | 2022-12-26 12:03:16 +0000 |
|---|---|---|
| committer | Paolo Bonzini <[email protected]> | 2022-12-27 11:01:48 +0000 |
| commit | 92c58965e9656dc6e682a8ffe520fac0fb256d13 (patch) | |
| tree | f00eb77063528a2e6df6fd47b57f20c08fdedbbb /tools/perf/scripts/python/export-to-sqlite.py | |
| parent | KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (diff) | |
| download | kernel-92c58965e9656dc6e682a8ffe520fac0fb256d13.tar.gz kernel-92c58965e9656dc6e682a8ffe520fac0fb256d13.zip | |
KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
In particular, we shouldn't assume that being contiguous in guest virtual
address space means being contiguous in guest *physical* address space.
In dropping the manual calls to kvm_mmu_gva_to_gpa_system(), also drop
the srcu_read_lock() that was around them. All call sites are reached
from kvm_xen_hypercall() which is called from the handle_exit function
with the read lock already held.
536395260 ("KVM: x86/xen: handle PV timers oneshot mode")
1a65105a5 ("KVM: x86/xen: handle PV spinlocks slowpath")
Fixes: 2fd6df2f2 ("KVM: x86/xen: intercept EVTCHNOP_send from guests")
Signed-off-by: David Woodhouse <[email protected]>
Message-Id: <[email protected]>
Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/export-to-sqlite.py')
0 files changed, 0 insertions, 0 deletions
