]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
KVM: x86: Fold guts of kvm_arch_sync_events() into kvm_arch_pre_destroy_vm()
authorSean Christopherson <seanjc@google.com>
Mon, 24 Feb 2025 23:55:41 +0000 (15:55 -0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Wed, 26 Feb 2025 18:17:23 +0000 (13:17 -0500)
Fold the guts of kvm_arch_sync_events() into kvm_arch_pre_destroy_vm(), as
the kvmclock and PIT background workers only need to be stopped before
destroying vCPUs (to avoid accessing vCPUs as they are being freed); it's
a-ok for them to be running while the VM is visible on the global vm_list.

Note, the PIT also needs to be stopped before IRQ routing is freed
(because KVM's IRQ routing is garbage and assumes there is always non-NULL
routing).

Opportunistically add comments to explain why KVM stops/frees certain
assets early.

Signed-off-by: Sean Christopherson <seanjc@google.com>
Message-ID: <20250224235542.2562848-7-seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/x86.c

index 2b74e8b1df678d1a02e5e478df10466ee26b6920..650ef1ae021194ce803cd1174964536c48d20581 100644 (file)
@@ -12759,9 +12759,7 @@ out:
 
 void kvm_arch_sync_events(struct kvm *kvm)
 {
-       cancel_delayed_work_sync(&kvm->arch.kvmclock_sync_work);
-       cancel_delayed_work_sync(&kvm->arch.kvmclock_update_work);
-       kvm_free_pit(kvm);
+
 }
 
 /**
@@ -12842,6 +12840,17 @@ EXPORT_SYMBOL_GPL(__x86_set_memory_region);
 
 void kvm_arch_pre_destroy_vm(struct kvm *kvm)
 {
+       /*
+        * Stop all background workers and kthreads before destroying vCPUs, as
+        * iterating over vCPUs in a different task while vCPUs are being freed
+        * is unsafe, i.e. will lead to use-after-free.  The PIT also needs to
+        * be stopped before IRQ routing is freed.
+        */
+       cancel_delayed_work_sync(&kvm->arch.kvmclock_sync_work);
+       cancel_delayed_work_sync(&kvm->arch.kvmclock_update_work);
+
+       kvm_free_pit(kvm);
+
        kvm_mmu_pre_destroy_vm(kvm);
 }