diff options
author | Alex Bennée <alex.bennee@linaro.org> | 2017-09-21 12:06:25 +0100 |
---|---|---|
committer | Richard Henderson <richard.henderson@linaro.org> | 2017-09-25 11:23:30 -0700 |
commit | 8b81253332b5a3f3c67b6462f39caef47a00dd29 (patch) | |
tree | 829033e038f0bb155a9afc7f7a2fc1293c02d0a2 /accel | |
parent | 460b6c8e581aa06b86f59eebd9e52edfe7adf417 (diff) | |
download | qemu-8b81253332b5a3f3c67b6462f39caef47a00dd29.zip qemu-8b81253332b5a3f3c67b6462f39caef47a00dd29.tar.gz qemu-8b81253332b5a3f3c67b6462f39caef47a00dd29.tar.bz2 |
accel/tcg/cputlb: avoid recursive BQL (fixes #1706296)
The mmio path (see exec.c:prepare_mmio_access) already protects itself
against recursive locking and it makes sense to do the same for
io_readx/writex. Otherwise any helper running in the BQL context will
assert when it attempts to write to device memory as in the case of
the bug report.
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
CC: Richard Jones <rjones@redhat.com>
CC: Paolo Bonzini <bonzini@gnu.org>
CC: qemu-stable@nongnu.org
Message-Id: <20170921110625.9500-1-alex.bennee@linaro.org>
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
Diffstat (limited to 'accel')
-rw-r--r-- | accel/tcg/cputlb.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c index e72415a..bcbcc4d 100644 --- a/accel/tcg/cputlb.c +++ b/accel/tcg/cputlb.c @@ -765,7 +765,7 @@ static uint64_t io_readx(CPUArchState *env, CPUIOTLBEntry *iotlbentry, cpu->mem_io_vaddr = addr; - if (mr->global_locking) { + if (mr->global_locking && !qemu_mutex_iothread_locked()) { qemu_mutex_lock_iothread(); locked = true; } @@ -800,7 +800,7 @@ static void io_writex(CPUArchState *env, CPUIOTLBEntry *iotlbentry, cpu->mem_io_vaddr = addr; cpu->mem_io_pc = retaddr; - if (mr->global_locking) { + if (mr->global_locking && !qemu_mutex_iothread_locked()) { qemu_mutex_lock_iothread(); locked = true; } |