Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp3019383pxb; Tue, 12 Jan 2021 04:29:44 -0800 (PST) X-Google-Smtp-Source: ABdhPJxUjYz06MdIhg4tDxb7VPUuZWVYOl9NSu4f+6wzs3l3rAWKNq8kd64b7CM9g6+o8b1fZo4B X-Received: by 2002:aa7:d494:: with SMTP id b20mr3368255edr.330.1610454584009; Tue, 12 Jan 2021 04:29:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610454584; cv=none; d=google.com; s=arc-20160816; b=okq8CD00egB6aSD1YyPiB/EQBRjpjn68jHPrtkkDKQvoRm4byQoB/kzYXGVyGVtb07 1Q2k5i86Q4NiC6fvQM+3XTocgBQ4YG6nIZ2xEqt1j96W7EQw9d2u59epRCrW9+3RlHCf vmEfVbmE+n/5HLKkTPGWt7ZyL4ichZtuZyIQf4dgQ2IV6/PCqbmubf8hZAa8ibrd8yaB CEc5RYQnd3BghMWsamlRoxTG1yGELgtIBhkKC2M/2Rvj0kDevTRSD5qlsG2kxJintQnC 2POCg5SFkM2GWHZMeRVa1kk23NGXNEqhjEp6+gOKn8Iuola51BQ2U8puWfqAi/ZmrRFm iSvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=CMvZ/I1r3MSZrztil/ylNAtmESTZ+2+tKjLUG+/2X5U=; b=JlsNpCzWmlh689icZMN2a4mauPlbkE0NriJS8J4KZIN51p1w7pEPKnnCMaEUBgSauY B5g6L0gUqw8fet3AFyDla5J6IQHmt0uBItB4n4XcRBxlSZJniKsmNXSUjdOFGAhjKxcA /xxsQopPoGjwaSNNPJqxCcfvSDmv0b+YMLI68OWmLzVYKKYsEdd33AxvUXjPBJNV+xNY Zd3PzD2Ok5/SIcTLeIXcGoLmVWFRKsT4Bn0XZ3KsfdCjZX0CAaixp48ft4WVWIpJhhWy K020KXZ7PPNa82NmFLWOOhri8dJyiCuUmI3fI76+0GccKT7qukYZpxak6Jniaqrc3Jm0 YmEw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kq16si1044602ejb.253.2021.01.12.04.29.19; Tue, 12 Jan 2021 04:29:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392596AbhALJcs (ORCPT + 99 others); Tue, 12 Jan 2021 04:32:48 -0500 Received: from szxga04-in.huawei.com ([45.249.212.190]:10651 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390802AbhALJcs (ORCPT ); Tue, 12 Jan 2021 04:32:48 -0500 Received: from DGGEMS406-HUB.china.huawei.com (unknown [172.30.72.58]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4DFQLK10Nyz15rbR; Tue, 12 Jan 2021 17:31:05 +0800 (CST) Received: from DESKTOP-6NKE0BC.china.huawei.com (10.174.185.210) by DGGEMS406-HUB.china.huawei.com (10.3.19.206) with Microsoft SMTP Server id 14.3.498.0; Tue, 12 Jan 2021 17:31:58 +0800 From: Kunkun Jiang To: Paolo Bonzini , , CC: , Keqian Zhu Subject: [PATCH] kvm: Fixes lack of KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 enabled check Date: Tue, 12 Jan 2021 17:29:42 +0800 Message-ID: <20210112092942.2310-1-jiangkunkun@huawei.com> X-Mailer: git-send-email 2.26.2.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.174.185.210] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The KVM_CLEAR_DIRTY_LOG ioctl lacks the check whether the capability KVM_CAP_MANUAL_DIRTY_LOG_PROTECT is enabled or not. This may cause some problems if userspace calls the KVM_CLEAR_DIRTY_LOG ioctl, but dose't enable this capability. So we'd better to add it. Fixes: 2a31b9db15353 ("kvm: introduce manual dirty log reprotect") Signed-off-by: Kunkun Jiang --- virt/kvm/kvm_main.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index fa9e3614d30e..8f5633d8a0e8 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1602,6 +1602,9 @@ static int kvm_clear_dirty_log_protect(struct kvm *kvm, unsigned long *dirty_bitmap_buffer; bool flush; + if (!kvm->manual_dirty_log_protect) + return -EPERM; + /* Dirty ring tracking is exclusive to dirty log tracking */ if (kvm->dirty_ring_size) return -ENXIO; -- 2.19.1