Replace the unsafe read-loops in the x86 kernel image loading functions with our safe read_file() and read_in_full() wrappers. This should fix random fails in kernel image loading, especially from pipes and sockets. Signed-off-by: Andre Przywara <andre.przywara@xxxxxxx> --- x86/kvm.c | 35 ++++++++++++++--------------------- 1 file changed, 14 insertions(+), 21 deletions(-) diff --git a/x86/kvm.c b/x86/kvm.c index a0204b8..ae430a0 100644 --- a/x86/kvm.c +++ b/x86/kvm.c @@ -9,6 +9,7 @@ #include <asm/bootparam.h> #include <linux/kvm.h> +#include <linux/kernel.h> #include <sys/types.h> #include <sys/ioctl.h> @@ -209,15 +210,14 @@ static inline void *guest_real_to_host(struct kvm *kvm, u16 selector, u16 offset static bool load_flat_binary(struct kvm *kvm, int fd_kernel) { void *p; - int nr; if (lseek(fd_kernel, 0, SEEK_SET) < 0) die_perror("lseek"); p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); - while ((nr = read(fd_kernel, p, 65536)) > 0) - p += nr; + if (read_file(fd_kernel, p, kvm->cfg.ram_size) < 0) + die_perror("read"); kvm->arch.boot_selector = BOOT_LOADER_SELECTOR; kvm->arch.boot_ip = BOOT_LOADER_IP; @@ -232,12 +232,10 @@ static bool load_bzimage(struct kvm *kvm, int fd_kernel, int fd_initrd, const char *kernel_cmdline) { struct boot_params *kern_boot; - unsigned long setup_sects; struct boot_params boot; size_t cmdline_size; - ssize_t setup_size; + ssize_t file_size; void *p; - int nr; u16 vidmode; /* @@ -248,7 +246,7 @@ static bool load_bzimage(struct kvm *kvm, int fd_kernel, int fd_initrd, if (lseek(fd_kernel, 0, SEEK_SET) < 0) die_perror("lseek"); - if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot)) + if (read_in_full(fd_kernel, &boot, sizeof(boot)) != sizeof(boot)) return false; if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC))) @@ -262,20 +260,17 @@ static bool load_bzimage(struct kvm *kvm, int fd_kernel, int fd_initrd, if (!boot.hdr.setup_sects) boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS; - setup_sects = boot.hdr.setup_sects + 1; - - setup_size = setup_sects << 9; + file_size = (boot.hdr.setup_sects + 1) << 9; p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); + if (read_in_full(fd_kernel, p, file_size) != file_size) + die_perror("kernel setup read"); - /* copy setup.bin to mem*/ - if (read(fd_kernel, p, setup_size) != setup_size) - die_perror("read"); - - /* copy vmlinux.bin to BZ_KERNEL_START*/ + /* read actual kernel image (vmlinux.bin) to BZ_KERNEL_START */ p = guest_flat_to_host(kvm, BZ_KERNEL_START); - - while ((nr = read(fd_kernel, p, 65536)) > 0) - p += nr; + file_size = read_file(fd_kernel, p, + kvm->cfg.ram_size - BZ_KERNEL_START); + if (file_size < 0) + die_perror("kernel read"); p = guest_flat_to_host(kvm, BOOT_CMDLINE_OFFSET); if (kernel_cmdline) { @@ -287,7 +282,6 @@ static bool load_bzimage(struct kvm *kvm, int fd_kernel, int fd_initrd, memcpy(p, kernel_cmdline, cmdline_size - 1); } - /* vidmode should be either specified or set by default */ if (kvm->cfg.vnc || kvm->cfg.sdl || kvm->cfg.gtk) { if (!kvm->cfg.arch.vidmode) @@ -326,8 +320,7 @@ static bool load_bzimage(struct kvm *kvm, int fd_kernel, int fd_initrd, } p = guest_flat_to_host(kvm, addr); - nr = read(fd_initrd, p, initrd_stat.st_size); - if (nr != initrd_stat.st_size) + if (read_in_full(fd_initrd, p, initrd_stat.st_size) < 0) die("Failed to read initrd"); kern_boot->hdr.ramdisk_image = addr; -- 2.5.1 -- To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html