|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] alloca() in linux_privcmd_map_foreign_bulk causing segfault
On Tue, Apr 17, 2012 at 8:56 AM, Andres Lagar-Cavilla
<andres@xxxxxxxxxxxxxxxx> wrote:
>>
>> On Tue, 2012-04-17 at 16:19 +0100, Santosh Jodh wrote:
>>> I only cared about linux_gnttab_grant_map for user mode blkback. You
>>> told me to change all others while I was in there.
>>
>> Oh, right, I remember now.
>>
>> Given that reverting it for this case will still leave the same issue
>> for the grant case (which I'd forgotten about) I suppose the appropriate
>> workaround is to touch the alloca'd memory in the appropriate order in
>> all cases (perhaps with an alloca helper macro).
>
> FWIW, I am very skeptical about this whole alloca business. It's very very
> dangerous, no surprise on the bug report. On my code I tend to map
> arbitrarily-sized pfn arrays, and I've been thinking of disabling alloca.
>
> If your only safeguard is to put a loop that touches everything so the
> stack gets allocated .... then what's your gain?
>
> Just mmap('/dev/zero', MAP_PRIVATE|MAP_POPULATE, PROT_WRITE,
> round_to_page_size(what_you_need)). That's likely the fastest way to get
> the array in Linux. It isn't that slow either. And it's safe.
I tried and it worked for me.
diff --git a/tools/libxc/xc_linux_osdep.c b/tools/libxc/xc_linux_osdep.c
--- a/tools/libxc/xc_linux_osdep.c
+++ b/tools/libxc/xc_linux_osdep.c
@@ -34,16 +34,17 @@
#include <xen/memory.h>
#include <xen/sys/evtchn.h>
#include <xen/sys/gntdev.h>
#include <xen/sys/gntalloc.h>
#include "xenctrl.h"
#include "xenctrlosdep.h"
+#define ROUNDUP(_x,_w) (((unsigned long)(_x)+(1UL<<(_w))-1) & ~((1UL<<(_w))-1))
#define ERROR(_m, _a...)
xc_osdep_log(xch,XTL_ERROR,XC_INTERNAL_ERROR,_m , ## _a )
#define PERROR(_m, _a...) xc_osdep_log(xch,XTL_ERROR,XC_INTERNAL_ERROR,_m \
" (%d = %s)", ## _a , errno, xc_strerror(xch, errno))
static xc_osdep_handle linux_privcmd_open(xc_interface *xch)
{
int flags, saved_errno;
int fd = open("/proc/xen/privcmd", O_RDWR);
@@ -281,17 +282,24 @@ static void *linux_privcmd_map_foreign_b
/* Command was not recognized, use fall back */
else if ( rc < 0 && errno == EINVAL && (int)num > 0 )
{
/*
* IOCTL_PRIVCMD_MMAPBATCH_V2 is not supported - fall back to
* IOCTL_PRIVCMD_MMAPBATCH.
*/
privcmd_mmapbatch_t ioctlx;
- xen_pfn_t *pfn = alloca(num * sizeof(*pfn));
+ xen_pfn_t *pfn = mmap(NULL, ROUNDUP((num * sizeof(*pfn)),
XC_PAGE_SHIFT),
+ PROT_READ | PROT_WRITE,
+ MAP_PRIVATE | MAP_ANON | MAP_POPULATE, -1, 0);
+ if ( pfn == MAP_FAILED )
+ {
+ PERROR("xc_map_foreign_bulk: mmap of pfn array failed");
+ return NULL;
+ }
memcpy(pfn, arr, num * sizeof(*arr));
ioctlx.num = num;
ioctlx.dom = dom;
ioctlx.addr = (unsigned long)addr;
ioctlx.arr = pfn;
@@ -323,16 +331,18 @@ static void *linux_privcmd_map_foreign_b
break;
}
rc = -ENOENT;
continue;
}
break;
}
+ munmap(pfn, ROUNDUP((num * sizeof(*pfn)), XC_PAGE_SHIFT));
+
if ( rc == -ENOENT && i == num )
rc = 0;
else if ( rc )
{
errno = -rc;
rc = -1;
}
}
> Andres
>
>>
>> Ian.
>>
>>>
>>> -----Original Message-----
>>> From: Jan Beulich [mailto:JBeulich@xxxxxxxx]
>>> Sent: Tuesday, April 17, 2012 12:56 AM
>>> To: Ian Campbell; AP
>>> Cc: Santosh Jodh; xen-devel@xxxxxxxxxxxxxxxxxxx
>>> Subject: Re: [Xen-devel] alloca() in linux_privcmd_map_foreign_bulk
>>> causing segfault
>>>
>>> >>> On 17.04.12 at 09:27, Ian Campbell <Ian.Campbell@xxxxxxxxxx> wrote:
>>> > On Tue, 2012-04-17 at 05:57 +0100, AP wrote:
>>> >> On xen-unstable 25164:5bbda657a016, when I try to map in large
>>> >> amounts of pages (in the GB range) from a guest in to Dom0
>>> >
>>> > Out of interest -- what are you doing this for?
>>> >
>>> >> using
>>> >> xc_map_foreign_bulk() I am hitting a segfault.
>>> >>
>>> >> Program received signal SIGSEGV, Segmentation fault.
>>> >> 0x00007ffff7bd38d5 in linux_privcmd_map_foreign_bulk (xch=0x605050,
>>> >> h=<optimized out>, dom=2, prot=<optimized out>,
>>> arr=0x7ffff6bf5010,
>>> >> err=0x7ffff67f4010, num=<optimized out>)
>>> >> at /usr/include/x86_64-linux-gnu/bits/string3.h:52
>>> >> 52 return __builtin___memcpy_chk (__dest, __src, __len, __bos0
>>> (__dest));
>>> >> (gdb) bt
>>> >> #0 0x00007ffff7bd38d5 in linux_privcmd_map_foreign_bulk
>>> (xch=0x605050,
>>> >> h=<optimized out>, dom=2, prot=<optimized out>,
>>> arr=0x7ffff6bf5010,
>>> >> err=0x7ffff67f4010, num=<optimized out>)
>>> >> at /usr/include/x86_64-linux-gnu/bits/string3.h:52
>>> >> #1 0x00007ffff7bd1ffc in xc_map_foreign_bulk (xch=<optimized out>,
>>> >> dom=<optimized out>, prot=<optimized out>, arr=<optimized out>,
>>> >> err=<optimized out>, num=<optimized out>) at
>>> >> xc_foreign_memory.c:79
>>> >>
>>> >> This was working for me with Xen 4.1.2. On comparing
>>> >> linux_privcmd_map_foreign_bulk() between 4.1.2 and unstable I see
>>> >> that the pfn array in linux_privcmd_map_foreign_bulk() is being
>>> >> allocated using alloca() in unstable vs malloc() in 4.1.2. So I am
>>> >> blowing the stack with the call.
>>> >
>>> > I bet this is due to Linux's stack guard page. This means that if you
>>> > try and increase the stack by more than ~1 page you skip entirely over
>>> > the "next" stack page and into the guard.
>>> >
>>> > Does it help if after the alloca you add a loop which touches the
>>> > first word of each page of the new buffer? Since the stack grows down
>>> > you might actually need to do it backwards from the end of the array
>>> > in order to start at the end which is nearest the existing stack?
>>> > (it's before coffee o'clock so thinking about stack direction isn't my
>>> > strong point yet...)
>>>
>>> This should really be done by the alloca() implementation itself -
>>> anything else is a bug.
>>>
>>> > The switch to alloca was made recently in order to optimise the
>>> > hotpath for a userspace I/O backend.
>>>
>>> Probably this should be made size-dependent ...
>>>
>>> > BTW, Santosh, it didn't occur to me at the time but what is privcmd
>>> > mmap doing on the hot path for the userspace I/O anyway? Most hotpath
>>> > operations should really be grant table ops, a backend shouldn't be
>>> > relying on the privileges accorded to dom0 -- for one thing it should
>>> > be expected to work in a driver domain.
>>>
>>> ... if this indeed turns out to be a hot path for something at all?
>>>
>>> Jan
>>>
>>> >> If I replace the alloca() with malloc() the call goes through. What
>>> >> is the way around this? Should I be using
>>> >> xc_map_foreign_batch() instead, which I think is deprecated? Please
>>> >> advice...
>>> >>
>>> >> Thanks,
>>> >> AP
>>> >>
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |