|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] gnttab: fix page_alloc + grant_table deadlock
On Thu, Oct 31, 2013 at 09:29:16PM +0100, Radim KrÄmÃÅ wrote:
> AB/BA deaclock between d->page_alloc_lock and d->grant_table->lock
> happened in this scenario: (names are original)
"deaclock" -> "deadlock"
> gnttab_transfer(): | gnttab_setup_table():
> spin_lock(&e->page_alloc_lock); + spin_lock(>->lock);
> gnttab_prepare_for_transfer(): | gnttab_grow_table():
> | gnttab_create_shared_page():
> | share_xen_page_with_guest():
> spin_lock(&rgt->lock); + spin_lock(&d->page_alloc_lock);
>
> The patch takes grant_table->lock first in gnttab_transfer() and keeps
> it longer, which also saves one unlock()+lock().
>
> Based on analysis from Ulrich Obergfell <uobergfe@xxxxxxxxxx>.
This is XSA-73. This patch is much smaller than the patches provided
in the advisory. Andrew, can you comment on why your fix should be
applied instead of this one?
--msw
> Signed-off-by: Radim KrÄmÃÅ <rkrcmar@xxxxxxxxxx>
> ---
> xen/common/grant_table.c | 9 +++------
> 1 file changed, 3 insertions(+), 6 deletions(-)
>
> diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
> index f42bc7a..fa46a8b 100644
> --- a/xen/common/grant_table.c
> +++ b/xen/common/grant_table.c
> @@ -1434,6 +1434,7 @@ gnttab_query_size(
> /*
> * Check that the given grant reference (rd,ref) allows 'ld' to transfer
> * ownership of a page frame. If so, lock down the grant entry.
> + * rd's grant table lock must be held by the caller.
> */
> static int
> gnttab_prepare_for_transfer(
> @@ -1444,8 +1445,6 @@ gnttab_prepare_for_transfer(
> union grant_combo scombo, prev_scombo, new_scombo;
> int retries = 0;
>
> - spin_lock(&rgt->lock);
> -
> if ( rgt->gt_version == 0 )
> {
> gdprintk(XENLOG_INFO,
> @@ -1495,11 +1494,9 @@ gnttab_prepare_for_transfer(
> scombo = prev_scombo;
> }
>
> - spin_unlock(&rgt->lock);
> return 1;
>
> fail:
> - spin_unlock(&rgt->lock);
> return 0;
> }
>
> @@ -1617,6 +1614,7 @@ gnttab_transfer(
> page = new_page;
> }
>
> + spin_lock(&e->grant_table->lock);
> spin_lock(&e->page_alloc_lock);
>
> /*
> @@ -1635,6 +1633,7 @@ gnttab_transfer(
> "or is dying (%d)\n",
> e->tot_pages, e->max_pages, gop.ref, e->is_dying);
> spin_unlock(&e->page_alloc_lock);
> + spin_unlock(&e->grant_table->lock);
> rcu_unlock_domain(e);
> put_gfn(d, gop.mfn);
> page->count_info &= ~(PGC_count_mask|PGC_allocated);
> @@ -1655,8 +1654,6 @@ gnttab_transfer(
> TRACE_1D(TRC_MEM_PAGE_GRANT_TRANSFER, e->domain_id);
>
> /* Tell the guest about its new page frame. */
> - spin_lock(&e->grant_table->lock);
> -
> if ( e->grant_table->gt_version == 1 )
> {
> grant_entry_v1_t *sha = &shared_entry_v1(e->grant_table,
> gop.ref);
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |