|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 1/1] evtchn: make EVTCHNOP_reset suitable for kexec
>>> On 30.07.14 at 16:03, <david.vrabel@xxxxxxxxxx> wrote:
> On 30/07/14 14:53, Jan Beulich wrote:
>>>>> On 30.07.14 at 15:42, <david.vrabel@xxxxxxxxxx> wrote:
>>> On 30/07/14 14:26, Vitaly Kuznetsov wrote:
>>>> --- a/xen/common/event_channel.c
>>>> +++ b/xen/common/event_channel.c
>>>> @@ -957,6 +957,17 @@ static long evtchn_reset(evtchn_reset_t *r)
>>>> for ( i = 0; port_is_valid(d, i); i++ )
>>>> (void)__evtchn_close(d, i);
>>>>
>>>> + if ( (d == current->domain) && d->evtchn_fifo )
>>>> + {
>>>> + /*
>>>> + * Guest domain called EVTCHNOP_reset with DOMID_SELF, destroying
>>>> + * FIFO event array and control blocks, resetting evtchn_port_ops
> to
>>>> + * evtchn_port_ops_2l.
>>>> + */
>>>> + evtchn_fifo_destroy(d);
>>>> + evtchn_2l_init(d);
>>>
>>> You need to take d->event_lock around this if, or the guest could try to
>>> bind another event whilst the ABI is in an inconsistent state.
>>
>> True, but then not just around this. Subsequent to any of the
>> __evtchn_close() invocations above, a port could also get
>> re-used (resulting in at least leaks). So I guess after taking the
>> lock there would also need to be a loop checking that all ports
>> are still closed (and return an error if they aren't).
>
> I considered this but I think the only side effect would be losing a
> pending event, and it would be sufficient to document that guests should
> not bind events while calling EVTCHNOP_reset.
Hmm, indeed, with what 2-level and FIFO currently do, there
wouldn't appear to be any leak or other badness.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |