[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2 1/1] evtchn: make EVTCHNOP_reset suitable for kexec



>>> On 30.07.14 at 16:03, <david.vrabel@xxxxxxxxxx> wrote:
> On 30/07/14 14:53, Jan Beulich wrote:
>>>>> On 30.07.14 at 15:42, <david.vrabel@xxxxxxxxxx> wrote:
>>> On 30/07/14 14:26, Vitaly Kuznetsov wrote:
>>>> --- a/xen/common/event_channel.c
>>>> +++ b/xen/common/event_channel.c
>>>> @@ -957,6 +957,17 @@ static long evtchn_reset(evtchn_reset_t *r)
>>>>      for ( i = 0; port_is_valid(d, i); i++ )
>>>>          (void)__evtchn_close(d, i);
>>>>  
>>>> +    if ( (d == current->domain) && d->evtchn_fifo )
>>>> +    {
>>>> +        /*
>>>> +         * Guest domain called EVTCHNOP_reset with DOMID_SELF, destroying
>>>> +         * FIFO event array and control blocks, resetting evtchn_port_ops 
> to
>>>> +         * evtchn_port_ops_2l.
>>>> +         */
>>>> +        evtchn_fifo_destroy(d);
>>>> +        evtchn_2l_init(d);
>>>
>>> You need to take d->event_lock around this if, or the guest could try to
>>> bind another event whilst the ABI is in an inconsistent state.
>> 
>> True, but then not just around this. Subsequent to any of the
>> __evtchn_close() invocations above, a port could also get
>> re-used (resulting in at least leaks). So I guess after taking the
>> lock there would also need to be a loop checking that all ports
>> are still closed (and return an error if they aren't).
> 
> I considered this but I think the only side effect would be losing a
> pending event, and it would be sufficient to document that guests should
> not bind events while calling EVTCHNOP_reset.

Hmm, indeed, with what 2-level and FIFO currently do, there
wouldn't appear to be any leak or other badness.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.