|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 2/8] xen: add using domlist_read_lock in keyhandlers
Using for_each_domain() with out holding the domlist_read_lock is
fragile, so add the lock in the keyhandlers it is missing.
Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
---
xen/arch/x86/mm/p2m-ept.c | 4 ++++
xen/arch/x86/time.c | 5 +++++
xen/common/grant_table.c | 7 +++++++
xen/drivers/passthrough/iommu.c | 5 +++++
4 files changed, 21 insertions(+)
diff --git a/xen/arch/x86/mm/p2m-ept.c b/xen/arch/x86/mm/p2m-ept.c
index d4defa01c2..eb0f0edfef 100644
--- a/xen/arch/x86/mm/p2m-ept.c
+++ b/xen/arch/x86/mm/p2m-ept.c
@@ -1297,6 +1297,8 @@ static void ept_dump_p2m_table(unsigned char key)
struct p2m_domain *p2m;
struct ept_data *ept;
+ rcu_read_lock(&domlist_read_lock);
+
for_each_domain(d)
{
if ( !hap_enabled(d) )
@@ -1347,6 +1349,8 @@ static void ept_dump_p2m_table(unsigned char key)
unmap_domain_page(table);
}
}
+
+ rcu_read_unlock(&domlist_read_lock);
}
void setup_ept_dump(void)
diff --git a/xen/arch/x86/time.c b/xen/arch/x86/time.c
index cf3e51fb5e..509679235d 100644
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -2401,6 +2401,9 @@ static void dump_softtsc(unsigned char key)
} else
printk("TSC not marked as either constant or reliable, "
"warp=%lu (count=%lu)\n", tsc_max_warp, tsc_check_count);
+
+ rcu_read_lock(&domlist_read_lock);
+
for_each_domain ( d )
{
if ( is_hardware_domain(d) && d->arch.tsc_mode == TSC_MODE_DEFAULT )
@@ -2417,6 +2420,8 @@ static void dump_softtsc(unsigned char key)
domcnt++;
}
+ rcu_read_unlock(&domlist_read_lock);
+
if ( !domcnt )
printk("No domains have emulated TSC\n");
}
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index 2ecf38dfbe..c793927cd6 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -4104,9 +4104,16 @@ static void gnttab_usage_print(struct domain *rd)
static void gnttab_usage_print_all(unsigned char key)
{
struct domain *d;
+
printk("%s [ key '%c' pressed\n", __func__, key);
+
+ rcu_read_lock(&domlist_read_lock);
+
for_each_domain ( d )
gnttab_usage_print(d);
+
+ rcu_read_unlock(&domlist_read_lock);
+
printk("%s ] done\n", __func__);
}
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
index 9d421e06de..cab7a068aa 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -591,6 +591,9 @@ static void iommu_dump_p2m_table(unsigned char key)
}
ops = iommu_get_ops();
+
+ rcu_read_lock(&domlist_read_lock);
+
for_each_domain(d)
{
if ( is_hardware_domain(d) || !is_iommu_enabled(d) )
@@ -605,6 +608,8 @@ static void iommu_dump_p2m_table(unsigned char key)
printk("\ndomain%d IOMMU p2m table: \n", d->domain_id);
ops->dump_p2m_table(d);
}
+
+ rcu_read_unlock(&domlist_read_lock);
}
/*
--
2.16.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |