[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH] xmalloc: add support for checking the pool integrity


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Mihai DonÈu <mdontu@xxxxxxxxxxxxxxx>
  • Date: Thu, 4 Dec 2014 19:01:40 +0200
  • Cc: Mihai DonÈu <mdontu@xxxxxxxxxxxxxxx>
  • Comment: DomainKeys? See http://domainkeys.sourceforge.net/
  • Delivery-date: Thu, 04 Dec 2014 17:02:12 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bitdefender.com; b=Svm+YhdyIE8eMYJ8SXxYEC9PH+3m45Qbq9kk7of34fZbIBQJvev6fQbqnbu5Pk1GvL9VuhkOqGjUJffYZhrOT61RMI07J+WweeTaa3AeOqVnPHlhLRHjd89tlZFRKsBXMZOOQkO2CHKnZu/rRncXGv+IEZxAAN7p0uK7sUTA0BKOLNh2p+cgpzCQqQey+FGFlu7EVeWFeKBwDXMAYNUTuu9bTm4AVyZEVQLvp53cYSPG1gUPE/mnODIEEd1g+nxB/oHPVFs5Gj4v9EfaTimX8vhaAX+LuXp7YIHGkr1A4CiFcCOtz8H/CZf5zriDvLq6c5fz9BDUkHj2iRu4/u4hZg==; h=Received:Received:Received:Received:Received:From:To:Cc:Subject:Date:Message-Id:X-Mailer:MIME-Version:Content-Type:Content-Transfer-Encoding:X-BitDefender-Scanner:X-BitDefender-Spam:X-BitDefender-SpamStamp:X-BitDefender-CF-Stamp;
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

Implemented xmem_pool_check(), xmem_pool_check_locked() and
xmem_pool_check_unlocked() to verity the integrity of the TLSF matrix.

Signed-off-by: Mihai DonÈu <mdontu@xxxxxxxxxxxxxxx>
---
 xen/common/xmalloc_tlsf.c | 119 +++++++++++++++++++++++++++++++++++++++++++++-
 xen/include/xen/xmalloc.h |   7 +++
 2 files changed, 124 insertions(+), 2 deletions(-)

diff --git a/xen/common/xmalloc_tlsf.c b/xen/common/xmalloc_tlsf.c
index a5769c9..009ba60 100644
--- a/xen/common/xmalloc_tlsf.c
+++ b/xen/common/xmalloc_tlsf.c
@@ -120,9 +120,120 @@ struct xmem_pool {
     char name[MAX_POOL_NAME_LEN];
 };
 
+static struct xmem_pool *xenpool;
+
+static inline void MAPPING_INSERT(unsigned long r, int *fl, int *sl);
+
 /*
  * Helping functions
  */
+#ifndef NDEBUG
+static int xmem_pool_check_size(const struct bhdr *b, int fl, int sl)
+{
+    while ( b )
+    {
+        int __fl;
+        int __sl;
+
+        MAPPING_INSERT(b->size, &__fl, &__sl);
+        if ( __fl != fl || __sl != sl )
+        {
+            printk(XENLOG_ERR "xmem_pool: for block %p size = %u, { fl = %d, 
sl = %d } should be { fl = %d, sl = %d }\n", b, b->size, fl, sl, __fl, __sl);
+            return 0;
+        }
+        b = b->ptr.free_ptr.next;
+    }
+    return 1;
+}
+
+/*
+ * This function must be called from a context where pool->lock is
+ * already acquired
+ */
+#define xmem_pool_check_unlocked(__pool) __xmem_pool_check_unlocked(__FILE__, 
__LINE__, __pool)
+static int __xmem_pool_check_unlocked(const char *file, int line, const struct 
xmem_pool *pool)
+{
+    int i;
+    int woops = 0;
+    static int once = 1;
+
+    for ( i = 0; i < REAL_FLI; i++ )
+    {
+        int fl = ( pool->fl_bitmap & (1 << i) ) ? i : -1;
+
+        if ( fl >= 0 )
+        {
+            int j;
+            int bitmap_empty = 1;
+            int matrix_empty = 1;
+
+            for ( j = 0; j < MAX_SLI; j++ )
+            {
+                int sl = ( pool->sl_bitmap[fl] & (1 << j) ) ? j : -1;
+
+                if ( sl < 0 )
+                    continue;
+
+                if ( once && !pool->matrix[fl][sl] )
+                {
+                    /* The bitmap is corrupted */
+                    printk(XENLOG_ERR "xmem_pool:%s:%d the TLSF bitmap is 
corrupted\n", file, line);
+                    __warn((char *)file, line);
+                    once = 0;
+                    woops = 1;
+                }
+                else if ( once && !xmem_pool_check_size(pool->matrix[fl][sl], 
fl, sl))
+                {
+                    printk(XENLOG_ERR "xmem_pool:%s:%d the TLSF chunk matrix 
is corrupted\n", file, line);
+                    __warn((char *)file, line);
+                    once = 0;
+                    woops = 1;
+                }
+                if ( pool->matrix[fl][sl] )
+                    matrix_empty = 0;
+                bitmap_empty = 0;
+            }
+            if ( once && bitmap_empty )
+            {
+                /* The bitmap is corrupted */
+                printk(XENLOG_ERR "xmem_pool:%s:%d the TLSF bitmap is 
corrupted (non-empty FL with empty SL)\n", file, line);
+                __warn((char *)file, line);
+                once = 0;
+                woops = 1;
+            }
+            if ( once && matrix_empty )
+            {
+                /* The bitmap is corrupted */
+                printk(XENLOG_ERR "xmem_pool:%s:%d the TLSF bitmap is 
corrupted (empty matrix)\n", file, line);
+                __warn((char *)file, line);
+                once = 0;
+                woops = 1;
+            }
+        }
+    }
+
+    return woops;
+}
+
+#define xmem_pool_check_locked(__pool) __xmem_pool_check_locked(__FILE__, 
__LINE__, __pool)
+static int __xmem_pool_check_locked(const char *file, int line, struct 
xmem_pool *pool)
+{
+    int err;
+
+    spin_lock(&pool->lock);
+    err = __xmem_pool_check_unlocked(file, line, pool);
+    spin_unlock(&pool->lock);
+    return err;
+}
+
+int __xmem_pool_check(const char *file, int line)
+{
+    return __xmem_pool_check_locked(file, line, xenpool);
+}
+#else
+#define xmem_pool_check_locked(__pool) do { if ( 0 && (__pool) ); } while (0)
+#define xmem_pool_check_unlocked(__pool) do { if ( 0 && (__pool) ); } while (0)
+#endif
 
 /**
  * Returns indexes (fl, sl) of the list used to serve request of size r
@@ -381,6 +492,8 @@ void *xmem_pool_alloc(unsigned long size, struct xmem_pool 
*pool)
     int fl, sl;
     unsigned long tmp_size;
 
+    xmem_pool_check_locked(pool);
+
     if ( pool->init_region == NULL )
     {
         if ( (region = pool->get_mem(pool->init_size)) == NULL )
@@ -442,11 +555,13 @@ void *xmem_pool_alloc(unsigned long size, struct 
xmem_pool *pool)
 
     pool->used_size += (b->size & BLOCK_SIZE_MASK) + BHDR_OVERHEAD;
 
+    xmem_pool_check_unlocked(pool);
     spin_unlock(&pool->lock);
     return (void *)b->ptr.buffer;
 
     /* Failed alloc */
  out_locked:
+    xmem_pool_check_unlocked(pool);
     spin_unlock(&pool->lock);
 
  out:
@@ -464,6 +579,7 @@ void xmem_pool_free(void *ptr, struct xmem_pool *pool)
     b = (struct bhdr *)((char *) ptr - BHDR_OVERHEAD);
 
     spin_lock(&pool->lock);
+    xmem_pool_check_unlocked(pool);
     b->size |= FREE_BLOCK;
     pool->used_size -= (b->size & BLOCK_SIZE_MASK) + BHDR_OVERHEAD;
     b->ptr.free_ptr = (struct free_ptr) { NULL, NULL};
@@ -500,6 +616,7 @@ void xmem_pool_free(void *ptr, struct xmem_pool *pool)
     tmp_b->size |= PREV_FREE;
     tmp_b->prev_hdr = b;
  out:
+    xmem_pool_check_unlocked(pool);
     spin_unlock(&pool->lock);
 }
 
@@ -512,8 +629,6 @@ int xmem_pool_maxalloc(struct xmem_pool *pool)
  * Glue for xmalloc().
  */
 
-static struct xmem_pool *xenpool;
-
 static void *xmalloc_pool_get(unsigned long size)
 {
     ASSERT(size == PAGE_SIZE);
diff --git a/xen/include/xen/xmalloc.h b/xen/include/xen/xmalloc.h
index 24a99ac..626ead0 100644
--- a/xen/include/xen/xmalloc.h
+++ b/xen/include/xen/xmalloc.h
@@ -123,4 +123,11 @@ unsigned long xmem_pool_get_used_size(struct xmem_pool 
*pool);
  */
 unsigned long xmem_pool_get_total_size(struct xmem_pool *pool);
 
+#ifndef NDEBUG
+#define xmem_pool_check() __xmem_pool_check(__FILE__, __LINE__)
+int __xmem_pool_check(const char *file, int line);
+#else
+#define xmem_pool_check() do { if ( 0 ); } while (0)
+#endif
+
 #endif /* __XMALLOC_H__ */
-- 
2.2.0


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.