[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH for-4.12 V5 1/2] altp2m: Prevent deadlocks when a domain performs altp2m operations on itself



>>> On 15.02.19 at 16:41, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
> domain_pause_except_self() was introduced to allow a domain to pause
> itself while doing altp2m operations.  However, as written, it has a
> risk fo deadlock if two vcpus enter the loop at the same time.
> 
> Luckily, there's already a solution for this: Attempt to call domain's
> hypercall_deadlock_mutex, and restart the entire hypercall if you
> fail.
> 
> Make domain_pause_except_self() attempt to grab this mutex when
> pausing itself, returning -ERESTART if it fails.  Have the callers
> check for errors and pass the value up.  In both cases, the top-level
> do_hvm_op() should DTRT when -ERESTART is returned.
> 
> The (necessary) reuse of the hypercall deadlock mutex poses the risk
> of getting called from a context where the lock was already acquired
> (e.g. someone may (say) call domctl_lock(), then afterwards call
> domain_pause_except_self()). However, in the interest of not
> overcomplicating things, no changes are made here to the mutex.
> Attempted nesting of this lock isn't a security issue, because all
> that will happen is that the vcpu will livelock taking continuations.
> 
> Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
> Tested-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>

Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

> ---
> Release exception justification:
> - Fixes a bug in the current code
> - Lays the foundation of another fix
> - Only affects altp2m, which isn't a supported feature

Cc-ing Jürgen for this reason.

Jan

> NB two possible further improvements to put on the list for 4.13:
>  - Replace send-interrupt-and-wait-for-each-one loop with
>    hvmop_flush_tlb_all()'s more efficient
>    send-all-the-interrupts-then-wait loop.
>  - Modify hvmop_flush_tlb_all() to use domain_pause_except_self() to
>    avoid code duplication
> ---
> CC: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
> CC: Jan Beulich <jbeulich@xxxxxxxx>
> CC: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> CC: Wei Liu <wei.liu2@xxxxxxxxxx>
> CC: "Roger Pau Monné" <roger.pau@xxxxxxxxxx>
> CC: George Dunlap <George.Dunlap@xxxxxxxxxxxxx>
> CC: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
> CC: Julien Grall <julien.grall@xxxxxxx>
> CC: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
> CC: Stefano Stabellini <sstabellini@xxxxxxxxxx>
> CC: Tim Deegan <tim@xxxxxxx>
> ---
>  xen/arch/x86/mm/p2m.c   | 10 ++++++++--
>  xen/common/domain.c     |  8 +++++++-
>  xen/include/xen/sched.h |  2 +-
>  3 files changed, 16 insertions(+), 4 deletions(-)
> 
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index d14ce57..7232dbf 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -2530,8 +2530,11 @@ int p2m_destroy_altp2m_by_id(struct domain *d, 
> unsigned int idx)
>      if ( !idx || idx >= MAX_ALTP2M )
>          return rc;
>  
> -    domain_pause_except_self(d);
> +    rc = domain_pause_except_self(d);
> +    if ( rc )
> +        return rc;
>  
> +    rc = -EBUSY;
>      altp2m_list_lock(d);
>  
>      if ( d->arch.altp2m_eptp[idx] != mfn_x(INVALID_MFN) )
> @@ -2561,8 +2564,11 @@ int p2m_switch_domain_altp2m_by_id(struct domain *d, 
> unsigned int idx)
>      if ( idx >= MAX_ALTP2M )
>          return rc;
>  
> -    domain_pause_except_self(d);
> +    rc = domain_pause_except_self(d);
> +    if ( rc )
> +        return rc;
>  
> +    rc = -EINVAL;
>      altp2m_list_lock(d);
>  
>      if ( d->arch.altp2m_eptp[idx] != mfn_x(INVALID_MFN) )
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index 7470cd9..32bca8d 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -1134,18 +1134,24 @@ int domain_unpause_by_systemcontroller(struct domain 
> *d)
>      return 0;
>  }
>  
> -void domain_pause_except_self(struct domain *d)
> +int domain_pause_except_self(struct domain *d)
>  {
>      struct vcpu *v, *curr = current;
>  
>      if ( curr->domain == d )
>      {
> +        /* Avoid racing with other vcpus which may want to be pausing us */
> +        if ( !spin_trylock(&d->hypercall_deadlock_mutex) )
> +            return -ERESTART;
>          for_each_vcpu( d, v )
>              if ( likely(v != curr) )
>                  vcpu_pause(v);
> +        spin_unlock(&d->hypercall_deadlock_mutex);
>      }
>      else
>          domain_pause(d);
> +
> +    return 0;
>  }
>  
>  void domain_unpause_except_self(struct domain *d)
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index d633e1d..edee52d 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -839,7 +839,7 @@ static inline int 
> domain_pause_by_systemcontroller_nosync(struct domain *d)
>  }
>  
>  /* domain_pause() but safe against trying to pause current. */
> -void domain_pause_except_self(struct domain *d);
> +int __must_check domain_pause_except_self(struct domain *d);
>  void domain_unpause_except_self(struct domain *d);
>  
>  /*
> -- 
> 2.7.4




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.