|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 1/5] x86/mem_sharing: reorder when pages are unlocked and released
On Thu, Jul 18, 2019 at 4:47 AM Jan Beulich <JBeulich@xxxxxxxx> wrote:
>
> On 17.07.2019 21:33, Tamas K Lengyel wrote:
> > Calling _put_page_type while also holding the page_lock
> > for that page can cause a deadlock.
> >
> > The comment being dropped is incorrect since it's now out-of-date.
> >
> > Signed-off-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
>
> The description covers ...
>
> > --- a/xen/arch/x86/mm/mem_sharing.c
> > +++ b/xen/arch/x86/mm/mem_sharing.c
> > @@ -648,10 +648,6 @@ static int page_make_private(struct domain *d, struct
> > page_info *page)
> > return -EBUSY;
> > }
> >
> > - /* We can only change the type if count is one */
> > - /* Because we are locking pages individually, we need to drop
> > - * the lock here, while the page is typed. We cannot risk the
> > - * race of page_unlock and then put_page_type. */
> > expected_type = (PGT_shared_page | PGT_validated | PGT_locked | 2);
> > if ( page->u.inuse.type_info != expected_type )
> > {
> > @@ -660,12 +656,11 @@ static int page_make_private(struct domain *d, struct
> > page_info *page)
> > return -EEXIST;
> > }
> >
> > + mem_sharing_page_unlock(page);
> > +
> > /* Drop the final typecount */
> > put_page_and_type(page);
> >
> > - /* Now that we've dropped the type, we can unlock */
> > - mem_sharing_page_unlock(page);
> > -
> > /* Change the owner */
> > ASSERT(page_get_owner(page) == dom_cow);
> > page_set_owner(page, d);
>
> all of the above. But what about ...
>
> > @@ -900,6 +895,7 @@ static int share_pages(struct domain *sd, gfn_t sgfn,
> > shr_handle_t sh,
> > p2m_type_t smfn_type, cmfn_type;
> > struct two_gfns tg;
> > struct rmap_iterator ri;
> > + unsigned long put_count = 0;
> >
> > get_two_gfns(sd, sgfn, &smfn_type, NULL, &smfn,
> > cd, cgfn, &cmfn_type, NULL, &cmfn, 0, &tg);
> > @@ -964,15 +960,6 @@ static int share_pages(struct domain *sd, gfn_t sgfn,
> > shr_handle_t sh,
> > goto err_out;
> > }
> >
> > - /* Acquire an extra reference, for the freeing below to be safe. */
> > - if ( !get_page(cpage, dom_cow) )
> > - {
> > - ret = -EOVERFLOW;
> > - mem_sharing_page_unlock(secondpg);
> > - mem_sharing_page_unlock(firstpg);
> > - goto err_out;
> > - }
> > -
> > /* Merge the lists together */
> > rmap_seed_iterator(cpage, &ri);
> > while ( (gfn = rmap_iterate(cpage, &ri)) != NULL)
> > @@ -984,13 +971,14 @@ static int share_pages(struct domain *sd, gfn_t sgfn,
> > shr_handle_t sh,
> > * Don't change the type of rmap for the client page. */
> > rmap_del(gfn, cpage, 0);
> > rmap_add(gfn, spage);
> > - put_page_and_type(cpage);
> > + put_count++;
> > d = get_domain_by_id(gfn->domain);
> > BUG_ON(!d);
> > BUG_ON(set_shared_p2m_entry(d, gfn->gfn, smfn));
> > put_domain(d);
> > }
> > ASSERT(list_empty(&cpage->sharing->gfns));
> > + BUG_ON(!put_count);
> >
> > /* Clear the rest of the shared state */
> > page_sharing_dispose(cpage);
> > @@ -1001,7 +989,9 @@ static int share_pages(struct domain *sd, gfn_t sgfn,
> > shr_handle_t sh,
> >
> > /* Free the client page */
> > put_page_alloc_ref(cpage);
> > - put_page(cpage);
> > +
> > + while ( put_count-- )
> > + put_page_and_type(cpage);
> >
> > /* We managed to free a domain page. */
> > atomic_dec(&nr_shared_mfns);
> > @@ -1165,19 +1155,13 @@ int __mem_sharing_unshare_page(struct domain *d,
> > {
> > if ( !last_gfn )
> > mem_sharing_gfn_destroy(page, d, gfn_info);
> > - put_page_and_type(page);
> > +
> > mem_sharing_page_unlock(page);
> > +
> > if ( last_gfn )
> > - {
> > - if ( !get_page(page, dom_cow) )
> > - {
> > - put_gfn(d, gfn);
> > - domain_crash(d);
> > - return -EOVERFLOW;
> > - }
> > put_page_alloc_ref(page);
> > - put_page(page);
> > - }
> > +
> > + put_page_and_type(page);
> > put_gfn(d, gfn);
> >
> > return 0;
>
> ... this (main, as I guess by the title) part of the change? I think
> you want to explain what was wrong here and/or why the new arrangement
> is better. (I'm sorry, I guess it was this way on prior versions
> already, but apparently I didn't notice.)
It's what the patch message says - calling put_page_and_type before
mem_sharing_page_unlock can cause a deadlock. Since now we are now
holding a reference to the page till the end there is no need for the
extra get_page/put_page logic when we are dealing with the last_gfn.
Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |