[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2] xen/mm: Avoid assuming the page is inuse in assign_pages()
From: Julien Grall <jgrall@xxxxxxxxxx> At the moment, assign_pages() on the page to be inuse (PGC_state_inuse) and the state value to be 0. However, the code may race with the page offlining code (see offline_page()). Depending on the ordering, the page may be in offlining state (PGC_state_offlining) before it is assigned to a domain. On debug build, this may result to hit the assert or just clobber the state. On non-debug build, the state will get clobbered. Incidentally the flag PGC_broken will get clobbered as well. Grab the heap_lock to prevent a race with offline_page() and keep the state and broken flag around. Signed-off-by: Julien Grall <jgrall@xxxxxxxxxx> --- Changes in v2: - Superseed <20200204133357.32101-1-julien@xxxxxxx> - Fix the race with offline_page() --- xen/common/page_alloc.c | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index 97902d42c1..a684dbf37c 100644 --- a/xen/common/page_alloc.c +++ b/xen/common/page_alloc.c @@ -2283,15 +2283,27 @@ int assign_pages( get_knownalive_domain(d); } + spin_lock(&heap_lock); for ( i = 0; i < (1 << order); i++ ) { + /* + * We should only be here if the page is inuse or offlining. + * The latter happen if we race with mark_page_offline() as we + * don't hold the heap_lock. + */ + ASSERT(page_state_is(&pg[i], inuse) || + page_state_is(&pg[i], offlining)); + ASSERT(!(pg[i].count_info & ~(PGC_state | PGC_broken))); ASSERT(page_get_owner(&pg[i]) == NULL); - ASSERT(!pg[i].count_info); page_set_owner(&pg[i], d); smp_wmb(); /* Domain pointer must be visible before updating refcnt. */ - pg[i].count_info = PGC_allocated | 1; + + pg[i].count_info &= PGC_state | PGC_broken; + pg[i].count_info |= PGC_allocated | 1; + page_list_add_tail(&pg[i], &d->page_list); } + spin_unlock(&heap_lock); out: spin_unlock(&d->page_alloc_lock); -- 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |