WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [PATCH 1/7] xen-gntdev: Fix circular locking dependency

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [PATCH 1/7] xen-gntdev: Fix circular locking dependency
From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date: Thu, 16 Dec 2010 19:17:37 -0500
Cc: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>, jeremy@xxxxxxxx, Ian.Campbell@xxxxxxxxxx
Delivery-date: Thu, 16 Dec 2010 16:19:04 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <1292545063-32107-1-git-send-email-dgdegra@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <1292545063-32107-1-git-send-email-dgdegra@xxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
apply_to_page_range will acquire PTE lock while priv->lock is held,
and mn_invl_range_start tries to acquire priv->lock with PTE already
held.  Fix by not holding priv->lock during the entire map operation.
This is safe because map->vma is set nonzero while the lock is held,
which will cause subsequent maps to fail and will cause the unmap
ioctl (and other users of gntdev_del_map) to return -EBUSY until the
area is unmapped. It is similarly impossible for gntdev_vma_close to
be called while the vma is still being created.

Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
---
 drivers/xen/gntdev.c |   19 +++++++++----------
 1 files changed, 9 insertions(+), 10 deletions(-)

diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
index 35de6bb..387c5f1 100644
--- a/drivers/xen/gntdev.c
+++ b/drivers/xen/gntdev.c
@@ -608,23 +608,22 @@ static int gntdev_mmap(struct file *flip, struct 
vm_area_struct *vma)
        if (!(vma->vm_flags & VM_WRITE))
                map->flags |= GNTMAP_readonly;
 
+       spin_unlock(&priv->lock);
+
        err = apply_to_page_range(vma->vm_mm, vma->vm_start,
                                  vma->vm_end - vma->vm_start,
                                  find_grant_ptes, map);
-       if (err) {
-               goto unlock_out;
-               if (debug)
-                       printk("%s: find_grant_ptes() failure.\n", 
__FUNCTION__);
-       }
+       if (err)
+               return err;
 
        err = map_grant_pages(map);
-       if (err) {
-               goto unlock_out;
-               if (debug)
-                       printk("%s: map_grant_pages() failure.\n", 
__FUNCTION__);
-       }
+       if (err)
+               return err;
+
        map->is_mapped = 1;
 
+       return 0;
+
 unlock_out:
        spin_unlock(&priv->lock);
        return err;
-- 
1.7.2.3


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel