[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120815144019.GH3068@redhat.com>
Date: Wed, 15 Aug 2012 17:40:19 +0300
From: "Michael S. Tsirkin" <mst@...hat.com>
To: Rafael Aquini <aquini@...hat.com>
Cc: Rusty Russell <rusty@...tcorp.com.au>, linux-mm@...ck.org,
linux-kernel@...r.kernel.org,
virtualization@...ts.linux-foundation.org,
Rik van Riel <riel@...hat.com>, Mel Gorman <mel@....ul.ie>,
Andi Kleen <andi@...stfloor.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>,
Minchan Kim <minchan@...nel.org>
Subject: Re: [PATCH v7 2/4] virtio_balloon: introduce migration primitives to
balloon pages
On Wed, Aug 15, 2012 at 09:34:58AM -0300, Rafael Aquini wrote:
> On Tue, Aug 14, 2012 at 10:31:09PM +0300, Michael S. Tsirkin wrote:
> > > > now CPU1 executes the next instruction:
> > > >
> > > > }
> > > >
> > > > which would normally return to function's caller,
> > > > but it has been overwritten by CPU2 so we get corruption.
> > > >
> > > > No?
> > >
> > > At the point CPU2 is unloading the module, it will be kept looping at the
> > > snippet Rusty pointed out because the isolation / migration steps do not mess
> > > with 'vb->num_pages'. The driver will only unload after leaking the total amount
> > > of balloon's inflated pages, which means (for this hypothetical case) CPU2 will
> > > wait until CPU1 finishes the putaback procedure.
> > >
> >
> > Yes but only until unlock finishes. The last return from function
> > is not guarded and can be overwritten.
>
> CPU1 will be returning to putback_balloon_page() which code is located at core
> mm/compaction.c, outside the driver.
Sorry, I don't seem to be able to articulate this clearly.
But this is a correctness issue so I am compelled to try again.
Here is some pseudo code:
int pages_lock;
void virtballoon_isolatepage(void *page, unsigned long mode)
{
pages_lock = 0;
}
assignment of 0 emulates spin unlock.
I removed all other content. Now look at disassembly:
080483d0 <virtballoon_isolatepage>:
virtballoon_isolatepage():
80483d0: c7 05 88 96 04 08 00 movl $0x0,0x8049688
80483d7: 00 00 00
<----------- Above is "spin unlock"
80483da: c3 ret
^^^^
Here we are still executing module code (one instruction of it!)
after we have dropped the lock.
So if module goes away at the point marked by <--------
above (and nothing seems to prevent that,
since pages_lock is unlocked), the last instruction can get overwritten
and then random code will get executed instead.
In the end the rule is simple: you can not
prevent module unloading from within module
itself. It always must be the caller of your
module that uses some lock to do this.
My proposal is to use rcu for this since it is lightweight
and also does not require us to pass extra
state around.
--
MST
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists