[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [PATCH] fix stubdom memory corruption
- To: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
- From: Boris Derzhavets <bderzhavets@xxxxxxxxx>
- Date: Tue, 14 Apr 2009 05:28:29 -0700 (PDT)
- Cc:
- Delivery-date: Tue, 14 Apr 2009 05:29:02 -0700
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=CFWhTxP+1PzFXaUIo1oRiGNicwopVlwkH/sZiSmmkFVnQX99Fpmadmm8Pc+vEqYxSuxnFCV1zjaHO/bTCxA/wjyArGWtjAZVJy5Y+/ch9TCZy1h6wNIA541j0VgK2AgwdneCXZDAmanjSlBVVH1kHcDVszWAEq56xro5yvqW0TU=;
- List-id: Xen developer discussion <xen-devel.lists.xensource.com>
This one and vl.c patch have been applied. stubdom has been rebuilt and reinstalled. No improvement. Name ID Mem VCPUs State Time(s) Domain-0 0 7019 2 r-----
633.9 RHELhvm 1 1024 1 ------ 0.0 root@ServerXen331:/etc/xen# netstat -a|grep 590 tcp 0 0 *:5901 *:* LISTEN
Boris
--- On Tue, 4/14/09, Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> wrote:
From: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Subject: [Xen-devel] [PATCH] fix stubdom memory corruption To: "xen-devel" <xen-devel@xxxxxxxxxxxxxxxxxxx> Date: Tuesday, April 14, 2009, 5:27 AM
Hi all, this patch fixes a memory corruption in blkfront that happens every time we pass a sector aligned buffer (instead of a page aligned buffer) to blkfront_aio. To trigger the COW we have to write at least a byte to each page of the buffer, but we must be careful not to overwrite useful content.
Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
diff -r dbc4014882d0 extras/mini-os/blkfront.c --- a/extras/mini-os/blkfront.c Wed Apr 01 08:36:21 2009 +0100 +++ b/extras/mini-os/blkfront.c Tue Apr 14 10:18:30 2009 +0100 @@ -317,19 +317,21 @@ req->sector_number = aiocbp->aio_offset / dev->info.sector_size; for (j = 0; j <
n; j++) { + req->seg[j].first_sect = 0; + req->seg[j].last_sect = PAGE_SIZE / dev->info.sector_size - 1; + } + req->seg[0].first_sect = ((uintptr_t)aiocbp->aio_buf & ~PAGE_MASK) / dev->info.sector_size; + req->seg[n-1].last_sect = (((uintptr_t)aiocbp->aio_buf + aiocbp->aio_nbytes - 1) & ~PAGE_MASK) / dev->info.sector_size; + for (j = 0; j < n; j++) { uintptr_t data = "" + j * PAGE_SIZE; if (!write) { /* Trigger CoW if needed */ - *(char*)data = "">+ *(char*)(data + (req->seg[j].first_sect << 9)) = 0; barrier(); } aiocbp->gref[j] = req->seg[j].gref = gnttab_grant_access(dev->dom, virtual_to_mfn(data), write); - req->seg[j].first_sect = 0; - req->seg[j].last_sect = PAGE_SIZE / dev->info.sector_size - 1; } -
req->seg[0].first_sect = ((uintptr_t)aiocbp->aio_buf & ~PAGE_MASK) / dev->info.sector_size; - req->seg[n-1].last_sect = (((uintptr_t)aiocbp->aio_buf + aiocbp->aio_nbytes - 1) & ~PAGE_MASK) / dev->info.sector_size; dev->ring.req_prod_pvt = i + 1;
_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|