[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v5 07/10] xen/blkback: pseudo support for multi hardware queues/rings



> @@ -113,19 +115,55 @@ static void xen_update_blkif_status(struct xen_blkif 
> *blkif)
>       }
>       invalidate_inode_pages2(blkif->vbd.bdev->bd_inode->i_mapping);
>  
> -     blkif->ring.xenblkd = kthread_run(xen_blkif_schedule, &blkif->ring, 
> "%s", name);
> -     if (IS_ERR(blkif->ring.xenblkd)) {
> -             err = PTR_ERR(blkif->ring.xenblkd);
> -             blkif->ring.xenblkd = NULL;
> -             xenbus_dev_error(blkif->be->dev, err, "start xenblkd");
> -             return;
> +     for (i = 0; i < blkif->nr_rings; i++) {
> +             ring = &blkif->rings[i];
> +             ring->xenblkd = kthread_run(xen_blkif_schedule, ring, "%s-%d", 
> name, i);
> +             if (IS_ERR(ring->xenblkd)) {
> +                     err = PTR_ERR(ring->xenblkd);
> +                     ring->xenblkd = NULL;
> +                     xenbus_dev_fatal(blkif->be->dev, err,
> +                                     "start %s-%d xenblkd", name, i);
> +                     goto out;
> +             }
> +     }
> +     return;
> +
> +out:
> +     while (--i >= 0) {
> +             ring = &blkif->rings[i];
> +             kthread_stop(ring->xenblkd);

That won't work. Imagine us failing at the start of the loop above, 
so i==0. We get here and decrement and unsigned int by one, and loop
back to 0xffffffffff. Naturally 0xffff.. >= 0 so we will just continue
one going over the blkif->rings[0xffffff].. and BOOM!

This worked when 'i' was 'int', but now it is unsigned int.

Let me make it 'int' and then this works, or we can swap
the loop around and use 'i-1' to use the previous entry.

[Fixed it up in my tree]
>       }
> +     return;
> +}
> +
.. snip..
> +static int connect_ring(struct backend_info *be)
> +{
> +     struct xenbus_device *dev = be->dev;
> +     unsigned int pers_grants;
> +     char protocol[64] = "";
> +     int err, i;
> +     char *xspath;
> +     size_t xspathsize;
> +     const size_t xenstore_path_ext_size = 11; /* sufficient for 
> "/queue-NNN" */
> +
> +     pr_debug("%s %s\n", __func__, dev->otherend);
> +
> +     be->blkif->blk_protocol = BLKIF_PROTOCOL_DEFAULT;
> +     err = xenbus_gather(XBT_NIL, dev->otherend, "protocol",
> +                         "%63s", protocol, NULL);
> +     if (err)
> +             strcpy(protocol, "unspecified, assuming default");
> +     else if (0 == strcmp(protocol, XEN_IO_PROTO_ABI_NATIVE))
> +             be->blkif->blk_protocol = BLKIF_PROTOCOL_NATIVE;
> +     else if (0 == strcmp(protocol, XEN_IO_PROTO_ABI_X86_32))
> +             be->blkif->blk_protocol = BLKIF_PROTOCOL_X86_32;
> +     else if (0 == strcmp(protocol, XEN_IO_PROTO_ABI_X86_64))
> +             be->blkif->blk_protocol = BLKIF_PROTOCOL_X86_64;
> +     else {
> +             xenbus_dev_fatal(dev, err, "unknown fe protocol %s", protocol);
> +             return -1;
> +     }
> +     err = xenbus_gather(XBT_NIL, dev->otherend,
> +                         "feature-persistent", "%u",
> +                         &pers_grants, NULL);
> +     if (err)
> +             pers_grants = 0;
> +
> +     be->blkif->vbd.feature_gnt_persistent = pers_grants;
> +     be->blkif->vbd.overflow_max_grants = 0;
> +
> +     pr_info("%s: using %d queues, protocol %d (%s) %s\n", dev->nodename,
> +              be->blkif->nr_rings, be->blkif->blk_protocol, protocol,
> +              pers_grants ? "persistent grants" : "");
> +
> +     if (be->blkif->nr_rings == 1)
> +             return read_per_ring_refs(&be->blkif->rings[0], dev->otherend);
> +     else {
> +             xspathsize = strlen(dev->otherend) + xenstore_path_ext_size;
> +             xspath = kmalloc(xspathsize, GFP_KERNEL);
> +             if (!xspath) {
> +                     xenbus_dev_fatal(dev, -ENOMEM, "reading ring 
> references");
> +                     return -ENOMEM;
> +             }
> +
> +             for (i = 0; i < be->blkif->nr_rings; i++) {
> +                     memset(xspath, 0, xspathsize);
> +                     snprintf(xspath, xspathsize, "%s/queue-%u", 
> dev->otherend, i);
> +                     err = read_per_ring_refs(&be->blkif->rings[i], xspath);

Say nr_rings is 4 and this fails at the last one. That means
be->blkif->rings[0..2].pending_free has a bunch of pages and
also ring->blk_ring are set. We return out of this function
and end back in (frontend_changed):
 752                 err = connect_ring(be);
 753                 if (err)
 754                         break;

Great. So we have a memory leak until the device goes in
XenbusStateConnected (where we end up calling xen_blkif_disconnect
and free ring[0..2]..

But that may take a while if the guest is not nice. Perhaps we should
add in  frontend_changed(..) an call to xen_blkif_disconnect in case
we fail at 'connect_ring' to clear the memory faster. I will prep a
patch for that.

> +                     if (err) {
> +                             kfree(xspath);
> +                             return err;
> +                     }
> +             }
> +             kfree(xspath);
> +     }
> +     return 0;
>  }
>  
>  static const struct xenbus_device_id xen_blkbk_ids[] = {
> -- 
> 1.7.10.4
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.