[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 2/2] x86/mm: fix a potential race condition in modify_xen_mappings().
>>> On 10.11.17 at 08:18, <yu.c.zhang@xxxxxxxxxxxxxxx> wrote: > --- a/xen/arch/x86/mm.c > +++ b/xen/arch/x86/mm.c > @@ -5097,6 +5097,17 @@ int modify_xen_mappings(unsigned long s, unsigned long > e, unsigned int nf) > */ > if ( (nf & _PAGE_PRESENT) || ((v != e) && (l1_table_offset(v) != > 0)) ) > continue; > + if ( locking ) > + spin_lock(&map_pgdir_lock); > + > + /* L2E may be cleared on another CPU. */ > + if ( !(l2e_get_flags(*pl2e) & _PAGE_PRESENT) ) I think you also need a PSE check here, or else the l2e_to_l1e() below may be illegal. > @@ -5105,11 +5116,16 @@ int modify_xen_mappings(unsigned long s, unsigned > long e, unsigned int nf) > { > /* Empty: zap the L2E and free the L1 page. */ > l2e_write_atomic(pl2e, l2e_empty()); > + if ( locking ) > + spin_unlock(&map_pgdir_lock); > flush_area(NULL, FLUSH_TLB_GLOBAL); /* flush before free */ > free_xen_pagetable(pl1e); > } > + else if ( locking ) > + spin_unlock(&map_pgdir_lock); > } > > +check_l3: Labels indented by at least one space please. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |