Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/uvm uvm: avoid a deadlock in uvm_map_clean()
details: https://anonhg.NetBSD.org/src/rev/2473e032118a
branches: trunk
changeset: 375325:2473e032118a
user: chs <chs%NetBSD.org@localhost>
date: Mon May 15 01:42:42 2023 +0000
description:
uvm: avoid a deadlock in uvm_map_clean()
The locking order between map locks and page "busy" locks
is that the page "busy" lock comes first, but uvm_map_clean()
breaks this rule by holding a map locked (as reader) while
waiting for page "busy" locks.
If another thread is in the page-fault path holding a page
"busy" lock while waiting for the map lock (as a reader)
and at the same time a third thread is blocked waiting for
the map lock as a writer (which blocks the page-fault thread),
then these three threads will all deadlock with each other.
Fix this by marking the map "busy" (to block any modifications)
and unlocking the map lock before possibly waiting for any
page "busy" locks.
Martin Pieuchot reported that the same problem existed in OpenBSD
he applied this fix there after several people tested it.
fixes PR 56952
diffstat:
sys/uvm/uvm_map.c | 25 +++++++++++++------------
1 files changed, 13 insertions(+), 12 deletions(-)
diffs (81 lines):
diff -r 629183b6098d -r 2473e032118a sys/uvm/uvm_map.c
--- a/sys/uvm/uvm_map.c Sun May 14 23:58:35 2023 +0000
+++ b/sys/uvm/uvm_map.c Mon May 15 01:42:42 2023 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: uvm_map.c,v 1.405 2023/03/24 07:26:21 skrll Exp $ */
+/* $NetBSD: uvm_map.c,v 1.406 2023/05/15 01:42:42 chs Exp $ */
/*
* Copyright (c) 1997 Charles D. Cranor and Washington University.
@@ -66,7 +66,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: uvm_map.c,v 1.405 2023/03/24 07:26:21 skrll Exp $");
+__KERNEL_RCSID(0, "$NetBSD: uvm_map.c,v 1.406 2023/05/15 01:42:42 chs Exp $");
#include "opt_ddb.h"
#include "opt_pax.h"
@@ -3887,8 +3887,7 @@ uvm_map_pageable_all(struct vm_map *map,
* => never a need to flush amap layer since the anonymous memory has
* no permanent home, but may deactivate pages there
* => called from sys_msync() and sys_madvise()
- * => caller must not write-lock map (read OK).
- * => we may sleep while cleaning if SYNCIO [with map read-locked]
+ * => caller must not have map locked
*/
int
@@ -3910,10 +3909,10 @@ uvm_map_clean(struct vm_map *map, vaddr_
KASSERT((flags & (PGO_FREE|PGO_DEACTIVATE)) !=
(PGO_FREE|PGO_DEACTIVATE));
- vm_map_lock_read(map);
+ vm_map_lock(map);
VM_MAP_RANGE_CHECK(map, start, end);
- if (uvm_map_lookup_entry(map, start, &entry) == false) {
- vm_map_unlock_read(map);
+ if (!uvm_map_lookup_entry(map, start, &entry)) {
+ vm_map_unlock(map);
return EFAULT;
}
@@ -3923,22 +3922,24 @@ uvm_map_clean(struct vm_map *map, vaddr_
for (current = entry; current->start < end; current = current->next) {
if (UVM_ET_ISSUBMAP(current)) {
- vm_map_unlock_read(map);
+ vm_map_unlock(map);
return EINVAL;
}
if ((flags & PGO_FREE) != 0 && VM_MAPENT_ISWIRED(entry)) {
- vm_map_unlock_read(map);
+ vm_map_unlock(map);
return EBUSY;
}
if (end <= current->end) {
break;
}
if (current->end != current->next->start) {
- vm_map_unlock_read(map);
+ vm_map_unlock(map);
return EFAULT;
}
}
+ vm_map_busy(map);
+ vm_map_unlock(map);
error = 0;
for (current = entry; start < end; current = current->next) {
amap = current->aref.ar_amap; /* upper layer */
@@ -4044,8 +4045,8 @@ uvm_map_clean(struct vm_map *map, vaddr_
}
start += size;
}
- vm_map_unlock_read(map);
- return (error);
+ vm_map_unbusy(map);
+ return error;
}
Home |
Main Index |
Thread Index |
Old Index