Module Name: src
Committed By: martin
Date: Mon May 15 10:32:53 UTC 2023
Modified Files:
src/sys/uvm [netbsd-10]: uvm_map.c
Log Message:
Pull up following revision(s) (requested by chs in ticket #167):
sys/uvm/uvm_map.c: revision 1.406
uvm: avoid a deadlock in uvm_map_clean()
The locking order between map locks and page "busy" locks
is that the page "busy" lock comes first, but uvm_map_clean()
breaks this rule by holding a map locked (as reader) while
waiting for page "busy" locks.
If another thread is in the page-fault path holding a page
"busy" lock while waiting for the map lock (as a reader)
and at the same time a third thread is blocked waiting for
the map lock as a writer (which blocks the page-fault thread),
then these three threads will all deadlock with each other.
Fix this by marking the map "busy" (to block any modifications)
and unlocking the map lock before possibly waiting for any
page "busy" locks.
Martin Pieuchot reported that the same problem existed in OpenBSD
he applied this fix there after several people tested it.
fixes PR 56952
To generate a diff of this commit:
cvs rdiff -u -r1.403 -r1.403.2.1 src/sys/uvm/uvm_map.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/sys/uvm/uvm_map.c
diff -u src/sys/uvm/uvm_map.c:1.403 src/sys/uvm/uvm_map.c:1.403.2.1
--- src/sys/uvm/uvm_map.c:1.403 Wed Nov 23 23:53:53 2022
+++ src/sys/uvm/uvm_map.c Mon May 15 10:32:53 2023
@@ -1,4 +1,4 @@
-/* $NetBSD: uvm_map.c,v 1.403 2022/11/23 23:53:53 riastradh Exp $ */
+/* $NetBSD: uvm_map.c,v 1.403.2.1 2023/05/15 10:32:53 martin Exp $ */
/*
* Copyright (c) 1997 Charles D. Cranor and Washington University.
@@ -66,7 +66,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: uvm_map.c,v 1.403 2022/11/23 23:53:53 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: uvm_map.c,v 1.403.2.1 2023/05/15 10:32:53 martin Exp $");
#include "opt_ddb.h"
#include "opt_pax.h"
@@ -3884,8 +3884,7 @@ uvm_map_pageable_all(struct vm_map *map,
* => never a need to flush amap layer since the anonymous memory has
* no permanent home, but may deactivate pages there
* => called from sys_msync() and sys_madvise()
- * => caller must not write-lock map (read OK).
- * => we may sleep while cleaning if SYNCIO [with map read-locked]
+ * => caller must not have map locked
*/
int
@@ -3907,10 +3906,10 @@ uvm_map_clean(struct vm_map *map, vaddr_
KASSERT((flags & (PGO_FREE|PGO_DEACTIVATE)) !=
(PGO_FREE|PGO_DEACTIVATE));
- vm_map_lock_read(map);
+ vm_map_lock(map);
VM_MAP_RANGE_CHECK(map, start, end);
- if (uvm_map_lookup_entry(map, start, &entry) == false) {
- vm_map_unlock_read(map);
+ if (!uvm_map_lookup_entry(map, start, &entry)) {
+ vm_map_unlock(map);
return EFAULT;
}
@@ -3920,22 +3919,24 @@ uvm_map_clean(struct vm_map *map, vaddr_
for (current = entry; current->start < end; current = current->next) {
if (UVM_ET_ISSUBMAP(current)) {
- vm_map_unlock_read(map);
+ vm_map_unlock(map);
return EINVAL;
}
if ((flags & PGO_FREE) != 0 && VM_MAPENT_ISWIRED(entry)) {
- vm_map_unlock_read(map);
+ vm_map_unlock(map);
return EBUSY;
}
if (end <= current->end) {
break;
}
if (current->end != current->next->start) {
- vm_map_unlock_read(map);
+ vm_map_unlock(map);
return EFAULT;
}
}
+ vm_map_busy(map);
+ vm_map_unlock(map);
error = 0;
for (current = entry; start < end; current = current->next) {
amap = current->aref.ar_amap; /* upper layer */
@@ -4041,8 +4042,8 @@ uvm_map_clean(struct vm_map *map, vaddr_
}
start += size;
}
- vm_map_unlock_read(map);
- return (error);
+ vm_map_unbusy(map);
+ return error;
}