Received: by 10.223.185.116 with SMTP id b49csp374264wrg; Sat, 10 Feb 2018 08:58:41 -0800 (PST) X-Google-Smtp-Source: AH8x2247j/Nm74CcKpbtFiQc73RcyGeIIJAAIV0wqNtiihWTOALpJ8M9nRBDSjY/PBqdn8y2Ff8o X-Received: by 2002:a17:902:4101:: with SMTP id e1-v6mr6039216pld.332.1518281921671; Sat, 10 Feb 2018 08:58:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518281921; cv=none; d=google.com; s=arc-20160816; b=NOlhhsCHc2b678+rWl7ld5Alj2R7rZ+1RhsLJIG/Zdi6IaPpK0dQc7QRW5gyDX44ha Vzl1HmkFwyAhKxGkgDFz/M4zRiS2iPa1RMGohYh5i4GmVWx3F1I01cafP/iTBUXW4ML4 LxIdIEdXFmAFW+nagvnVA6siDWoncuS7v8cO4abHSbPNAF37WjiFDwCTN2eZK9r5INiJ NvB58w1+r5KRi3UF3BXXuhxgUBXXkLBeV3YQHo4WyUo8MnkJIzeE1sN4NIEnNVr2ccaK a9iFJKGgCU3Ixf342NvRde6m+VPaalwkCOz8jK8M2+jMOL05NvYtf1VxWeK1AYWBSKOs Ym9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=Id4tMuhU7mXXHE6qRCAANBjGknOyYoNu0dJMz1yOov4=; b=NMpIEpxdSjdI1/ewwFRK8kXCTOmHz1ymMDe+/WeUJbjArAhCqLZZiPBCZnkcH1U838 ApX1puyqfgS6z/mspug3N/0OFe3Zf5I0FQ8boxUbsxznQY/EA1XunSKw1yP2d+74oMyC AUjLj117YesikzlyQ7w6sl8r2mt8/07K/e9p+8AOSwUGUGjIn3xwpxMRC62sb7gZr+/c th/4QyXwjnyLyeSx2vYFocn1oadDoOy+Ui2EWl5TsvAe4/wz6hk8gS98QlnYMqQ40Hjw lksrzAm69TJYove6paMHKfjtRL7W6qGjmjlEd0HLRjiQ/Ji0ToL11spZmtU+vCxJyiZN NjFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=HbY3bcIQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 35-v6si3277221pla.473.2018.02.10.08.58.27; Sat, 10 Feb 2018 08:58:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=HbY3bcIQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751040AbeBJQ5r (ORCPT + 99 others); Sat, 10 Feb 2018 11:57:47 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:50598 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750907AbeBJQ5q (ORCPT ); Sat, 10 Feb 2018 11:57:46 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w1AGvbMI120135; Sat, 10 Feb 2018 16:57:37 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=Id4tMuhU7mXXHE6qRCAANBjGknOyYoNu0dJMz1yOov4=; b=HbY3bcIQIDt2a5FwAGL2J3innJVJJBPT4IdPYcoZ0RSBwWfvgcvdyR1lMiRcXYIihpNe r9uIX9tRL9+Jp+9NxGXacOW4dtovd7LmbVA/WyLJ/TsDBJLJyCIPqtl9NKQVdcc0hFXk zg1iLKHnc75dXZAwmlzRLl+rR186xKwo/qS2v3a11mHokhKQgNj0v4HPqxM51Zixcwy3 EaaQwOvDljRSQUflbunFs/JYUpTULwzEGPeU8g9yTFZKHIrHoTHmqAQqHtqiK3lokP6g dZZXLEhDqtGeywvXClf0bE4/AkqGGtQYondNR8DxPcMZpVflwCqMG9OzcZZkn0WFSgT+ /w== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp2120.oracle.com with ESMTP id 2g24kug0b9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 10 Feb 2018 16:57:37 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w1AGvaJB003403 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Sat, 10 Feb 2018 16:57:36 GMT Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w1AGvaOe017080; Sat, 10 Feb 2018 16:57:36 GMT Received: from [10.39.255.229] (/10.39.255.229) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Sat, 10 Feb 2018 08:57:36 -0800 Subject: Re: [PATCH 2/2] xen: xenbus: WARN_ON XS_TRANSACTION_{START,END} misuse To: Simon Gaiser , xen-devel@lists.xenproject.org Cc: Juergen Gross , linux-kernel@vger.kernel.org References: <20180207222236.7434-1-simon@invisiblethingslab.com> <20180207222236.7434-2-simon@invisiblethingslab.com> From: Boris Ostrovsky Message-ID: <8a0fd059-7acf-3279-10f9-649c19522e2a@oracle.com> Date: Sat, 10 Feb 2018 11:57:35 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180207222236.7434-2-simon@invisiblethingslab.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8801 signatures=668668 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802100224 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/07/2018 05:22 PM, Simon Gaiser wrote: > As the previous commit shows it's quite easy to confuse the transaction > reference counting by ending a transaction twice. So at least try to > detect and report it. > > Signed-off-by: Simon Gaiser > --- > drivers/xen/xenbus/xenbus_xs.c | 9 +++++++++ > 1 file changed, 9 insertions(+) > > diff --git a/drivers/xen/xenbus/xenbus_xs.c b/drivers/xen/xenbus/xenbus_xs.c > index 3e59590c7254..aed954b09b9b 100644 > --- a/drivers/xen/xenbus/xenbus_xs.c > +++ b/drivers/xen/xenbus/xenbus_xs.c > @@ -137,11 +137,20 @@ static uint32_t xs_request_enter(struct xb_req_data *req) > > void xs_request_exit(struct xb_req_data *req) > { > + unsigned int users_old; > + > spin_lock(&xs_state_lock); > + users_old = xs_state_users; > xs_state_users--; > if ((req->type == XS_TRANSACTION_START && req->msg.type == XS_ERROR) || > req->type == XS_TRANSACTION_END) > xs_state_users--; > + if (WARN_ON(xs_state_users > users_old)) WARN_ON_ONCE()? -boris > + /* > + * Someone misused XS_TRANSACTION_{START,END}. Reset the > + * reference counter so we might survive. > + */ > + xs_state_users = 0; > spin_unlock(&xs_state_lock); > > if (xs_suspend_active && !xs_state_users) >