Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp3642755imm; Mon, 1 Oct 2018 01:58:19 -0700 (PDT) X-Google-Smtp-Source: ACcGV63SURh8CbX79LDEi+dSLPf4Ms/KCeJo65aBCWn33Vp1uu9GiBcxQ8Hj3tqAnaNn4utZMAIc X-Received: by 2002:a63:ea43:: with SMTP id l3-v6mr9247286pgk.427.1538384299819; Mon, 01 Oct 2018 01:58:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538384299; cv=none; d=google.com; s=arc-20160816; b=BSQnd2LJW23sPeJUWFFNuTflRlYZrdt33dwpw24vSlIEzOvpI7VJZuvXRzHIG2BNyZ MKrrR7z8UZc1TgQF2djC3J8HctdX3Z0tqdr/PZaswNuzoqOvYenItMY06m4qjFCW0+xT BAnJJSIrCI6yHXoiED15S5xgvc9Ig2OJntzKfb636XTSaPKmHrXwIpOlj7uGWO7Bd0FC nUuPNhox34yGkjc91jyn/7N6PYZVsS62PnSX2KGNENAOZ0a4V6R2GW3wKwCAMdtW0yAY NcB9v6+fgp2iqiT9ROUa0C+kHCziyQ/DbmPx3SDy8zRfJP4C0xvz4Y+00Q/sRUXHzvCY 3YkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:in-reply-to:references :subject:cc:to:from:date:message-id; bh=CgMmWyzz6x6Xqx+tRhXriocCN2y8UqlJQHADWYWBrHE=; b=hk2D7tslB6pS7ZSIoE/J61F6+AFlp89hyu46fQ2VpCxoyEAND9Mall471np3+8R+oE jTi1eWPvQFsh1hAiFyOjPRMspNvPL5e0fy9V61Ng80ekcnLmajcy5ZbfzUnttA+kVnB+ w/EFYnQE+VhLemf57hHFVZvCIJW4+4LuEYmEYLjMHA00wfYBGG0Fcly0xwSmHbe9HDcE juNnGXq1NFb2Zlgbu9EaLjwWRc5npDVXZQharOqJ6RCDY1k3hZ12WnpBTZ2ArYaVxt4J wcjQrNOBhjaBevCnZBbfigJY+DbWsXnd89oB+lDnxHz02T9hau8gTtynVXC7af4JdF9k NqIA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11-v6si2651394pgb.135.2018.10.01.01.58.04; Mon, 01 Oct 2018 01:58:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728965AbeJAPea convert rfc822-to-8bit (ORCPT + 99 others); Mon, 1 Oct 2018 11:34:30 -0400 Received: from prv1-mh.provo.novell.com ([137.65.248.33]:42983 "EHLO prv1-mh.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728839AbeJAPe3 (ORCPT ); Mon, 1 Oct 2018 11:34:29 -0400 Received: from INET-PRV1-MTA by prv1-mh.provo.novell.com with Novell_GroupWise; Mon, 01 Oct 2018 02:57:46 -0600 Message-Id: <5BB1E18802000078001ED127@prv1-mh.provo.novell.com> X-Mailer: Novell GroupWise Internet Agent 18.0.2 Date: Mon, 01 Oct 2018 02:57:44 -0600 From: "Jan Beulich" To: "Juergen Gross" Cc: "Borislav Petkov" , "Peter Zijlstra" , "the arch/x86 maintainers" , , "xen-devel" , "Boris Ostrovsky" , , , , , Subject: Re: [Xen-devel] [PATCH 2/2] xen: make xen_qlock_wait() nestable References: <20181001071641.19282-1-jgross@suse.com> <20181001071641.19282-3-jgross@suse.com> In-Reply-To: <20181001071641.19282-3-jgross@suse.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8BIT Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>> On 01.10.18 at 09:16, wrote: > xen_qlock_wait() isn't safe for nested calls due to interrupts. A call > of xen_qlock_kick() might be ignored in case a deeper nesting level > was active right before the call of xen_poll_irq(): > > CPU 1: CPU 2: > spin_lock(lock1) > spin_lock(lock1) > -> xen_qlock_wait() > -> xen_clear_irq_pending() > Interrupt happens > spin_unlock(lock1) > -> xen_qlock_kick(CPU 2) > spin_lock_irqsave(lock2) > spin_lock_irqsave(lock2) > -> xen_qlock_wait() > -> xen_clear_irq_pending() > clears kick for lock1 > -> xen_poll_irq() > spin_unlock_irq_restore(lock2) > -> xen_qlock_kick(CPU 2) > wakes up > spin_unlock_irq_restore(lock2) > IRET > resumes in xen_qlock_wait() > -> xen_poll_irq() > never wakes up > > The solution is to disable interrupts in xen_qlock_wait() and not to > poll for the irq in case xen_qlock_wait() is called in nmi context. Are precautions against NMI really worthwhile? Locks acquired both in NMI context as well as outside of it are liable to deadlock anyway, aren't they? Jan