Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp199402pxa; Tue, 11 Aug 2020 00:05:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygh0xWDpfYFqJHvWnFifyNT0a2cqxl5KuqaxAYbXWinOPXPgrUoyC5gP6WgqAm5BZyW/9x X-Received: by 2002:aa7:d350:: with SMTP id m16mr24118265edr.169.1597129507951; Tue, 11 Aug 2020 00:05:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597129507; cv=none; d=google.com; s=arc-20160816; b=L5c190PexSEmUmdnEmCCfrXQKwXfYJ8OPa/OYUBaFuyetS3cPqUntkQnop7S+E/CRo 8fiLhiCWef71RZVoZi5ig4hCGhLjFIhyDFOR5SOhXr9bVjAo3q1iK9MgG9TW6thRCU+m LnTdr5jIGbLpkV9YJRf9kqlLAj3w1EHZRyvufUzm3hnEgJNyCvXkyFJslZ8tRpcRyRtM /wwtXS2wN1ttmucgKAqj191e0Z54EGqek0Pu3ly1d8FSzvXw0L2OIxKu9SQMwZv1nbBD /YjzhfnGanjLMSQp2IEqI2sLE7cDWke/lEMev/i0jXSZjvhO7WQI8Rhv/nyM9X0F9GuC sfDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=F1s+Ab0YJ1nRhabDcWGJ1wJlu8nr2OTHTQ8v81zx/uE=; b=gQZW+9Of9JzvVNWhfwrKcxWqrinI8eMEATklyVoxEpbX09WKQbzmqnWQEXCJzlI5iP I9I2HsjbMf817akROA0EBA3A/MYVgYxsq6yfOjzGrKzqdK+lAMsbQsgisUQDaqug6QHN VFWFW1HJnT/nOJhaovCuf6dHdCIHPTKO8+SuYdp122cKB9D/6N5qzZR014gq74hyNZhb vk8weYTglk4xfCLtR+Mb76RKSSLfa2h2ugPvL0EIl00IyM/uMOeXfkP9V2lQ4baXVWgR u5EwczqXZkF/biWXw5qilvofuRfaDBi7M7on9YEtoolQ/5BFAq+dt5pXTmzjV1ziqD5v dZkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Wrc1qF1A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p62si9823364edb.9.2020.08.11.00.04.44; Tue, 11 Aug 2020 00:05:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Wrc1qF1A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728295AbgHKHBQ (ORCPT + 99 others); Tue, 11 Aug 2020 03:01:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38300 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726882AbgHKHAy (ORCPT ); Tue, 11 Aug 2020 03:00:54 -0400 Received: from mail-ot1-x343.google.com (mail-ot1-x343.google.com [IPv6:2607:f8b0:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 522ECC061787 for ; Tue, 11 Aug 2020 00:00:45 -0700 (PDT) Received: by mail-ot1-x343.google.com with SMTP id q9so9322744oth.5 for ; Tue, 11 Aug 2020 00:00:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=F1s+Ab0YJ1nRhabDcWGJ1wJlu8nr2OTHTQ8v81zx/uE=; b=Wrc1qF1AQOvTNmFWYlD5IE1ogh61vHRHEXQ/B0lLUhn9IzByX4qyvYlGEHEzvIH44s Q9AJP3rfMH3F4O2pQZWdUdl9ZouuW+xsM7nxqvJSZ2K4nKZsGFCOmO5zYQ9B0UpCknlb CeKptQ0HQNEtz1XO4+IJKGQoxOt1lv8Ht/rtcvrj8E2tajKajvmk/iwbzwa73Z68Aw1p 5n1/q1DqlHPj2MdTYHiyRRVAwDk8rhZpdBEZQmETT50ABfjOwaeob/3K5TTvbM+q6hiO efXrkKaWkUv7EtMW44sGD3iMvq4ChGJ1dlgLLA3vGmnIvs+00KCczQvRaAGJGMPCu5o4 YbIg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=F1s+Ab0YJ1nRhabDcWGJ1wJlu8nr2OTHTQ8v81zx/uE=; b=m8pU3jgt5FmIgdkS9G9tEiRMlZIH3Zrfw90HeuhaW7JislQoL2U07TIS9szPYNjzfK bHM8CTRCvXcnR0QtSv5dzvZeTkm1ga4CL5/vKVr/SNfyPWaTfTbFvkrm3NlM56qbjInF yh0pZQuWg0WH0xiJe6FQoDpvaqGMcfWODMi2toIGr3HTuFWleT/z14QZsggSoBwQ9IUQ u1JiObRoOyW3naAOPkOZI7DaBH0BAXZqG+YbitinqdXQ8OyQdPlnnJfdVVXen4l6bEzN vpeSqtvskWQp1zpgcFL1pm3Rn24wtZffqPS13ejp7YAwJxRFQlUKrxlqg37GWWtU6j8e SM+Q== X-Gm-Message-State: AOAM532P1r+OxR8TDChq9F7tI+xU2h2VRW8GycYUFS6qpKx/sUCVSJBm SwqgtaasHyX45Fe24gWjKEYwQrrflrlzJGWOAbhj6A== X-Received: by 2002:a05:6830:1612:: with SMTP id g18mr3522264otr.251.1597129244426; Tue, 11 Aug 2020 00:00:44 -0700 (PDT) MIME-Version: 1.0 References: <20200806113236.GZ2674@hirez.programming.kicks-ass.net> <20200806131702.GA3029162@elver.google.com> <20200807095032.GA3528289@elver.google.com> <16671cf3-3885-eb06-79ff-4cbfaeeaea79@suse.com> <20200807113838.GA3547125@elver.google.com> <20200807151903.GA1263469@elver.google.com> In-Reply-To: <20200807151903.GA1263469@elver.google.com> From: Marco Elver Date: Tue, 11 Aug 2020 09:00:32 +0200 Message-ID: Subject: Re: [PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers To: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Cc: Peter Zijlstra , Borislav Petkov , Dave Hansen , fenghua.yu@intel.com, "H. Peter Anvin" , LKML , Ingo Molnar , syzkaller-bugs , Thomas Gleixner , "Luck, Tony" , "the arch/x86 maintainers" , yu-cheng.yu@intel.com, sdeep@vmware.com, virtualization@lists.linux-foundation.org, kasan-dev , syzbot , "Paul E. McKenney" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 7 Aug 2020 at 17:19, Marco Elver wrote: > On Fri, Aug 07, 2020 at 02:08PM +0200, Marco Elver wrote: > > On Fri, 7 Aug 2020 at 14:04, J=C3=BCrgen Gro=C3=9F wr= ote: > > > > > > On 07.08.20 13:38, Marco Elver wrote: > > > > On Fri, Aug 07, 2020 at 12:35PM +0200, J=C3=BCrgen Gro=C3=9F wrote: ... > > > >> I think CONFIG_PARAVIRT_XXL shouldn't matter, but I'm not complete= ly > > > >> sure about that. CONFIG_PARAVIRT_SPINLOCKS would be my primary sus= pect. > > > > > > > > Yes, PARAVIRT_XXL doesn't make a different. When disabling > > > > PARAVIRT_SPINLOCKS, however, the warnings go away. > > > > > > Thanks for testing! > > > > > > I take it you are doing the tests in a KVM guest? > > > > Yes, correct. > > > > > If so I have a gut feeling that the use of local_irq_save() and > > > local_irq_restore() in kvm_wait() might be fishy. I might be complete= ly > > > wrong here, though. > > > > Happy to help debug more, although I might need patches or pointers > > what to play with. > > > > > BTW, I think Xen's variant of pv spinlocks is fine (no playing with I= RQ > > > on/off). > > > > > > Hyper-V seems to do the same as KVM, and kicking another vcpu could b= e > > > problematic as well, as it is just using IPI. > > I experimented a bit more, and the below patch seems to solve the > warnings. However, that was based on your pointer about kvm_wait(), and > I can't quite tell if it is the right solution. > > My hypothesis here is simply that kvm_wait() may be called in a place > where we get the same case I mentioned to Peter, > > raw_local_irq_save(); /* or other IRQs off without tracing */ > ... > kvm_wait() /* IRQ state tracing gets confused */ > ... > raw_local_irq_restore(); > > and therefore, using raw variants in kvm_wait() works. It's also safe > because it doesn't call any other libraries that would result in corrupt > IRQ state AFAIK. Just to follow-up, it'd still be nice to fix this. Suggestions? I could send the below as a patch, but can only go off my above hypothesis and the fact that syzbot is happier, so not entirely convincing. Thanks, -- Marco > ------ >8 ------ > > diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c > index 233c77d056c9..1d412d1466f0 100644 > --- a/arch/x86/kernel/kvm.c > +++ b/arch/x86/kernel/kvm.c > @@ -797,7 +797,7 @@ static void kvm_wait(u8 *ptr, u8 val) > if (in_nmi()) > return; > > - local_irq_save(flags); > + raw_local_irq_save(flags); > > if (READ_ONCE(*ptr) !=3D val) > goto out; > @@ -810,10 +810,10 @@ static void kvm_wait(u8 *ptr, u8 val) > if (arch_irqs_disabled_flags(flags)) > halt(); > else > - safe_halt(); > + raw_safe_halt(); > > out: > - local_irq_restore(flags); > + raw_local_irq_restore(flags); > } > > #ifdef CONFIG_X86_32