Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp3988762pxy; Tue, 4 May 2021 14:58:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxiJm+u3Vy2TOYLDp6fPqmcVlfhMfDjI1s1Fv76/BXfiD5qAmZOmZ6OPv92Kd/t58a0SEdv X-Received: by 2002:a17:90a:d341:: with SMTP id i1mr7358966pjx.184.1620165495621; Tue, 04 May 2021 14:58:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620165495; cv=none; d=google.com; s=arc-20160816; b=JrUgUN+ljLCe++dmy4fvQRf75ySyTrGDBA7ZmMTepMb21IlqkRaNHMVHrDtu7I+Qjs VMUw58o/QYATJ77wMlCJC2tPDcsM/RImAx8DiQsYKiDZNu44fwuIHk2VpihVz+kJyOmC 3L7drV4QPTYxssqZwtuZ5CuZOMc3J6OavbWsZ6VNrKrL8GVOUp9wFoYpUtiEGwOQpW1E FkThUaofJ8J+OpSOazbJPOPgzF95U/CxC+UEdU+VEzY6ikWD4La71ejWsvdYaZOA5hO1 a3PkLAWXx1ztm1IYFc6hE5tI0WUjSVTlWQVg+AqgKGlHQfLHYuwiH5rwTXOno6jUtLEk AGaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject:from :references:cc:to:dkim-signature; bh=QJf7ER3TDUPpx69gjjjuRZbp8LhbACyEKSP42GGHdNw=; b=mPU6JzY3XYa8jUZB4IrfQ2PnMpi+ZVMtT6/CGJNZkKdV4raDMlm5NgwcwE3Q5FoaBZ Eu7oyxSv656eHIl1Esf6+iCemhhAv95RSpAAgKWEjUZhT4AvsGXB6n4dktEigy00jTvG K9witIQlNdet79UF9dBZcmSyrDgtcTKD/t3rcRNeXjYU+DQ/8U4PYUYShVbkbF6sopY0 6ojT8OHzBX5bGnrO3gIMlRU+cAD5y7z7He9nvgy6DQac1nQXviV1O44pUH25pevFOqRA Comt8JioZODtseR97N6NxAcktw0/jiZicfXKpQVnR71PvQ9rCKLJ7B8akFzOI6KnyEXA dlMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Huq45OuJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 10si19415119pfn.13.2021.05.04.14.58.02; Tue, 04 May 2021 14:58:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Huq45OuJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231491AbhEDUTt (ORCPT + 99 others); Tue, 4 May 2021 16:19:49 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:53235 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230301AbhEDUTs (ORCPT ); Tue, 4 May 2021 16:19:48 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620159532; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=QJf7ER3TDUPpx69gjjjuRZbp8LhbACyEKSP42GGHdNw=; b=Huq45OuJwddEpbAzCtZKTeBWSowrF2yvBSYTJQFxKEFrM1g8+dda3S87MBePDaoxWMg3cd bQBljwUoNajYHELugxL64RmJifGqYPDzPQPPoazYXwoKmBTFokjKJIFr4g0ZhiZ1vQmDxW 9W9Bzo17lChxowufouQ1BvuCcQkbRno= Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-14-2-reaFVqPZ2jMy3HppmZDg-1; Tue, 04 May 2021 16:18:50 -0400 X-MC-Unique: 2-reaFVqPZ2jMy3HppmZDg-1 Received: by mail-ed1-f70.google.com with SMTP id i17-20020a50fc110000b0290387c230e257so6977429edr.0 for ; Tue, 04 May 2021 13:18:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:cc:references:from:subject:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=QJf7ER3TDUPpx69gjjjuRZbp8LhbACyEKSP42GGHdNw=; b=W590yUWASmCJyzEG6yJzzLqnVHwxjZOahoCggiPBxp/qipphmd31fMczByrZJRk8EM KJJ52aBkJKdyHcHvB0kPriSe5FPM/Z9WoLJe2TYnrXT1rlGs2mS01CJ2Lws1iNU7ALqV Frdyal1zRgODmswj3p1C8I9G+wxr+RP9SNBxIswIGoxBHk3asF384IasEt1bWijJxDMz aCsb/ZAJvZKLJ8qEayaKuz2Is7khCx/h4xqMwQ56P1uQJ6V1vTGCuHRjPAARiAmNWmZH EuuDlk290osGJr/m2lmmE7zum2HrAXRSCPabmxqN9gOoVwxCAQT2W1PJ0TtSs7sinxKD vnWg== X-Gm-Message-State: AOAM530srDOal4KjjOSyAKr3Y8TMQCTkIwnEm8etovEwAZZN6lHvIgu+ iHJ8lT9AXrLrYMitXssTfOew+nHdI3cku5yApAUaD0EzWU7l6EYFmQTEwvugpMIKNH9SqVFR9up 863qKf9ZoW7VMnQ6FecqPqwda X-Received: by 2002:a17:906:e105:: with SMTP id gj5mr24371327ejb.388.1620159528937; Tue, 04 May 2021 13:18:48 -0700 (PDT) X-Received: by 2002:a17:906:e105:: with SMTP id gj5mr24371314ejb.388.1620159528740; Tue, 04 May 2021 13:18:48 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:5e2c:eb9a:a8b6:fd3e? ([2001:b07:6468:f312:5e2c:eb9a:a8b6:fd3e]) by smtp.gmail.com with ESMTPSA id o20sm14995116eds.65.2021.05.04.13.18.46 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 04 May 2021 13:18:48 -0700 (PDT) To: Ben Gardon Cc: LKML , kvm , Peter Xu , Sean Christopherson , Peter Shier , Junaid Shahid , Jim Mattson , Yulei Zhang , Wanpeng Li , Vitaly Kuznetsov , Xiao Guangrong References: <20210429211833.3361994-1-bgardon@google.com> <20210429211833.3361994-2-bgardon@google.com> From: Paolo Bonzini Subject: Re: [PATCH v2 1/7] KVM: x86/mmu: Track if shadow MMU active Message-ID: <34fe30b6-0d4b-f1e8-9abd-6cb0a0765492@redhat.com> Date: Tue, 4 May 2021 22:18:40 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/05/21 19:26, Ben Gardon wrote: > On Mon, May 3, 2021 at 6:42 AM Paolo Bonzini wrote: >> >> On 29/04/21 23:18, Ben Gardon wrote: >>> +void activate_shadow_mmu(struct kvm *kvm) >>> +{ >>> + kvm->arch.shadow_mmu_active = true; >>> +} >>> + >> >> I think there's no lock protecting both the write and the read side. >> Therefore this should be an smp_store_release, and all checks in >> patch 2 should be an smp_load_acquire. > > That makes sense. > >> >> Also, the assignments to slot->arch.rmap in patch 4 (alloc_memslot_rmap) >> should be an rcu_assign_pointer, while __gfn_to_rmap must be changed like so: >> >> + struct kvm_rmap_head *head; >> ... >> - return &slot->arch.rmap[level - PG_LEVEL_4K][idx]; >> + head = srcu_dereference(slot->arch.rmap[level - PG_LEVEL_4K], &kvm->srcu, >> + lockdep_is_held(&kvm->slots_arch_lock)); >> + return &head[idx]; > > I'm not sure I fully understand why this becomes necessary after patch > 4. Isn't it already needed since the memslots are protected by RCU? Or > is there already a higher level rcu dereference? > > __kvm_memslots already does an srcu dereference, so is there a path > where we aren't getting the slots from that function where this is > needed? There are two point of views: 1) the easier one is just CONFIG_PROVE_RCU debugging: the rmaps need to be accessed under RCU because the memslots can disappear as soon as kvm->srcu is unlocked. 2) the harder one (though at this point I'm better at figuring out these ordering bugs than "traditional" mutex races) is what the happens before relation[1] looks like. Consider what happens if the rmaps are allocated by *another thread* after the slots have been fetched. thread 1 thread 2 thread 3 allocate memslots rcu_assign_pointer slots = srcu_dereference allocate rmap rcu_assign_pointer head = slot->arch.rmap[] Here, thread 3 is allocating the rmaps in the SRCU-protected kvm_memslots; those rmaps that didn't exist at the time thread 1 did the rcu_assign_pointer (which synchronizes with thread 2's srcu_dereference that retrieves slots), hence they were not covered by the release semantics of that rcu_assign_pointer and the "consume" semantics of the corresponding srcu_dereference. Therefore, thread 2 needs another srcu_dereference when retrieving them. Paolo [1] https://lwn.net/Articles/844224/ > I wouldn't say that the rmaps are protected by RCU in any way that > separate from the memslots.