Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp2182440pxb; Fri, 24 Sep 2021 23:42:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx3q5q592zuBKS9y3+qpyidAkuZIuEYXBwjep+bOBqmSu/8Aga42k77VuQD8OQWenEz6Q3K X-Received: by 2002:a05:6e02:1545:: with SMTP id j5mr11505205ilu.181.1632552160116; Fri, 24 Sep 2021 23:42:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632552160; cv=none; d=google.com; s=arc-20160816; b=mm3zmjHC2V4P9VaXmR9cFkRkG3nygtslmMOHp2EoEEIL/UxCS614gNLgQz730hMt+Q 1ogl+EJrZw+Tmfl+00Z4IC5UbVVlzww4folEjILMPMuBx5Lsb8IMzSanNOG8VU09su58 OVwJC0HD81oLpbsL5cPRrD3Jtp9cIDpwJ3HUj97NQ04QTunFVCUOH3JIQQIMT/9h+xOf wDUJeJaxC2L8enKQHFaM5A2i94GspgO8pkH0cQf+rx0zsjfMgPZxp1Mci28XgDblO9F4 /uE7ph1QV3w7wAPJs5UAOAokBCnEwReG7DEaI79bBkdniIASkj6d48hr2OL9ooJ1xOIa X1CQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:dkim-signature; bh=s8Ef8GFuvQfnF9BDar9o1LMsjHo/kVSjkp6RQOizXjk=; b=0DB7DTJ2MpUmLaY+cEmDfWcFTT1Dj+f11JIq8CfPQFM7MznWLhvPf/lYPtFfqVrHKE Ib3jPN+HFwx89zPEesXCpxXu+aNtDBMCLDI8acSuHlhyGYTmnfEfzd1ErttMbVLFf19D BQ6//8OVpwLo56cktvMLzsIvohWUEav1Zo1JLF6OGinnr1YyWTxb+NKPOAehN0Lv+2lK fzV8donv1AbwLSYUei8/StNfRIw1B2J9Py5msJxG7LK1UX8PviUQQTsheYZd8XBKniWk vdIhTXjA7DFXS/TF3RByJh54kwoywa1naqo4OH88Nbbc4HQvx2prHpyTokxo3JaWi0Ss mo7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=G61LH4mF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a24si12375236ioc.90.2021.09.24.23.42.29; Fri, 24 Sep 2021 23:42:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=G61LH4mF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346238AbhIYA5N (ORCPT + 99 others); Fri, 24 Sep 2021 20:57:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40260 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345982AbhIYA5H (ORCPT ); Fri, 24 Sep 2021 20:57:07 -0400 Received: from mail-qt1-x84a.google.com (mail-qt1-x84a.google.com [IPv6:2607:f8b0:4864:20::84a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C161AC0614ED for ; Fri, 24 Sep 2021 17:55:33 -0700 (PDT) Received: by mail-qt1-x84a.google.com with SMTP id 7-20020ac85907000000b002a5391eff67so42701351qty.1 for ; Fri, 24 Sep 2021 17:55:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=s8Ef8GFuvQfnF9BDar9o1LMsjHo/kVSjkp6RQOizXjk=; b=G61LH4mFxuFNSPc8dYANo1eT4LoYTtllF8CmUigAVUwE47niN3IxCLvz7gdu3kXJ4p ZQGRUPxd6lVd1pie3osAQPOxmbLJto1U72TFRKzU7SrEeLnRgNzwFM67EhN9OMHtfLK4 0P8CpLo4DBhmRIO3KNivDhM66x7e790LPKbt1kMUUoaEFJ8BrQ0kHU4SkwA9CnUG4ZvG NOgccEjti04droRcKSejfuWWOI2KRU0PMG/o1TrFggkFEC3/F7K7dtkErqqSnuV7wQju UsaZQRj+Ze+2OUu3FUTytK0ap4L7DtgKMjJqvpn6WamsAAvTkNWZ6Fzz7ReqK7CQj28q kOig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=s8Ef8GFuvQfnF9BDar9o1LMsjHo/kVSjkp6RQOizXjk=; b=Rlmu6IgzOddJcPd+LOJJreCXhZVCkOKGokELLhAP54pHRGb1gsHnD0B9JiQLQ05617 U6SJDU4PXkkS7I3blOu6rH3suEQS9Rj/BfMyT+J8e3Yb+CdpmvrObYgJVerZaEnyp0H+ dFZJ4gPI2w9Z+8jht+i/WRYJ8oH2Lx2OyVEmrBhNjWSH2foIN28M0UT4Q66Z48ZrHqcN KN+VTa1FkiGTwpi8Nf3hHrvuflQ3w5psFs9hxvjV54aHF9wyrsnXyDAHJISEpo9p522a YoBn744jdCx5bWXR6FO02lP5u7jfunPssmIyiEqV6WRvhKPT4QzkXZal2+zHKF6f3jaY 10gQ== X-Gm-Message-State: AOAM532CgnbkbDNnpYt6xxnzf6agFkEn/v16ykeMG+viAFAPtxps2qp2 GxNBrXUBiqmP9eAjHqbAfueBZFZ2eQQ= X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:90:200:4c72:89be:dba3:2bcb]) (user=seanjc job=sendgmr) by 2002:a05:6214:2d1:: with SMTP id g17mr13106407qvu.63.1632531332975; Fri, 24 Sep 2021 17:55:32 -0700 (PDT) Reply-To: Sean Christopherson Date: Fri, 24 Sep 2021 17:55:15 -0700 In-Reply-To: <20210925005528.1145584-1-seanjc@google.com> Message-Id: <20210925005528.1145584-2-seanjc@google.com> Mime-Version: 1.0 References: <20210925005528.1145584-1-seanjc@google.com> X-Mailer: git-send-email 2.33.0.685.g46640cef36-goog Subject: [PATCH 01/14] KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU From: Sean Christopherson To: Marc Zyngier , Huacai Chen , Aleksandar Markovic , Paul Mackerras , Christian Borntraeger , Janosch Frank , Paolo Bonzini Cc: James Morse , Alexandru Elisei , Suzuki K Poulose , David Hildenbrand , Cornelia Huck , Claudio Imbrenda , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org, kvm@vger.kernel.org, kvm-ppc@vger.kernel.org, linux-kernel@vger.kernel.org, David Matlack , Jing Zhang Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Wrap s390's halt_poll_max_steal with READ_ONCE and snapshot the result of kvm_arch_no_poll() in kvm_vcpu_block() to avoid a mostly-theoretical, largely benign bug on s390 where the result of kvm_arch_no_poll() could change due to userspace modifying halt_poll_max_steal while the vCPU is blocking. The bug is largely benign as it will either cause KVM to skip updating halt-polling times (no_poll toggles false=>true) or to update halt-polling times with a slightly flawed block_ns. Note, READ_ONCE is unnecessary in the current code, add it in case the arch hook is ever inlined, and to provide a hint that userspace can change the param at will. Fixes: 8b905d28ee17 ("KVM: s390: provide kvm_arch_no_poll function") Cc: Christian Borntraeger Signed-off-by: Sean Christopherson --- arch/s390/kvm/kvm-s390.c | 2 +- virt/kvm/kvm_main.c | 5 +++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index 6a6dd5e1daf6..7cabe6778b1b 100644 --- a/arch/s390/kvm/kvm-s390.c +++ b/arch/s390/kvm/kvm-s390.c @@ -3446,7 +3446,7 @@ bool kvm_arch_no_poll(struct kvm_vcpu *vcpu) { /* do not poll with more than halt_poll_max_steal percent of steal time */ if (S390_lowcore.avg_steal_timer * 100 / (TICK_USEC << 12) >= - halt_poll_max_steal) { + READ_ONCE(halt_poll_max_steal)) { vcpu->stat.halt_no_poll_steal++; return true; } diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 191dac6b1bed..768a4cbb26a6 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -3213,6 +3213,7 @@ update_halt_poll_stats(struct kvm_vcpu *vcpu, u64 poll_ns, bool waited) */ void kvm_vcpu_block(struct kvm_vcpu *vcpu) { + bool halt_poll_allowed = !kvm_arch_no_poll(vcpu); ktime_t start, cur, poll_end; bool waited = false; u64 block_ns; @@ -3220,7 +3221,7 @@ void kvm_vcpu_block(struct kvm_vcpu *vcpu) kvm_arch_vcpu_blocking(vcpu); start = cur = poll_end = ktime_get(); - if (vcpu->halt_poll_ns && !kvm_arch_no_poll(vcpu)) { + if (vcpu->halt_poll_ns && halt_poll_allowed) { ktime_t stop = ktime_add_ns(ktime_get(), vcpu->halt_poll_ns); ++vcpu->stat.generic.halt_attempted_poll; @@ -3275,7 +3276,7 @@ void kvm_vcpu_block(struct kvm_vcpu *vcpu) update_halt_poll_stats( vcpu, ktime_to_ns(ktime_sub(poll_end, start)), waited); - if (!kvm_arch_no_poll(vcpu)) { + if (halt_poll_allowed) { if (!vcpu_valid_wakeup(vcpu)) { shrink_halt_poll_ns(vcpu); } else if (vcpu->kvm->max_halt_poll_ns) { -- 2.33.0.685.g46640cef36-goog