Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1157124iog; Thu, 30 Jun 2022 18:51:14 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uSkbRl1lSNtwVEVACwk2li87Nqsu+pUA5ksB1u8E0rLvSD4RcJVoirMpM6IuDsg4mzu9ae X-Received: by 2002:a05:6402:950:b0:439:646e:c68e with SMTP id h16-20020a056402095000b00439646ec68emr5359059edz.42.1656640273797; Thu, 30 Jun 2022 18:51:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656640273; cv=none; d=google.com; s=arc-20160816; b=WcybRXgeeeztj9XTzUfwTg0YUBY+LyvuZtvwa1zKbj0xOHaxa8xxeQyJjjfQV1Kz7b LDq/r0KLD4qUAqr1qoq0SwFCDV7i9O40tvkGB3jUv3ElVIFQVhnu2uxaUMRaboWUKMmG 8fAOuvaVQTpm/iXEIonEP72RcdzFaH2tr2V5IIrPKlAuW/K+wAeEQLax7eHhhvEfqprJ RvGJC0qlmW6VL6b6aM5VBn6sHDqxat3ea3ruROiqBdfKvmQL9rvQWeGHleH4akMEKFE+ tnoRE8GGf8UyC+PJgtg9dX6HUJxg8wa7LQCIwWni6CJvLc0mGlfapnRczmgJ63CEhUgM aJeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=mHIcLw7pckZjHMylrVXWs14MwZyr4H5GlIN38XtwRj0=; b=DGuzDeQMwcvljw1+gfSVsGhCHAWRc2bxQBppi/7bPIdPDFYaD0mTrZhqBFXPFAyjAM hISLO6GR09CJXPXVi7WckEnQNiLmyde5mTThxkq5EysDcZ0UKniwJaB8bXVPRmTISyqk LQdWn7oUY8T5tqGUOShRrvx6eFKzd7FpFpjXWFno8TAq2KQd68llvxlLZxxPvDVq573i AF8Q14OgXfATaG9ZUerGkRiBOQ25eUZ0u2ASWV+5FIn1+N1Y5p58SLXNLL752CrBtaN9 xbgPUdfPaigHYFIzZj4Gq2XO92w+WBjOh/ILw7Lr0Fw6HhMPVrRj5WQHAS6RV7kewOBX +p8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hsaYRouH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hv19-20020a17090760d300b0072a6e49d3a2si17861ejc.852.2022.06.30.18.50.47; Thu, 30 Jun 2022 18:51:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hsaYRouH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232646AbiGABNR (ORCPT + 99 others); Thu, 30 Jun 2022 21:13:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33054 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229979AbiGABNP (ORCPT ); Thu, 30 Jun 2022 21:13:15 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2243565A0 for ; Thu, 30 Jun 2022 18:13:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1656637992; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=mHIcLw7pckZjHMylrVXWs14MwZyr4H5GlIN38XtwRj0=; b=hsaYRouHYpOet8EQgNbAFXTE6hqOidu79UMaK+siRgqk0CBGZyEfdgWTzf22LzdgDzwqfM haEXd5ouAqdsOU5GVM7L8IFkGf76lMgh7o1sC7rbr5AbrW/YnkPd3pwznMqA7zgQivevnU gcnfs4iPQt+coLUx51fYTCwtJB3pEg8= Received: from mail-lf1-f70.google.com (mail-lf1-f70.google.com [209.85.167.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-388-ywN1rSiLNgSNyLWYHsAxxQ-1; Thu, 30 Jun 2022 21:13:11 -0400 X-MC-Unique: ywN1rSiLNgSNyLWYHsAxxQ-1 Received: by mail-lf1-f70.google.com with SMTP id y35-20020a0565123f2300b0047f70612402so367246lfa.12 for ; Thu, 30 Jun 2022 18:13:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mHIcLw7pckZjHMylrVXWs14MwZyr4H5GlIN38XtwRj0=; b=JNiey+aWj39EN68uEg2laLlNynXoJKPv+L8vqi6QPY8ah84woHUROwNRu3aulI5DzZ 8ULM8sKvYOJgQehRx2yqPVYOuBatnQ5vQkJl3LKTvG0NGUN76jagkbH4Es1faX8VSWWE IS2vHQJ5m9OAW8dakcCgytXs4zvY4EDS+Kl5tb8lGfTERi7F8l1KYQCwgq2gZvhYYqAe xYnNmk5hjnEMHOcaT1JRR6lmWdg8xXmHWgi9jPn90+Tq8VtMgxy2voq2Rpp1Cbnp0lXU 3uI8RRPzy2vOk6fHax56p2lsmrKzEWqaU3aful+RuT5as1G7mhaVX5jKLKUSSa47p6Jf zE9g== X-Gm-Message-State: AJIora+I7t1/hkNT/EH46apQEZr0gbK5eQeOq3K8VcZSx1HQz22gQzUQ WT4Tk1/AOyWhzIGN3Dvl2F7btLEVVgwwIxoqXz6QkW/xdBqgtU/a/Y+Kz9dYWqVm+nYrph5sgOt 692efDBFnLTgWmsHhYUmKDb6zYEGqxK5DumTA0SL5 X-Received: by 2002:a05:6512:ba1:b0:47f:c0bd:7105 with SMTP id b33-20020a0565120ba100b0047fc0bd7105mr7746016lfv.641.1656637989839; Thu, 30 Jun 2022 18:13:09 -0700 (PDT) X-Received: by 2002:a05:6512:ba1:b0:47f:c0bd:7105 with SMTP id b33-20020a0565120ba100b0047fc0bd7105mr7746005lfv.641.1656637989637; Thu, 30 Jun 2022 18:13:09 -0700 (PDT) MIME-Version: 1.0 References: <20220630093651.25981-1-alexander.atanasov@virtuozzo.com> <20220630054532-mutt-send-email-mst@kernel.org> <1c72645a-f162-2649-bdb6-a28ba93bccd2@virtuozzo.com> <20220630114142-mutt-send-email-mst@kernel.org> In-Reply-To: <20220630114142-mutt-send-email-mst@kernel.org> From: Jason Wang Date: Fri, 1 Jul 2022 09:12:58 +0800 Message-ID: Subject: Re: [PATCH v1 1/1] virtio: Restore semantics of vq->broken in virtqueues To: "Michael S. Tsirkin" Cc: Alexander Atanasov , kernel@openvz.org, Thomas Gleixner , Peter Zijlstra , "Paul E. McKenney" , Marc Zyngier , Halil Pasic , Cornelia Huck , Vineeth Vijayan , Peter Oberparleiter , linux-s390@vger.kernel.org, Xuan Zhuo , virtualization , linux-kernel Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 30, 2022 at 11:44 PM Michael S. Tsirkin wrote: > > On Thu, Jun 30, 2022 at 01:08:53PM +0300, Alexander Atanasov wrote: > > Hello, > > > > On 30/06/2022 12:46, Michael S. Tsirkin wrote: > > > On Thu, Jun 30, 2022 at 09:36:46AM +0000, Alexander Atanasov wrote: > > > > virtio: harden vring IRQ (8b4ec69d7e09) changed the use > > > > of vq->broken. As result vring_interrupt handles IRQs for > > > > broken drivers as IRQ_NONE and not IRQ_HANDLED and made impossible > > > > to initiallize vqs before the driver is ready, i.e. in probe method. > > > > Balloon driver does this and it can not load because it fails in > > > > vqs_init with -EIO. > > > > > > > > So instead of changing the original intent ot the flag introduce > > > > a new flag vq->ready which servers the purpose to check of early IRQs > > > > and restore the behaviour of the vq->broken flag. > > > > > > > > Signed-off-by: Alexander Atanasov > > > > > > Does > > > > > > commit c346dae4f3fbce51bbd4f2ec5e8c6f9b91e93163 > > > Author: Jason Wang > > > Date: Wed Jun 22 09:29:40 2022 +0800 > > > > > > virtio: disable notification hardening by default > > > > > > > > > solve the problem for you? > > > > > > No, it won't if CONFIG_VIRTIO_HARDEN_NOTIFICATION is enabled - balloon still > > won't be able to init vqs. > > Yea I intend to make CONFIG_VIRTIO_HARDEN_NOTIFICATION > depend on BROKEN for now. > > > The problem is in virtqueue_add_split and virtqueue_add_packed - can not set > > driver_ok without queues. > > > > The return value of the vring_interrupt gets different - and iirc IRQ_NONE > > for broken device can lead to interrupt storms - i am not sure if that is > > valid for virtio devices yet but for real harware most likely. > > No, I think it's the reverse. With IRQ_HANDLED an interrupt > storm will keep overloading the CPU since driver tells > kernel all is well. With IRQ_NONE kernel will eventually > intervene and disable the irq. Yes, and users may get a warn. For IRQ_HANDLED, it has an issue when the driver is sharing IRQ with other drivers. Thanks > > > Either way if > > you have a mix of drivers working differently depending on return of the > > handler it would get really messy. > > > > RR's original intent was to flag a driver as bad why reuse it like that ? > > > > > > > > drivers/virtio/virtio_ring.c | 20 ++++++++++++++------ > > > > include/linux/virtio.h | 2 +- > > > > include/linux/virtio_config.h | 10 +++++----- > > > > 3 files changed, 20 insertions(+), 12 deletions(-) > > > > > > > > Cc: Thomas Gleixner > > > > Cc: Peter Zijlstra > > > > Cc: "Paul E. McKenney" > > > > Cc: Marc Zyngier > > > > Cc: Halil Pasic > > > > Cc: Cornelia Huck > > > > Cc: Vineeth Vijayan > > > > Cc: Peter Oberparleiter > > > > Cc: linux-s390@vger.kernel.org > > > > Cc: Xuan Zhuo > > > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > index 13a7348cedff..dca3cc774584 100644 > > > > --- a/drivers/virtio/virtio_ring.c > > > > +++ b/drivers/virtio/virtio_ring.c > > > > @@ -100,6 +100,9 @@ struct vring_virtqueue { > > > > /* Other side has made a mess, don't try any more. */ > > > > bool broken; > > > > + /* the queue is ready to handle interrupts */ > > > > + bool ready; > > > > + > > > > /* Host supports indirect buffers */ > > > > bool indirect; > > > > @@ -1688,7 +1691,8 @@ static struct virtqueue *vring_create_virtqueue_packed( > > > > vq->we_own_ring = true; > > > > vq->notify = notify; > > > > vq->weak_barriers = weak_barriers; > > > > - vq->broken = true; > > > > + vq->broken = false; > > > > + vq->ready = false; > > > > vq->last_used_idx = 0; > > > > vq->event_triggered = false; > > > > vq->num_added = 0; > > > > @@ -2134,7 +2138,10 @@ irqreturn_t vring_interrupt(int irq, void *_vq) > > > > return IRQ_NONE; > > > > } > > > > - if (unlikely(vq->broken)) { > > > > + if (unlikely(vq->broken)) > > > > + return IRQ_HANDLED; > > > > + > > > > + if (unlikely(!vq->ready)) { > > > > dev_warn_once(&vq->vq.vdev->dev, > > > > "virtio vring IRQ raised before DRIVER_OK"); > > > > return IRQ_NONE; > > > > @@ -2180,7 +2187,8 @@ struct virtqueue *__vring_new_virtqueue(unsigned int index, > > > > vq->we_own_ring = false; > > > > vq->notify = notify; > > > > vq->weak_barriers = weak_barriers; > > > > - vq->broken = true; > > > > + vq->broken = false; > > > > + vq->ready = false; > > > > vq->last_used_idx = 0; > > > > vq->event_triggered = false; > > > > vq->num_added = 0; > > > > @@ -2405,7 +2413,7 @@ EXPORT_SYMBOL_GPL(virtio_break_device); > > > > * (probing and restoring). This function should only be called by the > > > > * core, not directly by the driver. > > > > */ > > > > -void __virtio_unbreak_device(struct virtio_device *dev) > > > > +void __virtio_device_ready(struct virtio_device *dev) > > > > { > > > > struct virtqueue *_vq; > > > > @@ -2414,11 +2422,11 @@ void __virtio_unbreak_device(struct virtio_device *dev) > > > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > /* Pairs with READ_ONCE() in virtqueue_is_broken(). */ > > > > - WRITE_ONCE(vq->broken, false); > > > > + WRITE_ONCE(vq->ready, true); > > > > } > > > > spin_unlock(&dev->vqs_list_lock); > > > > } > > > > -EXPORT_SYMBOL_GPL(__virtio_unbreak_device); > > > > +EXPORT_SYMBOL_GPL(__virtio_device_ready); > > > > dma_addr_t virtqueue_get_desc_addr(struct virtqueue *_vq) > > > > { > > > > diff --git a/include/linux/virtio.h b/include/linux/virtio.h > > > > index d8fdf170637c..538c5959949a 100644 > > > > --- a/include/linux/virtio.h > > > > +++ b/include/linux/virtio.h > > > > @@ -131,7 +131,7 @@ void unregister_virtio_device(struct virtio_device *dev); > > > > bool is_virtio_device(struct device *dev); > > > > void virtio_break_device(struct virtio_device *dev); > > > > -void __virtio_unbreak_device(struct virtio_device *dev); > > > > +void __virtio_device_ready(struct virtio_device *dev); > > > > void virtio_config_changed(struct virtio_device *dev); > > > > #ifdef CONFIG_PM_SLEEP > > > > diff --git a/include/linux/virtio_config.h b/include/linux/virtio_config.h > > > > index 49c7c32815f1..35cf1b26e05a 100644 > > > > --- a/include/linux/virtio_config.h > > > > +++ b/include/linux/virtio_config.h > > > > @@ -259,21 +259,21 @@ void virtio_device_ready(struct virtio_device *dev) > > > > /* > > > > * The virtio_synchronize_cbs() makes sure vring_interrupt() > > > > - * will see the driver specific setup if it sees vq->broken > > > > + * will see the driver specific setup if it sees vq->ready > > > > * as false (even if the notifications come before DRIVER_OK). > > > > */ > > > > virtio_synchronize_cbs(dev); > > > > - __virtio_unbreak_device(dev); > > > > + __virtio_device_ready(dev); > > > > /* > > > > - * The transport should ensure the visibility of vq->broken > > > > + * The transport should ensure the visibility of vq->ready > > > > * before setting DRIVER_OK. See the comments for the transport > > > > * specific set_status() method. > > > > * > > > > * A well behaved device will only notify a virtqueue after > > > > * DRIVER_OK, this means the device should "see" the coherenct > > > > - * memory write that set vq->broken as false which is done by > > > > + * memory write that set vq->ready as true which is done by > > > > * the driver when it sees DRIVER_OK, then the following > > > > - * driver's vring_interrupt() will see vq->broken as false so > > > > + * driver's vring_interrupt() will see vq->true as true so > > > > * we won't lose any notification. > > > > */ > > > > dev->config->set_status(dev, status | VIRTIO_CONFIG_S_DRIVER_OK); > > > > -- > > > > 2.25.1 > > > > -- > > Regards, > > Alexander Atanasov >