Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp901391rwe; Thu, 25 Aug 2022 11:09:34 -0700 (PDT) X-Google-Smtp-Source: AA6agR7wqlcwzPDGeO1u+w91Yn6+oA2Xi6oNdUEYmP+aDXc2rxTIIihYYGkZr6i+j39ZYkjWAfkd X-Received: by 2002:a62:1616:0:b0:537:ab37:fe90 with SMTP id 22-20020a621616000000b00537ab37fe90mr239773pfw.24.1661450974604; Thu, 25 Aug 2022 11:09:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661450974; cv=none; d=google.com; s=arc-20160816; b=HpTQrL7zYH1aPh21w1jvVxoT7SANAqOEkFRXVuVBQG5ZXCcXKnXZJLCBkDYL1JeaRN XfaX12HU06W/wXRRSdFUzD4ypqpcQCTS8HV3xvGM18Mom2rLKPHoVeSlmwdVVkwtl1ST xNmFccID5YbR1GlZlCQmyTDjjt0zJ8rC5Ic2d6FSJhx7KwVFc8tmdSx4gJ2drNYjrO5p 2zcfOQ1Osl6vtJoFapumSOTO2cuNhzKeZnL7JIKVYYUw6yLrnyVwFy3kcWs+Ond6IE42 kEyYtmCGAUqfKFPNrZncanIwAQqjKbyJ54+l7hZlWIqBMndxp0LvH+mCJWswOizS0KPN 4gYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=y0A2K0+9oDGUYQi5swE4E0wOa1ed6x2HUvSI0bmOx4g=; b=mVkgqRD5lSMOc+N0U9UXtlejzwCIeKu7ldRkvddS/wio2KXZ8Wsz5nusQ+PKEuSUH+ GLjOP4wsr4o7+g7q+xcIf1twAZ8OAPdpDeAFpG4IIriZN1h8YRGBjnAV/zQ0Us4gUkXJ DvpjZbMfAWIqhntRkMloNK6l/C9ZeUb1CXdp3A6zo6emUS0F5v2pSNV+wMdqZ3DoPVga KiOqfxBLoFQuqL/FurMmBGcJBDaEl2yDMUSHDdj9FIo5WPBCuht/4aos1zZM2tSotNa7 Db9wknQhwYvcSX8rxLjJNX0LeWH+7JSXnjEcn3rgJUC+4/MOr8Sk/lq9ENdOur0FgPSt t8ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ZlK20Pyw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u64-20020a638543000000b0042b52b3f27asi2160510pgd.203.2022.08.25.11.09.22; Thu, 25 Aug 2022 11:09:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ZlK20Pyw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243136AbiHYSGD (ORCPT + 99 others); Thu, 25 Aug 2022 14:06:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53390 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243143AbiHYSFy (ORCPT ); Thu, 25 Aug 2022 14:05:54 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E24639A9ED; Thu, 25 Aug 2022 11:05:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6BAD8B82852; Thu, 25 Aug 2022 18:05:48 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 05109C433C1; Thu, 25 Aug 2022 18:05:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1661450747; bh=3ZuOga+eFaa4Aovlwmx6KLUY7DZ240ln98+mlNDNJDc=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ZlK20PywEnex3bZQJJ3QlkmMN8ph+WV0YTKmYVueotIPG92BVPrRPWfbf2MqFDWtv 6xzUJNf3PKGeqkuR2CUWIScmy6v/KUxWqGeSA0+Q5MWwIMr3CZhPGM0c6OBC3chI8n 5gBrpvD1nlAqO7jJ19r/CD3KWW+Tf9iTMQEh9j1mC2pj+yFhG7NZGebTQIuND3yheI iLKKWr+qgXF9fPsPJGTIzw3zaV3H1eOYN178QkD8LQ/FpIt2uZZymGpXSJv+T3Yp7K XDN24h0y2gGRI6uMqKqgv7ElRw55cGmZD01jnr3FNxeIgjCxF8NwRkby6JIvZ4/hNb QsHFWgk1jh5Tg== Received: from sofa.misterjones.org ([185.219.108.64] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1oRHEe-005k35-JZ; Thu, 25 Aug 2022 19:05:44 +0100 Date: Thu, 25 Aug 2022 19:05:44 +0100 Message-ID: <875yigw64n.wl-maz@kernel.org> From: Marc Zyngier To: Pierre Gondois Cc: linux-kernel@vger.kernel.org, linux-rt-users@vger.kernel.org, Thomas Gleixner Subject: Re: [PATCH] irqchip/gic-v3-its: Remove cpumask_var_t allocation In-Reply-To: <20220825152348.1634133-1-pierre.gondois@arm.com> References: <20220825152348.1634133-1-pierre.gondois@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pierre.gondois@arm.com, linux-kernel@vger.kernel.org, linux-rt-users@vger.kernel.org, tglx@linutronix.de X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 25 Aug 2022 16:23:48 +0100, Pierre Gondois wrote: > > In KvmTool, on a ThunderX2, when running a preemp_rt kernel based on How is this specific to kvmtool? Or to running as a guest? > v5.19-rc3-rt4, the following happens: > [ 4.070739] [ BUG: Invalid wait context ] > [ 4.070740] 5.19.0-rc3-rt4-00001-g1a6597c0bdcf #153 Not tainted > [ 4.070742] ----------------------------- > [ 4.070743] swapper/0/1 is trying to lock: > [ 4.070744] ffff0000ab7405d8 ((&c->lock)){+.+.}-{3:3}, at: ___slab_alloc (mm/slub.c:2954) > [ 4.070757] other info that might help us debug this: > [ 4.070758] context-{5:5} > [ 4.070759] 5 locks held by swapper/0/1: > [ 4.070760] #0: ffff0000811491e0 (&dev->mutex){....}-{4:4}, at: __device_driver_lock (drivers/base/dd.c:1055) > [ 4.070769] #1: ffff0000846c5670 (&desc->request_mutex){+.+.}-{4:4}, at: __setup_irq (kernel/irq/internals.h:147) > [ 4.070778] #2: ffff0000846c54c8 (&irq_desc_lock_class){....}-{2:2}, at: __setup_irq (kernel/irq/manage.c:1612) > [ 4.070784] #3: ffff80000b23ea78 (mask_lock){....}-{2:2}, at: irq_setup_affinity (./include/linux/irq.h:381) > [ 4.070791] #4: ffff80000b23ea38 (tmp_mask_lock){....}-{2:2}, at: irq_do_set_affinity (./include/linux/irq.h:381) > [ 4.070797] stack backtrace: > [ 4.070801] CPU: 2 PID: 1 Comm: swapper/0 Not tainted 5.19.0-rc3-rt4-00001-g1a6597c0bdcf #153 > [ 4.070805] Call trace: > [ 4.070806] dump_backtrace (arch/arm64/kernel/stacktrace.c:200) > [ 4.070811] show_stack (arch/arm64/kernel/stacktrace.c:207) > [ 4.070813] dump_stack_lvl (lib/dump_stack.c:107) > [ 4.070818] dump_stack (lib/dump_stack.c:114) > [ 4.070820] __lock_acquire (kernel/locking/lockdep.c:4707) > [ 4.070823] lock_acquire (kernel/locking/lockdep.c:466) > [ 4.070825] rt_spin_lock (./arch/arm64/include/asm/current.h:19 (discriminator 4)) > [ 4.070830] ___slab_alloc (mm/slub.c:2954) > [ 4.070832] __slab_alloc.isra.0 (mm/slub.c:3116) > [ 4.070835] __kmalloc_node (mm/slub.c:3207) > [ 4.070837] alloc_cpumask_var_node (lib/cpumask.c:115) > [ 4.070843] alloc_cpumask_var (lib/cpumask.c:147) > [ 4.070846] its_select_cpu (drivers/irqchip/irq-gic-v3-its.c:1580) > [ 4.070850] its_set_affinity (drivers/irqchip/irq-gic-v3-its.c:1659) > [ 4.070853] msi_domain_set_affinity (kernel/irq/msi.c:501) > [ 4.070857] irq_do_set_affinity (kernel/irq/manage.c:276) > [ 4.070860] irq_setup_affinity (kernel/irq/manage.c:633) > [ 4.070863] irq_startup (kernel/irq/chip.c:280) > [ 4.070865] __setup_irq (kernel/irq/manage.c:1777) > [ 4.070869] request_threaded_irq (kernel/irq/manage.c:2206) > [ 4.070872] vp_find_vqs_msix (./include/linux/interrupt.h:168) > [ 4.070876] vp_find_vqs (drivers/virtio/virtio_pci_common.c:400) > [ 4.070878] vp_modern_find_vqs (drivers/virtio/virtio_pci_modern.c:259) > [ 4.070880] init_vq (./include/linux/virtio_config.h:213) > [ 4.070885] virtblk_probe (drivers/block/virtio_blk.c:936) > [ 4.070887] virtio_dev_probe (drivers/virtio/virtio.c:303) > [ 4.070892] really_probe (drivers/base/dd.c:555) > [ 4.070895] __driver_probe_device (drivers/base/dd.c:764) > [ 4.070897] driver_probe_device (drivers/base/dd.c:794) > [ 4.070899] __driver_attach (drivers/base/dd.c:1164) > [ 4.070901] bus_for_each_dev (drivers/base/bus.c:301) > [ 4.070904] driver_attach (drivers/base/dd.c:1181) > [ 4.070906] bus_add_driver (drivers/base/bus.c:618) > [ 4.070908] driver_register (drivers/base/driver.c:240) > [ 4.070910] register_virtio_driver (drivers/virtio/virtio.c:356 (discriminator 4)) > [ 4.070913] virtio_blk_init (drivers/block/virtio_blk.c:1218) > [ 4.070918] do_one_initcall (init/main.c:1295) > [ 4.070921] kernel_init_freeable (init/main.c:1367) > [ 4.070924] kernel_init (init/main.c:1503) > [ 4.070927] ret_from_fork (arch/arm64/kernel/entry.S:868) Consider trimming the trace to the useful part. > > commit cba4235e6031e ("genirq: Remove mask argument from > setup_affinity()") > and > commit 11ea68f553e24 ("genirq, sched/isolation: Isolate from handling > managed interrupts") > overcome this issue by defining a static struct cpumask and protecting > it by a raw spinlock. The code in these commits is executed with IRQs > disabled. > its_select_cpu() can be executed with IRQs enabled or disabled. Thus > disabling IRQs is necesserary to avoid deadlocking. Only if this code can be preempted by an interrupt and subsequently called from interrupt context. Can you describe this code path? > > This patch: Please refer to the documentation and the section about avoiding things like "this patch" in a commit message. > - makes tmpmask a 'static struct cpumask'. This prevents storing it on > the stack and having to dynamically allocate it > - protects tmpmask with a raw spinlock > - disables IRQs around the spinlock for the case its_select_cpu() is > called with IRQs enabled > > Signed-off-by: Pierre Gondois > --- > drivers/irqchip/irq-gic-v3-its.c | 34 +++++++++++++++++--------------- > 1 file changed, 18 insertions(+), 16 deletions(-) > > diff --git a/drivers/irqchip/irq-gic-v3-its.c b/drivers/irqchip/irq-gic-v3-its.c > index 5ff09de6c48f..3cf89e59b036 100644 > --- a/drivers/irqchip/irq-gic-v3-its.c > +++ b/drivers/irqchip/irq-gic-v3-its.c > @@ -1574,14 +1574,15 @@ static int its_select_cpu(struct irq_data *d, > const struct cpumask *aff_mask) > { > struct its_device *its_dev = irq_data_get_irq_chip_data(d); > - cpumask_var_t tmpmask; > + static DEFINE_RAW_SPINLOCK(tmpmask_lock); > + static struct cpumask tmpmask; > + unsigned long flags; > int cpu, node; > - > - if (!alloc_cpumask_var(&tmpmask, GFP_ATOMIC)) > - return -ENOMEM; > - > node = its_dev->its->numa_node; > > + local_irq_save(flags); > + raw_spin_lock(&tmpmask_lock); Why is this done in two steps? What is wrong with raw_spin_lock_irqsave()? More importantly, a number of call paths reaching its_set_affinity() already execute under a raw spinlock, with interrupts disabled. Is it worth not hitting this lock at all times? > + > if (!irqd_affinity_is_managed(d)) { > /* First try the NUMA node */ > if (node != NUMA_NO_NODE) { > @@ -1589,8 +1590,8 @@ static int its_select_cpu(struct irq_data *d, > * Try the intersection of the affinity mask and the > * node mask (and the online mask, just to be safe). > */ > - cpumask_and(tmpmask, cpumask_of_node(node), aff_mask); > - cpumask_and(tmpmask, tmpmask, cpu_online_mask); > + cpumask_and(&tmpmask, cpumask_of_node(node), aff_mask); > + cpumask_and(&tmpmask, &tmpmask, cpu_online_mask); Consider reducing the churn by writing something like: static struct cpumask __tmpmask; struct cpumask *tmpmask = &__tmpmask; which is strictly equivalent, and makes the patch much smaller. Thanks, M. -- Without deviation from the norm, progress is not possible.