Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp3968918rwb; Mon, 5 Sep 2022 23:46:07 -0700 (PDT) X-Google-Smtp-Source: AA6agR6KkMrPmKGghFDl2Z7U3m/JBoS6zuBFfUpTxZ8VxMFNEi7h6azwZpGjLiDeZn70xxRzLwqM X-Received: by 2002:a17:902:ec8c:b0:175:7ca:c45f with SMTP id x12-20020a170902ec8c00b0017507cac45fmr37102647plg.117.1662446767188; Mon, 05 Sep 2022 23:46:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662446767; cv=none; d=google.com; s=arc-20160816; b=xNEyCs7SPWnrM4EOPAP62rxhcjZ94SpLTHSZsbm8wzMpnS5PLxHg2xguY41ps5ItD1 Ij2SM7DjcllwYKQhhupWkkkVmiGba7+HzHzIEK66wwUCST1gqnfb5/Vhjn0XOuHkHRJ6 jzBS0mAY01ETgvy5O8fE9yAZPJzhtpVjCNl/7aXJsxXWve1QrpNZ/vtf7X/CwvMjI0tZ axIizqsWUwP9AytD/Q367TLgZ8811nuhoFoZ9zZzUdOMd+SAJY5+GMYnMOxAsc9Oik93 g1n8cMSlLDSIwofcAuVf5Bvm+KT5VecycmBHzFQPXDVCa87zMXBTlg2K1LcrFdN6oK0D dtZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=DqZhlhai1WfU2FRbxi3E6c1K1/BPuIx4cYSWBN/3BTk=; b=isRRJAFxQN2szvEj4Dpke8Am2z5by/YRwDbk/9gMlUV/my41td0Je9R8i5t/f9qbiy KPTAzUiHUsiX2Q3JaAZcrAJ+6VANGlfyHzOCf6mbNQ98siQ+EErizSgIHu69pQF0JrNz dpLqa1tjQrFurEgDP++NwOXCQHSkgII0+i9/a6d27PngnTfnrLqKMWgXqTokoMx/CBh5 raiFvuIxAB4SFji6ZS7w3ucwEYeJB+V4rIGpVleohz+0astJroeLifO/2ivoRnkt2r2t qtlrFKYRi+JIJJauQG9MCcrAneJ//+PhugUUPCPa2aLn7+MkqsXea5VJjKzPm0dhbIXs o7Ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=r8JMlanD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hk10-20020a17090b224a00b001eccaceca72si14483314pjb.1.2022.09.05.23.45.55; Mon, 05 Sep 2022 23:46:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=r8JMlanD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238292AbiIFGc2 (ORCPT + 99 others); Tue, 6 Sep 2022 02:32:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53018 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231569AbiIFGc1 (ORCPT ); Tue, 6 Sep 2022 02:32:27 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 684DF6B16B; Mon, 5 Sep 2022 23:32:26 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id DA45F6131C; Tue, 6 Sep 2022 06:32:25 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 37967C433C1; Tue, 6 Sep 2022 06:32:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662445945; bh=8LMCsYlvl0CUwYsQ2G7wmr8HmSnIgXOgFBXtW7glAw0=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=r8JMlanDPN5JhKFA/O5mbNlEqqfeumtL6rk3hWkNYXtbSzkZu3hYbaFVDU7q/EK1L abt8/KMjuQWTpEajHFPIJl96puonsddBsiL1LASz6I0C6s8mWIFCLFJJP2Lk5TkaA/ 6a9bmoQKC0yFGl0in68Egcx8yfQE4e1ObLTa8MCB/TdtkPUARAlb7yZYngZWCHAUn4 9bzkkxOvWz1v1rlIZhdD8Q1RU5UGd5y5tIsGDqGG7Ke4GhePC03/t9mwoXvHeU9+Vg nTO4ZHUNTMoC2hucxl0iRhNUj7fCBOSKhCe2QslnkDGCE/VEIYft4gVTzYF2AjjZxR wcQuGmN/9VBIg== Received: from sofa.misterjones.org ([185.219.108.64] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1oVS8F-008EWN-13; Tue, 06 Sep 2022 07:32:23 +0100 Date: Tue, 06 Sep 2022 07:32:22 +0100 Message-ID: <87pmg9ui6h.wl-maz@kernel.org> From: Marc Zyngier To: Yuan Yao Cc: isaku.yamahata@intel.com, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson , Thomas Gleixner , Will Deacon , isaku.yamahata@gmail.com, Kai Huang , Chao Gao , Atish Patra , Shaokun Zhang , Qi Liu , John Garry , Daniel Lezcano , Huang Ying , Huacai Chen , Dave Hansen , Borislav Petkov Subject: Re: [PATCH v3 10/22] KVM: Drop kvm_count_lock and instead protect kvm_usage_count with kvm_lock In-Reply-To: <20220906024643.ti66dw2y6m6jgch2@yy-desk-7060> References: <20212af31729ba27e29c3856b78975c199b5365c.1662084396.git.isaku.yamahata@intel.com> <20220906024643.ti66dw2y6m6jgch2@yy-desk-7060> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: yuan.yao@linux.intel.com, isaku.yamahata@intel.com, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, pbonzini@redhat.com, seanjc@google.com, tglx@linutronix.de, will@kernel.org, isaku.yamahata@gmail.com, kai.huang@intel.com, chao.gao@intel.com, atishp@atishpatra.org, zhangshaokun@hisilicon.com, liuqi115@huawei.com, john.garry@huawei.com, daniel.lezcano@linaro.org, ying.huang@intel.com, chenhuacai@kernel.org, dave.hansen@linux.intel.com, bp@alien8.de X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 06 Sep 2022 03:46:43 +0100, Yuan Yao wrote: > > On Thu, Sep 01, 2022 at 07:17:45PM -0700, isaku.yamahata@intel.com wrote: > > From: Isaku Yamahata > > > > Because kvm_count_lock unnecessarily complicates the KVM locking convention > > Drop kvm_count_lock and instead protect kvm_usage_count with kvm_lock for > > simplicity. > > > > Opportunistically add some comments on locking. > > > > Suggested-by: Sean Christopherson > > Signed-off-by: Isaku Yamahata > > --- > > Documentation/virt/kvm/locking.rst | 14 +++++------- > > virt/kvm/kvm_main.c | 34 ++++++++++++++++++++---------- > > 2 files changed, 28 insertions(+), 20 deletions(-) > > > > diff --git a/Documentation/virt/kvm/locking.rst b/Documentation/virt/kvm/locking.rst > > index 845a561629f1..8957e32aa724 100644 > > --- a/Documentation/virt/kvm/locking.rst > > +++ b/Documentation/virt/kvm/locking.rst > > @@ -216,15 +216,11 @@ time it will be set using the Dirty tracking mechanism described above. > > :Type: mutex > > :Arch: any > > :Protects: - vm_list > > - > > -``kvm_count_lock`` > > -^^^^^^^^^^^^^^^^^^ > > - > > -:Type: raw_spinlock_t > > -:Arch: any > > -:Protects: - hardware virtualization enable/disable > > -:Comment: 'raw' because hardware enabling/disabling must be atomic /wrt > > - migration. > > + - kvm_usage_count > > + - hardware virtualization enable/disable > > +:Comment: Use cpus_read_lock() for hardware virtualization enable/disable > > + because hardware enabling/disabling must be atomic /wrt > > + migration. The lock order is cpus lock => kvm_lock. > > > > ``kvm->mn_invalidate_lock`` > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > > index fc55447c4dba..082d5dbc8d7f 100644 > > --- a/virt/kvm/kvm_main.c > > +++ b/virt/kvm/kvm_main.c > > @@ -100,7 +100,6 @@ EXPORT_SYMBOL_GPL(halt_poll_ns_shrink); > > */ > > > > DEFINE_MUTEX(kvm_lock); > > -static DEFINE_RAW_SPINLOCK(kvm_count_lock); > > LIST_HEAD(vm_list); > > > > static cpumask_var_t cpus_hardware_enabled; > > @@ -4996,6 +4995,8 @@ static void hardware_enable_nolock(void *caller_name) > > int cpu = raw_smp_processor_id(); > > int r; > > > > + WARN_ON_ONCE(preemptible()); > > This looks incorrect, it may triggers everytime when online CPU. > Because patch 7 moved CPUHP_AP_KVM_STARTING *AFTER* > CPUHP_AP_ONLINE_IDLE as CPUHP_AP_KVM_ONLINE, then cpuhp_thread_fun() > runs the new CPUHP_AP_KVM_ONLINE in *non-atomic* context: > > cpuhp_thread_fun(unsigned int cpu) { > ... > if (cpuhp_is_atomic_state(state)) { > local_irq_disable(); > st->result = cpuhp_invoke_callback(cpu, state, bringup, st->node, &st->last); > local_irq_enable(); > > WARN_ON_ONCE(st->result); > } else { > st->result = cpuhp_invoke_callback(cpu, state, bringup, st->node, &st->last); > } > ... > } > > static bool cpuhp_is_atomic_state(enum cpuhp_state state) > { > return CPUHP_AP_IDLE_DEAD <= state && state < CPUHP_AP_ONLINE; > } > > The hardware_enable_nolock() now is called in 2 cases: > 1. in atomic context by on_each_cpu(). > 2. From non-atomic context by CPU hotplug thread. > > so how about "WARN_ONCE(preemptible() && cpu_active(cpu))" ? I suspect similar changes must be applied to the arm64 side (though I'm still looking for a good definition of cpu_active()). M. -- Without deviation from the norm, progress is not possible.