On Tue, Aug 09, 2016 at 12:30:12PM +0200, Christoffer Dall wrote: > On Mon, Aug 08, 2016 at 02:30:38PM +0100, Andre Przywara wrote: > > Hi, > > > > On 03/08/16 17:13, Christoffer Dall wrote: > > > There are two problems with the current implementation of the MMIO > > > handlers for the propbaser and pendbaser: > > > > > > First, the write to the value itself is not guaranteed to be an atomic > > > 64-bit write so two concurrent writes to the structure field could be > > > intermixed. > > > > > > Second, because we do a read-modify-update operation without any > > > synchronization, if we have two 32-bit accesses to separate parts of the > > > register, we can loose one of them. > > > > I am still not 100% convinced that this is necessary, but leave it up to > > the judgement of you senior guys. > > ok, consider this case: > > reg = 0x55555555 55555555; > > CPU 0 CPU 1 > ----- ----- > tmp = reg; > tmp = reg; > tmp[63:32] = ~0; > tmp[31:0] = 0; > reg = tmp; > reg = tmp; > > print("reg is %x", reg); > /* reg is 0x55555555 00000000 */ > > which is weird, because I think in hardware you'll get: > 0xffffffff 00000000 > > no matter how you order the two 32-bit updates. > > That is, unless the architecture tells us that you could observe the > above behavior. > > > > > > > We can take the KVM mutex to synchronize accesses to these registers. > > > > > > Signed-off-by: Christoffer Dall <christoffer.dall@xxxxxxxxxx> > > > --- > > > virt/kvm/arm/vgic/vgic-mmio-v3.c | 10 ++++++++-- > > > 1 file changed, 8 insertions(+), 2 deletions(-) > > > > > > diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c > > > index ff668e0..e38b7a0 100644 > > > --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c > > > +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c > > > @@ -306,16 +306,19 @@ static void vgic_mmio_write_propbase(struct kvm_vcpu *vcpu, > > > { > > > struct vgic_dist *dist = &vcpu->kvm->arch.vgic; > > > struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu; > > > - u64 propbaser = dist->propbaser; > > > + u64 propbaser; > > > > > > /* Storing a value with LPIs already enabled is undefined */ > > > if (vgic_cpu->lpis_enabled) > > > return; > > > > > > + mutex_lock(&vcpu->kvm->lock); > > > > I see that kvm->lock is becoming problematic in the future, since the > > userland save/restore path for GICv2 is taking this lock as well. So we > > have to come up with something better once we use migration on > > GICv3/ITS. I have the gut feeling we need an extra lock for those two > > registers. > > that's why I started with a distributor lock, but you talked my out of > it on IRC. I'll just change this patch to introduce the distributor > lock. It's ok to have that as long as we don't grab it all over, which > we won't. > > > But this is not an issue for the purpose of this fix in the current code > > base. > > > > Do we need to add the kvm->lock to our locking order documentation? > > > > I'll think about this. > So I think Marc had the better intuition here, and by just using a cmpxchg64 we can get around introducing more locks etc. so I took at stab at this. Thanks, -Christoffer -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html