Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Nov 14, 2022, Oliver Upton wrote:
> Hi Marek,
> 
> On Mon, Nov 14, 2022 at 03:29:14PM +0100, Marek Szyprowski wrote:
> > This patch landed in today's linux-next (20221114) as commit 
> > c3119ae45dfb ("KVM: arm64: Protect stage-2 traversal with RCU"). 
> > Unfortunately it introduces a following warning:
> 
> Thanks for the bug report :) I had failed to test nVHE in the past few
> revisions of this series.
> 
> > --->8---
> > 
> > kvm [1]: IPA Size Limit: 40 bits
> > BUG: sleeping function called from invalid context at 
> > include/linux/sched/mm.h:274
> > in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
> > preempt_count: 0, expected: 0
> > RCU nest depth: 1, expected: 0
> > 2 locks held by swapper/0/1:
> >   #0: ffff80000a8a44d0 (kvm_hyp_pgd_mutex){+.+.}-{3:3}, at: 
> > __create_hyp_mappings+0x80/0xc4
> >   #1: ffff80000a927720 (rcu_read_lock){....}-{1:2}, at: 
> > kvm_pgtable_walk+0x0/0x1f4
> > CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.0-rc3+ #5918
> > Hardware name: Raspberry Pi 3 Model B (DT)
> > Call trace:
> >   dump_backtrace.part.0+0xe4/0xf0
> >   show_stack+0x18/0x40
> >   dump_stack_lvl+0x8c/0xb8
> >   dump_stack+0x18/0x34
> >   __might_resched+0x178/0x220
> >   __might_sleep+0x48/0xa0
> >   prepare_alloc_pages+0x178/0x1a0
> >   __alloc_pages+0x9c/0x109c
> >   alloc_page_interleave+0x1c/0xc4
> >   alloc_pages+0xec/0x160
> >   get_zeroed_page+0x1c/0x44
> >   kvm_hyp_zalloc_page+0x14/0x20
> >   hyp_map_walker+0xd4/0x134
> >   kvm_pgtable_visitor_cb.isra.0+0x38/0x5c
> >   __kvm_pgtable_walk+0x1a4/0x220
> >   kvm_pgtable_walk+0x104/0x1f4
> >   kvm_pgtable_hyp_map+0x80/0xc4
> >   __create_hyp_mappings+0x9c/0xc4
> >   kvm_mmu_init+0x144/0x1cc
> >   kvm_arch_init+0xe4/0xef4
> >   kvm_init+0x3c/0x3d0
> >   arm_init+0x20/0x30
> >   do_one_initcall+0x74/0x400
> >   kernel_init_freeable+0x2e0/0x350
> >   kernel_init+0x24/0x130
> >   ret_from_fork+0x10/0x20
> > kvm [1]: Hyp mode initialized successfully
> > 
> > --->8----
> > 
> > I looks that more changes in the KVM code are needed to use RCU for that 
> > code.
> 
> Right, the specific issue is that while the stage-2 walkers preallocate
> any table memory they may need, the hyp walkers do not and allocate
> inline.
> 
> As hyp stage-1 is protected by a spinlock there is no actual need for
> RCU in that case. I'll post something later on today that addresses the
> issue.
> 

For each stage-2 page table walk, KVM will use
kvm_mmu_topup_memory_cache() before taking the mmu lock. This ensures
whoever holding the mmu lock won't sleep. hyp walkers seems to
miss  this notion completely, whic makes me puzzeled. Using a spinlock
only ensures functionality but seems quite inefficient if the one who
holds the spinlock try to allocate pages and sleep...

But that seems to be a separate problem for nvhe. Why do we need an RCU
lock here. Oh is it for batching?



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux