[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] nvmx deadlock with MSR bitmaps



On 12.03.2020 14:44, Roger Pau Monné wrote:
> On Thu, Mar 12, 2020 at 12:12:12PM +0100, Jürgen Groß wrote:
>> On 12.03.20 11:56, Roger Pau Monné wrote:
>>> On Thu, Mar 12, 2020 at 09:59:48AM +0100, Jan Beulich wrote:
>>>> On 11.03.2020 19:04, Andrew Cooper wrote:
>>>>> Specifically, this is a switch from an HVM vcpu, to a PV vcpu, where the
>>>>> mapcache code tries to access the per-domain mappings on the HVM monitor
>>>>> table.  It ends up trying to recursively acquire the mapcache lock while
>>>>> trying to walk %cr2 to identify the source of the fault.
>>>>>
>>>>> For nvmx->msr_merged, this needs to either be a xenheap page, or a
>>>>> globally mapped domheap page.  I'll draft a patch in a moment.
>>>>>
>>>>> For map_domain_page(), is there anything we can rationally do to assert
>>>>> that it isn't called in the middle of a context switch?  This is the
>>>>> kind of thing which needs to blow up reliably in a debug build.
>>>>
>>>> Well, it's not inherently unsafe to do, it's just that
>>>> mapcache_current_vcpu() would need to avoid using current from
>>>> context_switch()'s call to set_current() through to
>>>> __context_switch()'s call to write_ptbase(). A possible
>>>> detection (if we don't want to make the case work) would
>>>> seem to be ASSERT(current == this_cpu(curr_vcpu)). But of course
>>>> there's also this extra logic in mapcache_current_vcpu() to deal
>>>> with a PV vCPU having a null v->arch.guest_table, which I'm once
>>>> again struggling to see under what conditions it might happen.
>>>> The Dom0 building case can't be meant with there being
>>>> mapcache_override_current() on that path. I'm wondering if the
>>>> comment there is misleading and it's really to cover the case
>>>> where, coming from a PV vCPU, current was already set to the
>>>> idle vCPU by context_switch() (which would have a null
>>>> v->arch.guest_table) - I wouldn't call this "we are running a
>>>> paravirtualised guest". But in such a case the logic here would
>>>> simply be a (too) special case of what you're describing as the
>>>> issue with nVMX.
>>>
>>> Looking at the code in context_switch and __context_switch would it be
>>> possible to set current to the next vCPU after all the from hooks have
>>> been called?
>>>
>>> Ie: set_current could be moved into __context_switch after the call to
>>> pd->arch.ctxt_switch->from(p).
>>
>> No, wouldn't work. When switching to idle __context_switch() is normally
>> not called in order to avoid switching the address space in case the
>> same vcpu will be scheduled again after idle. This is the reason why
>> current and curr_vcpu can be different.
> 
> Since the idle vCPU context switch is already a special case we could
> maybe place the call to set_current in such special handling, while
> leaving the call for the rest of vCPUs in __context_switch after the
> ->from hooks have been executed?
> 
>>> I'm also not sure I understand the difference between context_switch
>>> and __context_switch, and how are callers supposed to use them.
> 
> Jan points out that __context_switch signals a pending context switch,
> in which case my proposal to use set_current might not be suitable, as
> we would be changing current without actually doing the context
> switch?
> 
> I also wonder why __context_switch then needs to call the ->from hook
> just to signal a pending context switch. It seems like
> __context_switch does a lot of work just to signal a context switch,
> which will then be redone when context_switch is actually called?

Well, "signal" was perhaps not the best choice of a word.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.