public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Alex Williamson <alex.williamson@redhat.com>
To: Jan Kiszka <jan.kiszka@siemens.com>
Cc: kvm <kvm@vger.kernel.org>
Subject: Re: vfio/dev-assignment: potential pci_block_user_cfg_access nesting
Date: Tue, 23 Aug 2011 16:05:21 -0600	[thread overview]
Message-ID: <1314137122.2859.167.camel@bling.home> (raw)
In-Reply-To: <4E53ABC0.9070202@siemens.com>

On Tue, 2011-08-23 at 15:31 +0200, Jan Kiszka wrote:
> Hi Alex,
> 
> just ran into some corner case with my reanimated IRQ sharing patches
> that may affect vfio as well:
> 
> How are vfio_enable/disable_intx synchronized against all other possible
> spots that call pci_block_user_cfg_access?
> 
> I hit the recursion bug check in pci_block_user_cfg_access with my code
> which takes the user_cfg lock like vfio does. It likely races with
> pci_reset_function here - and should do so in vfio as well.

So the race is that we're doing a pci_reset_function and while we've got
pci_block_user_cfg_access set, an interrupt comes in (maybe from a
device sharing the interrupt line), and we hit the BUG_ON when trying to
nest pci_block_user_cfg_access?

> Just taking some lock would mean having to run pci_reset_function with
> IRQs disabled to synchronize with the IRQ handler (not sure if that is
> possible at all). Alternatively, we would have to disable the interrupt
> line or deregister the IRQ while resetting. Or we perform INTx mask
> manipulation in an unsynchronized fashion, resolving races with user
> space differently (still need to think about this option).
> 
> Any other thoughts?

I think this is a bit easier for vfio since the reset is already routed
through a vfio ioctl.  We can just use a mutex between the two, reset
would wait on the mutex while the interrupt handler would skip masking
of a shared interrupt if it can't get the mutex (hopefully the interrupt
is really for a shared device or we squelch it via the reset before we
trigger the spurious interrupt counter).

I think the only path for kvm assignment that doesn't involve also
rerouting the reset through a kvm ioctl would have to be avoiding the
problem in userspace.  We'd have to unregister the interrupt handler,
reset, then re-register.  That sounds pretty heavy, but the reset is
already a slow process.  Thanks,

Alex


  reply	other threads:[~2011-08-23 22:05 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-08-23 13:31 vfio/dev-assignment: potential pci_block_user_cfg_access nesting Jan Kiszka
2011-08-23 22:05 ` Alex Williamson [this message]
2011-08-24  9:09   ` Jan Kiszka
2011-08-24 15:10     ` Alex Williamson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1314137122.2859.167.camel@bling.home \
    --to=alex.williamson@redhat.com \
    --cc=jan.kiszka@siemens.com \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox