public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Scott Wood <scottwood@freescale.com>
To: Alexander Graf <agraf@suse.de>
Cc: <kvm-ppc@vger.kernel.org>,
	"kvm@vger.kernel.org mailing list" <kvm@vger.kernel.org>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Gleb Natapov <gleb@redhat.com>
Subject: Re: [PATCH 16/17] KVM: PPC: MPIC: Add support for KVM_IRQ_LINE
Date: Thu, 25 Apr 2013 14:03:52 -0500	[thread overview]
Message-ID: <1366916632.30341.8@snotra> (raw)
In-Reply-To: <1A9486DB-F145-4CD2-A6C8-383107C35B5A@suse.de> (from agraf@suse.de on Thu Apr 25 09:49:23 2013)

On 04/25/2013 09:49:23 AM, Alexander Graf wrote:
> 
> On 25.04.2013, at 13:30, Alexander Graf wrote:
> 
> >
> > On 19.04.2013, at 20:51, Scott Wood wrote:
> >
> >> On 04/19/2013 09:06:27 AM, Alexander Graf wrote:
> >>> Now that all pieces are in place for reusing generic irq  
> infrastructure,
> >>> we can copy x86's implementation of KVM_IRQ_LINE irq injection  
> and simply
> >>> reuse it for PPC, as it will work there just as well.
> >>> Signed-off-by: Alexander Graf <agraf@suse.de>
> >>> ---
> >>> arch/powerpc/include/uapi/asm/kvm.h |    1 +
> >>> arch/powerpc/kvm/powerpc.c          |   13 +++++++++++++
> >>> 2 files changed, 14 insertions(+), 0 deletions(-)
> >>> diff --git a/arch/powerpc/include/uapi/asm/kvm.h  
> b/arch/powerpc/include/uapi/asm/kvm.h
> >>> index 3537bf3..dbb2ac2 100644
> >>> --- a/arch/powerpc/include/uapi/asm/kvm.h
> >>> +++ b/arch/powerpc/include/uapi/asm/kvm.h
> >>> @@ -26,6 +26,7 @@
> >>> #define __KVM_HAVE_SPAPR_TCE
> >>> #define __KVM_HAVE_PPC_SMT
> >>> #define __KVM_HAVE_IRQCHIP
> >>> +#define __KVM_HAVE_IRQ_LINE
> >>> struct kvm_regs {
> >>> 	__u64 pc;
> >>> diff --git a/arch/powerpc/kvm/powerpc.c  
> b/arch/powerpc/kvm/powerpc.c
> >>> index c431fea..874c106 100644
> >>> --- a/arch/powerpc/kvm/powerpc.c
> >>> +++ b/arch/powerpc/kvm/powerpc.c
> >>> @@ -33,6 +33,7 @@
> >>> #include <asm/cputhreads.h>
> >>> #include <asm/irqflags.h>
> >>> #include "timing.h"
> >>> +#include "irq.h"
> >>> #include "../mm/mmu_decl.h"
> >>> #define CREATE_TRACE_POINTS
> >>> @@ -945,6 +946,18 @@ static int kvm_vm_ioctl_get_pvinfo(struct  
> kvm_ppc_pvinfo *pvinfo)
> >>> 	return 0;
> >>> }
> >>> +int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level  
> *irq_event,
> >>> +			  bool line_status)
> >>> +{
> >>> +	if (!irqchip_in_kernel(kvm))
> >>> +		return -ENXIO;
> >>> +
> >>> +	irq_event->status = kvm_set_irq(kvm,  
> KVM_USERSPACE_IRQ_SOURCE_ID,
> >>> +					irq_event->irq,  
> irq_event->level,
> >>> +					line_status);
> >>> +	return 0;
> >>> +}
> >>
> >> As Paul noted in the XICS patchset, this could reference an MPIC  
> that has gone away if the user never attached any vcpus and then  
> closed the MPIC fd.  It's not a reasonable use case, but it could be  
> used malicously to get the kernel to access a bad pointer.  The  
> irqchip_in_kernel check helps somewhat, but it's meant for ensuring  
> that the creation has happened -- it's racy if used for ensuring that  
> destruction hasn't happened.
> >>
> >> The problem is rooted in the awkwardness of performing an  
> operation that logically should be on the MPIC fd, but is instead  
> being done on the vm fd.
> >>
> >> I think these three steps would fix it (the first two seem like  
> things we should be doing anyway):
> >> - During MPIC destruction, make sure MPIC deregisters all routes  
> that reference it.
> >> - In kvm_set_irq(), do not release the RCU read lock until after  
> the set() function has been called.
> >> - Do not hook up kvm_send_userspace_msi() to MPIC or other new  
> irqchips, as that bypasses the RCU lock.  It could be supported as a  
> device fd ioctl if desired, or it could be reworked to operate on an  
> RCU-managed list of MSI handlers, though MPIC really doesn't need  
> this at all.
> >
> > Can't we just add an RCU lock in the send_userspace_msi case? I  
> don't think we should handle MSIs any differently from normal IRQs.

Well, you can't *just* add the RCU lock -- you need to add data to be  
managed via RCU (e.g. a list of MSI callbacks, or at least a boolean  
indicating whether calling the MSI code is OK).

> In fact I'm having a hard time verifying that we're always accessing  
> things with proper locks held. I'm pretty sure we're missing a few  
> cases.

Any path in particular?

> So how about we delay mpic destruction to vm destruction? We simply  
> add one user too many when we spawn the mpic and put it on  
> vm_destruct. That way users _can_ destroy mpics, but they will only  
> be really free'd once the vm is also gone.

That's what we originally had before the fd conversion.  If we want it  
again, we'll need to go back to maintaining a list of devices in KVM  
(though it could be a linked list now that we don't need to use it for  
lookups), or have some hardcoded MPIC hack.

IIRC I said back then that converting to fd would make destruction  
ordering more of a pain...

-Scott

  reply	other threads:[~2013-04-25 19:03 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-04-19 14:06 [PATCH 00/17] KVM: PPC: In-kernel MPIC support with irqfd v3 Alexander Graf
2013-04-19 14:06 ` [PATCH 01/17] KVM: Add KVM_IRQCHIP_NUM_PINS in addition to KVM_IOAPIC_NUM_PINS Alexander Graf
2013-04-25 10:18   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 02/17] KVM: Introduce CONFIG_HAVE_KVM_IRQ_ROUTING Alexander Graf
2013-04-25 10:18   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 03/17] KVM: Drop __KVM_HAVE_IOAPIC condition on irq routing Alexander Graf
2013-04-25 10:19   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 04/17] KVM: Remove kvm_get_intr_delivery_bitmask Alexander Graf
2013-04-25 10:19   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 05/17] KVM: Move irq routing to generic code Alexander Graf
2013-04-25 10:19   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 06/17] KVM: Extract generic irqchip logic into irqchip.c Alexander Graf
2013-04-25 10:19   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 07/17] KVM: Move irq routing setup to irqchip.c Alexander Graf
2013-04-25 10:20   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 08/17] KVM: Move irqfd resample cap handling to generic code Alexander Graf
2013-04-25 10:21   ` Michael S. Tsirkin
2013-04-19 14:06 ` [PATCH 09/17] kvm: add device control API Alexander Graf
2013-04-19 14:06 ` [PATCH 10/17] kvm/ppc/mpic: import hw/openpic.c from QEMU Alexander Graf
2013-04-19 14:06 ` [PATCH 11/17] kvm/ppc/mpic: remove some obviously unneeded code Alexander Graf
2013-04-19 14:06 ` [PATCH 12/17] kvm/ppc/mpic: adapt to kernel style and environment Alexander Graf
2013-04-19 14:06 ` [PATCH 13/17] kvm/ppc/mpic: in-kernel MPIC emulation Alexander Graf
2013-04-19 14:06 ` [PATCH 14/17] kvm/ppc/mpic: add KVM_CAP_IRQ_MPIC Alexander Graf
2013-04-19 14:06 ` [PATCH 15/17] KVM: PPC: Support irq routing and irqfd for in-kernel MPIC Alexander Graf
2013-04-19 18:02   ` Scott Wood
2013-04-25  9:58     ` Alexander Graf
2013-04-25 16:53       ` Scott Wood
2013-04-23  6:38   ` Paul Mackerras
2013-04-25 10:02     ` Alexander Graf
2013-04-19 14:06 ` [PATCH 16/17] KVM: PPC: MPIC: Add support for KVM_IRQ_LINE Alexander Graf
2013-04-19 18:51   ` Scott Wood
2013-04-25 11:30     ` Alexander Graf
2013-04-25 14:49       ` Alexander Graf
2013-04-25 19:03         ` Scott Wood [this message]
2013-04-25 21:13           ` Alexander Graf
2013-05-01 13:15             ` Marcelo Tosatti
2013-04-19 14:06 ` [PATCH 17/17] KVM: PPC: MPIC: Restrict to e500 platforms Alexander Graf
2013-04-25 10:24 ` [PATCH 00/17] KVM: PPC: In-kernel MPIC support with irqfd v3 Michael S. Tsirkin
  -- strict thread matches above, loose matches on Subject: below --
2013-04-18 14:11 [PATCH 00/17] KVM: PPC: In-kernel MPIC support with irqfd Alexander Graf
2013-04-18 14:11 ` [PATCH 16/17] KVM: PPC: MPIC: Add support for KVM_IRQ_LINE Alexander Graf

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1366916632.30341.8@snotra \
    --to=scottwood@freescale.com \
    --cc=agraf@suse.de \
    --cc=gleb@redhat.com \
    --cc=kvm-ppc@vger.kernel.org \
    --cc=kvm@vger.kernel.org \
    --cc=mtosatti@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox