From: Greg KH <gregkh@linuxfoundation.org>
To: Raghavendra K T <raghavendra.kt@linux.vnet.ibm.com>
Cc: jeremy@goop.org, kvm@vger.kernel.org, peterz@infradead.org,
virtualization@lists.linux-foundation.org,
paul.gortmaker@windriver.com, hpa@zytor.com, ak@linux.intel.com,
a.ryabinin@samsung.com, x86@kernel.org, borntraeger@de.ibm.com,
mingo@redhat.com, xen-devel@lists.xenproject.org,
paulmck@linux.vnet.ibm.com, riel@redhat.com,
konrad.wilk@oracle.com, dave@stgolabs.net,
sasha.levin@oracle.com, davej@redhat.com, tglx@linutronix.de,
waiman.long@hp.com, oleg@redhat.com, stable@vger.kernel.org,
linux-kernel@vger.kernel.org, pbonzini@redhat.com,
akpm@linux-foundation.org, torvalds@linux-foundation.org
Subject: Re: [PATCH for stable] x86/spinlocks/paravirt: Fix memory corruption on unlock
Date: Tue, 24 Feb 2015 06:17:31 -0800 [thread overview]
Message-ID: <20150224141731.GA16033@kroah.com> (raw)
In-Reply-To: <1424769899-14158-1-git-send-email-raghavendra.kt@linux.vnet.ibm.com>
On Tue, Feb 24, 2015 at 02:54:59PM +0530, Raghavendra K T wrote:
> Paravirt spinlock clears slowpath flag after doing unlock.
> As explained by Linus currently it does:
> prev = *lock;
> add_smp(&lock->tickets.head, TICKET_LOCK_INC);
>
> /* add_smp() is a full mb() */
>
> if (unlikely(lock->tickets.tail & TICKET_SLOWPATH_FLAG))
> __ticket_unlock_slowpath(lock, prev);
>
> which is *exactly* the kind of things you cannot do with spinlocks,
> because after you've done the "add_smp()" and released the spinlock
> for the fast-path, you can't access the spinlock any more. Exactly
> because a fast-path lock might come in, and release the whole data
> structure.
>
> Linus suggested that we should not do any writes to lock after unlock(),
> and we can move slowpath clearing to fastpath lock.
>
> So this patch implements the fix with:
> 1. Moving slowpath flag to head (Oleg):
> Unlocked locks don't care about the slowpath flag; therefore we can keep
> it set after the last unlock, and clear it again on the first (try)lock.
> -- this removes the write after unlock. note that keeping slowpath flag would
> result in unnecessary kicks.
> By moving the slowpath flag from the tail to the head ticket we also avoid
> the need to access both the head and tail tickets on unlock.
>
> 2. use xadd to avoid read/write after unlock that checks the need for
> unlock_kick (Linus):
> We further avoid the need for a read-after-release by using xadd;
> the prev head value will include the slowpath flag and indicate if we
> need to do PV kicking of suspended spinners -- on modern chips xadd
> isn't (much) more expensive than an add + load.
>
> Result:
> setup: 16core (32 cpu +ht sandy bridge 8GB 16vcpu guest)
> benchmark overcommit %improve
> kernbench 1x -0.13
> kernbench 2x 0.02
> dbench 1x -1.77
> dbench 2x -0.63
>
> [Jeremy: hinted missing TICKET_LOCK_INC for kick]
> [Oleg: Moving slowpath flag to head, ticket_equals idea]
> [PeterZ: Detailed changelog]
>
> Reported-by: Sasha Levin <sasha.levin@oracle.com>
> Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Raghavendra K T <raghavendra.kt@linux.vnet.ibm.com>
> Reviewed-by: Oleg Nesterov <oleg@redhat.com>
> Acked-by: David Vrabel <david.vrabel@citrix.com>
> ---
> arch/x86/include/asm/spinlock.h | 94 ++++++++++++++++++++---------------------
> arch/x86/kernel/kvm.c | 7 ++-
> arch/x86/xen/spinlock.c | 7 ++-
> 3 files changed, 58 insertions(+), 50 deletions(-)
>
> Changes for stable:
> - Don't replace the ACCESS_ONCE to READ_ONCE which would cause horraneous
> Compiler warnings (Linus, David Vbriel, PeterZ, Ingo)
What is the git commit id of this in Linus's tree? What stable tree(s)
do you want this applied to?
thanks,
greg k-h
next prev parent reply other threads:[~2015-02-24 14:17 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-02-24 9:24 [PATCH for stable] x86/spinlocks/paravirt: Fix memory corruption on unlock Raghavendra K T
2015-02-24 14:17 ` Greg KH [this message]
2015-02-24 14:47 ` Ingo Molnar
[not found] ` <20150224144737.GA26074@gmail.com>
2015-02-24 15:20 ` Greg KH
2015-02-24 18:29 ` Raghavendra K T
2015-02-24 18:19 ` Raghavendra K T
[not found] ` <54ECC0A1.1080802@linux.vnet.ibm.com>
2015-02-24 18:38 ` Greg KH
2015-02-25 10:08 ` Ingo Molnar
2015-02-25 10:14 ` Christian Borntraeger
[not found] ` <54EDA08E.5080901@de.ibm.com>
2015-02-25 10:29 ` Ingo Molnar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20150224141731.GA16033@kroah.com \
--to=gregkh@linuxfoundation.org \
--cc=a.ryabinin@samsung.com \
--cc=ak@linux.intel.com \
--cc=akpm@linux-foundation.org \
--cc=borntraeger@de.ibm.com \
--cc=dave@stgolabs.net \
--cc=davej@redhat.com \
--cc=hpa@zytor.com \
--cc=jeremy@goop.org \
--cc=konrad.wilk@oracle.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=oleg@redhat.com \
--cc=paul.gortmaker@windriver.com \
--cc=paulmck@linux.vnet.ibm.com \
--cc=pbonzini@redhat.com \
--cc=peterz@infradead.org \
--cc=raghavendra.kt@linux.vnet.ibm.com \
--cc=riel@redhat.com \
--cc=sasha.levin@oracle.com \
--cc=stable@vger.kernel.org \
--cc=tglx@linutronix.de \
--cc=torvalds@linux-foundation.org \
--cc=virtualization@lists.linux-foundation.org \
--cc=waiman.long@hp.com \
--cc=x86@kernel.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).