From: Julien Grall <julien.grall@arm.com>
To: Konrad Rzeszutek Wilk <konrad@kernel.org>,
xen-devel@lists.xenproject.org, ross.lagerwall@citrix.com,
konrad.wilk@oracle.com, sstabellini@kernel.org
Cc: andrew.cooper3@citrix.com, jbeulich@suse.com
Subject: Re: [PATCH v3 13/17] livepatch: Expand spin_debug_disable in [apply|revert]_payload
Date: Thu, 14 Sep 2017 14:47:48 +0100 [thread overview]
Message-ID: <dc105b9e-ae18-72f7-7c3f-5767cc55b59b@arm.com> (raw)
In-Reply-To: <20170912003726.368-14-konrad.wilk@oracle.com>
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
> Under ARM64 the vmap calls were all done with IRQs disabled which
> didn't trip the spinlock debug check (as seen on x86):
Well, I think it does not happen because spin_debug_enable() is never
called on ARM at boot. So atomic_read(&spin_debug) can never return a
positive value and hence the check will not be performed.
We should probably enable spin_debug on ARM.
> livepatch.c:1330: livepatch: xen_hello_world: timeout is 30000000ns
> livepatch.c:1437: livepatch: xen_hello_world: CPU3 - IPIing the other 3 CPUs
> Applying xen_hello_world... (XEN) livepatch: xen_hello_world: Applying 1 functions
> Xen BUG at spinlock.c:47
> ..snip..
> [<ffff82d0802379b1>] spinlock.c#check_lock+0x3e/0x44
> [<ffff82d080237a70>] _spin_lock+0x11/0x4a
> [<ffff82d08023e2de>] __vmap+0x78/0x381
> [<ffff82d080219c13>] livepatch.c#livepatch_quiesce+0xc4/0x1bf
> [<ffff82d080219ee3>] livepatch.c#apply_payload+0x3a/0x102
> [<ffff82d08021a19e>] check_for_livepatch_work+0x1f3/0x390
> [<ffff82d08027b7f4>] domain.c#continue_idle_domain+0x1b/0x22
>
> But are definitly the case on x86 - so we expand the scope
s/definitly/definitely/
> of the spin_debug_disable.
>
> Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> ---
> xen/common/livepatch.c | 30 ++++++++++++++++--------------
> 1 file changed, 16 insertions(+), 14 deletions(-)
>
> diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
> index 93083cda1a..2f5ee1ae75 100644
> --- a/xen/common/livepatch.c
> +++ b/xen/common/livepatch.c
> @@ -1154,22 +1154,22 @@ static int apply_payload(struct payload *data)
> printk(XENLOG_INFO LIVEPATCH "%s: Applying %u functions\n",
> data->name, data->nfuncs);
>
> + /*
> + * Since we are running with IRQs disabled and the hooks may call common
> + * code - which expects certain spinlocks to run with IRQs enabled - we
> + * temporarily disable the spin locks IRQ state checks.
> + */
> + spin_debug_disable();
> rc = livepatch_quiesce(data->funcs, data->nfuncs);
> if ( rc )
> {
> + spin_debug_enable();
> printk(XENLOG_ERR LIVEPATCH "%s: unable to quiesce!\n", data->name);
> return rc;
> }
>
> - /*
> - * Since we are running with IRQs disabled and the hooks may call common
> - * code - which expects certain spinlocks to run with IRQs enabled - we
> - * temporarily disable the spin locks IRQ state checks.
> - */
> - spin_debug_disable();
> for ( i = 0; i < data->n_load_funcs; i++ )
> data->load_funcs[i]();
> - spin_debug_enable();
>
> ASSERT(!local_irq_is_enabled());
>
> @@ -1177,6 +1177,7 @@ static int apply_payload(struct payload *data)
> arch_livepatch_apply(&data->funcs[i]);
>
> livepatch_revive();
> + spin_debug_enable();
>
> /*
> * We need RCU variant (which has barriers) in case we crash here.
> @@ -1195,9 +1196,16 @@ static int revert_payload(struct payload *data)
>
> printk(XENLOG_INFO LIVEPATCH "%s: Reverting\n", data->name);
>
> + /*
> + * Since we are running with IRQs disabled and the hooks may call common
> + * code - which expects certain spinlocks to run with IRQs enabled - we
> + * temporarily disable the spin locks IRQ state checks.
> + */
> + spin_debug_disable();
> rc = livepatch_quiesce(data->funcs, data->nfuncs);
> if ( rc )
> {
> + spin_debug_enable();
> printk(XENLOG_ERR LIVEPATCH "%s: unable to quiesce!\n", data->name);
> return rc;
> }
> @@ -1205,19 +1213,13 @@ static int revert_payload(struct payload *data)
> for ( i = 0; i < data->nfuncs; i++ )
> livepatch_revert(&data->funcs[i]);
>
> - /*
> - * Since we are running with IRQs disabled and the hooks may call common
> - * code - which expects certain spinlocks to run with IRQs enabled - we
> - * temporarily disable the spin locks IRQ state checks.
> - */
> - spin_debug_disable();
> for ( i = 0; i < data->n_unload_funcs; i++ )
> data->unload_funcs[i]();
> - spin_debug_enable();
>
> ASSERT(!local_irq_is_enabled());
>
> livepatch_revive();
> + spin_debug_enable();
>
> /*
> * We need RCU variant (which has barriers) in case we crash here.
>
Cheers,
--
Julien Grall
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2017-09-14 13:47 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-09-12 0:37 [PATCH v3] Livepatching patch set for 4.10 Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 01/17] livepatch: Expand check for safe_for_reapply if livepatch has only .rodata Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 02/17] livepatch: Tighten alignment checks Konrad Rzeszutek Wilk
2017-09-12 14:28 ` Jan Beulich
2017-09-12 0:37 ` [PATCH v3 03/17] livepatch: Include sizes when an mismatch occurs Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 04/17] xen/livepatch/ARM32: Don't load and crash on livepatches loaded with wrong text alignment Konrad Rzeszutek Wilk
2017-09-14 11:36 ` Julien Grall
2017-09-12 0:37 ` [PATCH v3 05/17] alternative/x86/arm32: Align altinstructions (and altinstr_replacement) sections Konrad Rzeszutek Wilk
2017-09-12 14:40 ` Jan Beulich
2017-09-12 0:37 ` [PATCH v3 06/17] xen/livepatch/x86/arm32: Force .livepatch.depends section to be uint32_t aligned Konrad Rzeszutek Wilk
2017-09-14 12:27 ` Julien Grall
2017-09-19 0:32 ` Konrad Rzeszutek Wilk
2017-09-19 11:05 ` Julien Grall
2017-09-20 14:01 ` Wei Liu
2017-09-20 21:17 ` Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 07/17] livepatch/arm/x86: Strip note_depends symbol from test-cases Konrad Rzeszutek Wilk
2017-09-12 14:48 ` Jan Beulich
2017-09-12 23:46 ` Konrad Rzeszutek Wilk
2017-09-13 8:51 ` Jan Beulich
2017-09-13 16:28 ` Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 08/17] livepatch/tests: Make sure all .livepatch.funcs sections are read-only Konrad Rzeszutek Wilk
2017-09-12 14:49 ` Jan Beulich
2017-09-19 0:36 ` Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 09/17] livepatch/arm[32, 64]: Modify livepatch_funcs Konrad Rzeszutek Wilk
2017-09-14 13:20 ` Julien Grall
2017-09-19 0:35 ` Konrad Rzeszutek Wilk
2017-09-19 11:09 ` Julien Grall
2017-09-12 0:37 ` [PATCH v3 10/17] livepatch: Declare live patching as a supported feature Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 11/17] livepatch/x86/arm[32, 64]: Use common vmap code for applying Konrad Rzeszutek Wilk
2017-09-12 14:50 ` Andrew Cooper
2017-09-12 0:37 ` [PATCH v3 12/17] livepatch/x86/arm[32, 64]: Unify arch_livepatch_revert Konrad Rzeszutek Wilk
2017-09-14 13:23 ` Julien Grall
2017-09-12 0:37 ` [PATCH v3 13/17] livepatch: Expand spin_debug_disable in [apply|revert]_payload Konrad Rzeszutek Wilk
2017-09-14 13:47 ` Julien Grall [this message]
2017-09-12 0:37 ` [PATCH v3 14/17] livepatch/x86/arm: arch/x86/mm: generalize do_page_walk() and implement arch_livepatch_lookup_mfn Konrad Rzeszutek Wilk
2017-09-12 14:54 ` Jan Beulich
2017-09-13 0:23 ` Konrad Rzeszutek Wilk
2017-09-13 8:54 ` Jan Beulich
2017-09-14 13:54 ` Julien Grall
2017-09-12 0:37 ` [PATCH v3 15/17] livepatch/x86/arm: Utilize the arch_livepatch_lookup_mfn Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 16/17] livepatch: Add local and global symbol resolution Konrad Rzeszutek Wilk
2017-09-12 0:37 ` [PATCH v3 17/17] livepatch: Add xen_local_symbols test-case Konrad Rzeszutek Wilk
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=dc105b9e-ae18-72f7-7c3f-5767cc55b59b@arm.com \
--to=julien.grall@arm.com \
--cc=andrew.cooper3@citrix.com \
--cc=jbeulich@suse.com \
--cc=konrad.wilk@oracle.com \
--cc=konrad@kernel.org \
--cc=ross.lagerwall@citrix.com \
--cc=sstabellini@kernel.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).