On Tue, 6 Apr 2021 11:31:09 -0400
Tony Krowiak <akrowiak@xxxxxxxxxxxxx> wrote:
Tony Krowiak (13):The subsequent patches, re introduce this circular locking dependency
s390/vfio-ap: fix circular lockdep when setting/clearing crypto masks
problem. See my kernel messages for the details. The link we severe
in the above patch is re-introduced at several places. One of them is
assign_adapter_store().
Regards,
Halil
[ +0.000236] vfio_ap matrix: MDEV: Registered
[ +0.037919] vfio_mdev 4f77ad87-1e62-4959-8b7a-c677c98d2194: Adding to iommu group 1
[ +0.000092] vfio_mdev 4f77ad87-1e62-4959-8b7a-c677c98d2194: MDEV: group_id = 1
[Apr 8 22:31] ======================================================
[ +0.000002] WARNING: possible circular locking dependency detected
[ +0.000002] 5.12.0-rc6-00016-g5bea90816c56 #57 Not tainted
[ +0.000002] ------------------------------------------------------
[ +0.000002] CPU 1/KVM/6651 is trying to acquire lock:
[ +0.000002] 00000000cef9d508 (&matrix_dev->lock){+.+.}-{3:3}, at: handle_pqap+0x56/0x1c8 [vfio_ap]
[ +0.000011]
but task is already holding lock:
[ +0.000001] 00000000d41f4308 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x90/0x898 [kvm]
[ +0.000038]
which lock already depends on the new lock.
[ +0.000002]
the existing dependency chain (in reverse order) is:
[ +0.000001]
-> #2 (&vcpu->mutex){+.+.}-{3:3}:
[ +0.000004] validate_chain+0x796/0xa20
[ +0.000006] __lock_acquire+0x420/0x7c8
[ +0.000003] lock_acquire.part.0+0xec/0x1e8
[ +0.000002] lock_acquire+0xb8/0x208
[ +0.000002] __mutex_lock+0xa2/0x928
[ +0.000005] mutex_lock_nested+0x32/0x40
[ +0.000002] kvm_s390_cpus_to_pv+0x4e/0xf8 [kvm]
[ +0.000019] kvm_s390_handle_pv+0x1ce/0x6b0 [kvm]
[ +0.000018] kvm_arch_vm_ioctl+0x3ec/0x550 [kvm]
[ +0.000019] kvm_vm_ioctl+0x40e/0x4a8 [kvm]
[ +0.000018] __s390x_sys_ioctl+0xc0/0x100
[ +0.000004] do_syscall+0x7e/0xd0
[ +0.000043] __do_syscall+0xc0/0xd8
[ +0.000004] system_call+0x72/0x98
[ +0.000004]
-> #1 (&kvm->lock){+.+.}-{3:3}:
[ +0.000004] validate_chain+0x796/0xa20
[ +0.000002] __lock_acquire+0x420/0x7c8
[ +0.000002] lock_acquire.part.0+0xec/0x1e8
[ +0.000002] lock_acquire+0xb8/0x208
[ +0.000003] __mutex_lock+0xa2/0x928
[ +0.000002] mutex_lock_nested+0x32/0x40
[ +0.000002] kvm_arch_crypto_set_masks+0x4a/0x2b8 [kvm]
[ +0.000018] vfio_ap_mdev_refresh_apcb+0xd0/0xe0 [vfio_ap]
[ +0.000003] assign_adapter_store+0x1f2/0x240 [vfio_ap]
[ +0.000003] kernfs_fop_write_iter+0x13e/0x1e0
[ +0.000003] new_sync_write+0x10a/0x198
[ +0.000003] vfs_write.part.0+0x196/0x290
[ +0.000002] ksys_write+0x6c/0xf8
[ +0.000003] do_syscall+0x7e/0xd0
[ +0.000002] __do_syscall+0xc0/0xd8
[ +0.000003] system_call+0x72/0x98
[ +0.000002]
-> #0 (&matrix_dev->lock){+.+.}-{3:3}:
[ +0.000004] check_noncircular+0x16e/0x190
[ +0.000002] check_prev_add+0xec/0xf38
[ +0.000002] validate_chain+0x796/0xa20
[ +0.000002] __lock_acquire+0x420/0x7c8
[ +0.000002] lock_acquire.part.0+0xec/0x1e8
[ +0.000002] lock_acquire+0xb8/0x208
[ +0.000002] __mutex_lock+0xa2/0x928
[ +0.000002] mutex_lock_nested+0x32/0x40
[ +0.000003] handle_pqap+0x56/0x1c8 [vfio_ap]
[ +0.000002] handle_pqap+0xe2/0x1d8 [kvm]
[ +0.000019] kvm_handle_sie_intercept+0x134/0x248 [kvm]
[ +0.000019] vcpu_post_run+0x2b6/0x580 [kvm]
[ +0.000018] __vcpu_run+0x27e/0x388 [kvm]
[ +0.000019] kvm_arch_vcpu_ioctl_run+0x10a/0x278 [kvm]
[ +0.000018] kvm_vcpu_ioctl+0x2cc/0x898 [kvm]
[ +0.000018] __s390x_sys_ioctl+0xc0/0x100
[ +0.000003] do_syscall+0x7e/0xd0
[ +0.000002] __do_syscall+0xc0/0xd8
[ +0.000002] system_call+0x72/0x98
[ +0.000003]
other info that might help us debug this:
[ +0.000001] Chain exists of:
&matrix_dev->lock --> &kvm->lock --> &vcpu->mutex
[ +0.000005] Possible unsafe locking scenario:
[ +0.000001] CPU0 CPU1
[ +0.000001] ---- ----
[ +0.000002] lock(&vcpu->mutex);
[ +0.000002] lock(&kvm->lock);
[ +0.000002] lock(&vcpu->mutex);
[ +0.000002] lock(&matrix_dev->lock);
[ +0.000002]
*** DEADLOCK ***
[ +0.000002] 2 locks held by CPU 1/KVM/6651:
[ +0.000002] #0: 00000000d41f4308 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x90/0x898 [kvm]
[ +0.000023] #1: 00000000da2fc508 (&kvm->srcu){....}-{0:0}, at: __vcpu_run+0x1ec/0x388 [kvm]
[ +0.000021]
stack backtrace:
[ +0.000002] CPU: 6 PID: 6651 Comm: CPU 1/KVM Not tainted 5.12.0-rc6-00016-g5bea90816c56 #57
[ +0.000004] Hardware name: IBM 8561 T01 701 (LPAR)
[ +0.000001] Call Trace:
[ +0.000002] [<00000002010e7ef0>] show_stack+0x90/0xf8
[ +0.000007] [<00000002010fb5b2>] dump_stack+0xba/0x108
[ +0.000002] [<000000020053feb6>] check_noncircular+0x16e/0x190
[ +0.000003] [<0000000200541424>] check_prev_add+0xec/0xf38
[ +0.000002] [<0000000200542a06>] validate_chain+0x796/0xa20
[ +0.000003] [<0000000200545430>] __lock_acquire+0x420/0x7c8
[ +0.000002] [<00000002005441a4>] lock_acquire.part.0+0xec/0x1e8
[ +0.000002] [<0000000200544358>] lock_acquire+0xb8/0x208
[ +0.000003] [<000000020110aeea>] __mutex_lock+0xa2/0x928
[ +0.000002] [<000000020110b7a2>] mutex_lock_nested+0x32/0x40
[ +0.000003] [<000003ff8060fb5e>] handle_pqap+0x56/0x1c8 [vfio_ap]
[ +0.000003] [<000003ff80597412>] handle_pqap+0xe2/0x1d8 [kvm]
[ +0.000018] [<000003ff8058c924>] kvm_handle_sie_intercept+0x134/0x248 [kvm]
[ +0.000020] [<000003ff80588e96>] vcpu_post_run+0x2b6/0x580 [kvm]
[ +0.000019] [<000003ff805893de>] __vcpu_run+0x27e/0x388 [kvm]
[ +0.000018] [<000003ff80589d0a>] kvm_arch_vcpu_ioctl_run+0x10a/0x278 [kvm]
[ +0.000019] [<000003ff805704d4>] kvm_vcpu_ioctl+0x2cc/0x898 [kvm]
[ +0.000019] [<0000000200801ee8>] __s390x_sys_ioctl+0xc0/0x100
[ +0.000003] [<000000020046e7ae>] do_syscall+0x7e/0xd0
[ +0.000003] [<00000002010ffc20>] __do_syscall+0xc0/0xd8
[ +0.000002] [<0000000201110c42>] system_call+0x72/0x98
[ +0.000003] INFO: lockdep is turned off.
[ +6.846296] vfio_mdev 4f77ad87-1e62-4959-8b7a-c677c98d2194: Removing from iommu group 1
[ +0.000028] vfio_mdev 4f77ad87-1e62-4959-8b7a-c677c98d2194: MDEV: detaching iommu
[ +0.007677] vfio_ap matrix: MDEV: Unregistering
s390/vfio-ap: use new AP bus interface to search for queue devices
s390/vfio-ap: move probe and remove callbacks to vfio_ap_ops.c
s390/vfio-ap: manage link between queue struct and matrix mdev
s390/vfio-ap: introduce shadow APCB
s390/vfio-ap: refresh guest's APCB by filtering APQNs assigned to mdev
s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
s390/vfio-ap: allow hot plug/unplug of AP resources using mdev device
s390/zcrypt: driver callback to indicate resource in use
s390/vfio-ap: implement in-use callback for vfio_ap driver
s390/vfio-ap: sysfs attribute to display the guest's matrix
s390/zcrypt: notify drivers on config changed and scan complete
callbacks
s390/vfio-ap: update docs to include dynamic config support