Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp3878615ybx; Mon, 4 Nov 2019 04:23:03 -0800 (PST) X-Google-Smtp-Source: APXvYqwnDt+yY2YqgiZfj2YZ0/mBbTIXIeEJuiv5X27AEnpIpGkdLZljKBRH+KtisRkfvE/wy40b X-Received: by 2002:a50:b634:: with SMTP id b49mr29024053ede.77.1572870183789; Mon, 04 Nov 2019 04:23:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572870183; cv=none; d=google.com; s=arc-20160816; b=r40J4W/C7p18CxpVcvZ9AgRvzliVMi3lfHUFkHrFsYKToK1tRcXzwo/6PQWgL1EYbU LWmLCR89gigwqFaeJbdIttOpUM1bvVVdwPIqk6kuKzIHHd8/U9G5abqt8yNROKXQzs4Q CgKFONHVA9CYqO9R3VTjaaMFEJB0WV2H7Y941NkYdmAAS7a/4GzS9IQ0aVOSqJ9e4DLF lqE9MbkAh8rPMEiNZW9wdXrOHdEhBvvl276afnC8b7TGDG0/3F/9/J1CGXt2LUZhWcMG xcPt9rXOM+Z/8FE0e+WlZBdwR2lUCgzfPYwlb2aMFvbieVNbMP/2JJfmqVjag3SM4K8J p+7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject; bh=SnAmxt67QITd4idD27zmFwQoIn//FDiJRgfk5w70PuY=; b=SqDE25rcTd+MfDBHHj1xUG7gs4V/yFh/4h5XzA/2oABrDC12hwXWqpjqVHCx9BlpJA NxZtyVcPRHnbeU7HFTb7Yg5RZ89nmJk2Xuxov7AX5T+wGn5AYghyiVVpYyFtcDIdAd1S MKCgf3O9O4OGuVy9ho3oIZfdK2uB3Z2UKTT1GreFiaL/uDctOXIR8He4JtDbeKdkS4Ec 9VRI5pTdyY1nHv66Hyg2HFEydzkE25rLLIvlBr1nRfCYT5VFcnVZCsy8gvyevoCjIdwi vdGYeu837xTg9Usv4uuko8ivM1Okdr9wgiZZ55X65u81EeyBjob6ie1QTh/pD/5g28Fu oXLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h5si7582093edj.25.2019.11.04.04.22.40; Mon, 04 Nov 2019 04:23:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727236AbfKDMV4 (ORCPT + 99 others); Mon, 4 Nov 2019 07:21:56 -0500 Received: from mx1.redhat.com ([209.132.183.28]:56156 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726100AbfKDMV4 (ORCPT ); Mon, 4 Nov 2019 07:21:56 -0500 Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id BD83D3DD47 for ; Mon, 4 Nov 2019 12:21:55 +0000 (UTC) Received: by mail-wm1-f70.google.com with SMTP id z5so6073259wma.5 for ; Mon, 04 Nov 2019 04:21:55 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=SnAmxt67QITd4idD27zmFwQoIn//FDiJRgfk5w70PuY=; b=diGRn4xFazAxJb6Fvtq8N6qN7F9+qYpjRUYF32eSU7f4uTvHLYYLjtqAC8iyxN6s1x 8a7O7nVgc9kG/zQWFyAYRMzdl9eaA0x02eyPqUzhN7u8YqZTydlOrrkqt0eYc5warXTB Sqj7FtM5P/ytZeBE6h50QIFpNo6WLE1fKP1bikMh9hSWOZdlkgo3OGx+u0e4ifQQXGLu uBdJOGMRBBRADNlL9Sozc06bcCN0V39+3jdnIrbEREjR+ayhTtklrc7xlRLGP2pqzTY6 as7o9zahLxQ158OtNiXYz0eeU04yEe18KiOjk5VN1DVo4DRKa0rZxQcGDggH4Rk8RRAZ IFlg== X-Gm-Message-State: APjAAAUUDTwfsLJC5PeBzFrY/Cgz9Vo9bTl+3oiDfeaObZC3BRNBk0Px xmhqABQNhdoKWqKTqdDwWv8oNlz3whgs7U9l4m8Qv3Ps8RFBGCfyoPkMXR+6qsK6pn4HacNymov Rm+wRe1jAjcPndyIxpnPz6xtI X-Received: by 2002:a5d:4612:: with SMTP id t18mr21810270wrq.255.1572870114414; Mon, 04 Nov 2019 04:21:54 -0800 (PST) X-Received: by 2002:a5d:4612:: with SMTP id t18mr21810251wrq.255.1572870114117; Mon, 04 Nov 2019 04:21:54 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:4051:461:136e:3f74? ([2001:b07:6468:f312:4051:461:136e:3f74]) by smtp.gmail.com with ESMTPSA id i13sm9382368wrp.12.2019.11.04.04.21.52 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 04 Nov 2019 04:21:53 -0800 (PST) Subject: Re: [PATCH 2/2] KVM: Fix rcu splat if vm creation fails To: Wanpeng Li Cc: LKML , kvm , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel References: <1572848879-21011-1-git-send-email-wanpengli@tencent.com> <1572848879-21011-2-git-send-email-wanpengli@tencent.com> From: Paolo Bonzini Openpgp: preference=signencrypt Message-ID: Date: Mon, 4 Nov 2019 13:21:52 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/11/19 13:16, Wanpeng Li wrote: >> I don't understand this one, hasn't >> >> WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); >> >> decreased the conut already? With your patch the refcount would then >> underflow. > > r = kvm_arch_init_vm(kvm, type); > if (r) > goto out_err_no_arch_destroy_vm; > > out_err_no_disable: > kvm_arch_destroy_vm(kvm); > WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); > out_err_no_arch_destroy_vm: > > So, if kvm_arch_init_vm() fails, we will not execute > WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); Uuh of course. But I'd rather do the opposite: move the refcount_set earlier so that refcount_dec_and_test can be moved after no_arch_destroy_vm. Moving the refcount_set is not strictly necessary, but avoids the introduction of yet another label. diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index e22ff63e5b1a..e7a07132cd7f 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -650,6 +650,7 @@ static struct kvm *kvm_create_vm(unsigned long type) if (init_srcu_struct(&kvm->irq_srcu)) goto out_err_no_irq_srcu; + refcount_set(&kvm->users_count, 1); for (i = 0; i < KVM_ADDRESS_SPACE_NUM; i++) { struct kvm_memslots *slots = kvm_alloc_memslots(); @@ -667,7 +668,6 @@ static struct kvm *kvm_create_vm(unsigned long type) goto out_err_no_arch_destroy_vm; } - refcount_set(&kvm->users_count, 1); r = kvm_arch_init_vm(kvm, type); if (r) goto out_err_no_arch_destroy_vm; @@ -696,8 +696,8 @@ static struct kvm *kvm_create_vm(unsigned long type) hardware_disable_all(); out_err_no_disable: kvm_arch_destroy_vm(kvm); - WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); out_err_no_arch_destroy_vm: + WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); for (i = 0; i < KVM_NR_BUSES; i++) kfree(kvm_get_bus(kvm, i)); for (i = 0; i < KVM_ADDRESS_SPACE_NUM; i++)