Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp3883507ybx; Mon, 4 Nov 2019 04:28:06 -0800 (PST) X-Google-Smtp-Source: APXvYqzUbYfryFo+aX6n6ISkJol5IUKJuTpR3k2MG2BdJIhFK7wQiw7+Ztcpeaant5xuGARbYiYL X-Received: by 2002:aa7:c645:: with SMTP id z5mr29290510edr.204.1572870486094; Mon, 04 Nov 2019 04:28:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572870486; cv=none; d=google.com; s=arc-20160816; b=Vh0uS+JvurbeJJPcv1pnVuXTlfQIi+Bg0z7J1bcbWxn8Xf9tM5H2KuFhGH/pY3EG/6 TTz+xL1VrFm90n8LMk8cgKRtTAvNOv8gq61uhSu5gnx0kpzzHtHY+fyGh4FcEOFpsWPQ pJTjgQp+JODZtRGMo/zTsT3nEZ9MGl+kXcw7ETHwFGY/f6mzbc3yaEAdrwqCZ86wqtQC gpzrFe0DDuUReP0DCrfXVxbS5Wt0JXBBhXDxQIez9zgWbZu9SVHNFA6jlikakFyVxoCz 8alt4aIM7YE6bRvdECj7qmNMe6fzRVsYnaQfstCTVkYO8gRi3FqnhQvMazKKCFSlZeGy y6DA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject; bh=ozlzVOl3s+SOV/pUKKavAs7xHDlg0fo60/2LxRPsJKs=; b=TT+HnVkopp4hYopFFsi9Y1HOrh00npqDItInZkakTPGeo8UJ9xg66uILxLOD8WUXxx NK8Oxc/C6uyxgSQaPOCfzIMWlCZuGtdOafSxD3Apo0WQGWg8y0+ush81J7XD8kZ8wdu3 nrEYdGK4qw0f8QsXze5jzsHCBRByZmw9c3s8IWdyUjZEiKeJM2aHWEBzyzEg5yWQ2KAb YHySAyAC/LRYCHIXgs9F2/gccjPPwO6MHa/EnzgpvNZMWQ4AIqxtl02Ib0Bbr8tU050q MtP3cKOxIwjYh7jDM0UHw1x3+Nk6pnotNNuzjgIMdXlhXnU0BEngyeZCHNXScxF11iyU wIfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t11si2383341eju.106.2019.11.04.04.27.42; Mon, 04 Nov 2019 04:28:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728812AbfKDM1B (ORCPT + 99 others); Mon, 4 Nov 2019 07:27:01 -0500 Received: from mx1.redhat.com ([209.132.183.28]:38766 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728502AbfKDM1B (ORCPT ); Mon, 4 Nov 2019 07:27:01 -0500 Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A192B85529 for ; Mon, 4 Nov 2019 12:27:00 +0000 (UTC) Received: by mail-wm1-f72.google.com with SMTP id d140so5950687wmd.1 for ; Mon, 04 Nov 2019 04:27:00 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ozlzVOl3s+SOV/pUKKavAs7xHDlg0fo60/2LxRPsJKs=; b=pYn/d5TtkjVFWO48Q29tiQdOPjS4B+SRDz3evBypzysM0cP76jxTeDdn2CXKCYyTo9 CvcuBPgzvvQ6qbBMqPrFTylczKCqGVBfdiw78QC47IHBlque84LefOsARLevUelN5SFY /C7FBRC+m7iSjsSkE8QCwFKz1M+Vz1xKOAOhzfEYZjyT3kGVPBotnvoKBZOE9ggTI22b Bu2ZqQyjA6OD3itY32oXmsyNBeZ40gDzXfcRDNFSPRKP24bkU+FEKyM7o/YWNGksiO+K vkfbnk3d8HV4cKGDxHX52NQk8xMKbMaRcK1j7fe8qXNNhFhAKnkPCSboi6tQEAYXi66m ERdg== X-Gm-Message-State: APjAAAUM7SZCcmRtTxozcBBgx4N+VRojy+Gu6jK3dOtf4wS9gGp/v7Lg +qJr5vDB6D2xgsLHMB0R3ZkJC1TAuxVvaJhoE4Iyv1ajaMwSTwwjrkcMHY88lkT4+ZS9UT2Ykb4 fCWgjaJ6ySZ9TDK/0Uiy+MhFH X-Received: by 2002:a7b:c38c:: with SMTP id s12mr14767795wmj.84.1572870419166; Mon, 04 Nov 2019 04:26:59 -0800 (PST) X-Received: by 2002:a7b:c38c:: with SMTP id s12mr14767760wmj.84.1572870418861; Mon, 04 Nov 2019 04:26:58 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:4051:461:136e:3f74? ([2001:b07:6468:f312:4051:461:136e:3f74]) by smtp.gmail.com with ESMTPSA id b196sm20734566wmd.24.2019.11.04.04.26.58 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 04 Nov 2019 04:26:58 -0800 (PST) Subject: Re: [PATCH 2/2] KVM: Fix rcu splat if vm creation fails To: Wanpeng Li Cc: LKML , kvm , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel References: <1572848879-21011-1-git-send-email-wanpengli@tencent.com> <1572848879-21011-2-git-send-email-wanpengli@tencent.com> From: Paolo Bonzini Openpgp: preference=signencrypt Message-ID: <9e88b51b-9b37-3f14-8d98-0bb3ddbe6378@redhat.com> Date: Mon, 4 Nov 2019 13:26:57 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/11/19 13:25, Wanpeng Li wrote: > On Mon, 4 Nov 2019 at 20:21, Paolo Bonzini wrote: >> >> On 04/11/19 13:16, Wanpeng Li wrote: >>>> I don't understand this one, hasn't >>>> >>>> WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); >>>> >>>> decreased the conut already? With your patch the refcount would then >>>> underflow. >>> >>> r = kvm_arch_init_vm(kvm, type); >>> if (r) >>> goto out_err_no_arch_destroy_vm; >>> >>> out_err_no_disable: >>> kvm_arch_destroy_vm(kvm); >>> WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); >>> out_err_no_arch_destroy_vm: >>> >>> So, if kvm_arch_init_vm() fails, we will not execute >>> WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); >> >> Uuh of course. But I'd rather do the opposite: move the refcount_set >> earlier so that refcount_dec_and_test can be moved after >> no_arch_destroy_vm. Moving the refcount_set is not strictly necessary, >> but avoids the introduction of yet another label. >> >> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c >> index e22ff63e5b1a..e7a07132cd7f 100644 >> --- a/virt/kvm/kvm_main.c >> +++ b/virt/kvm/kvm_main.c >> @@ -650,6 +650,7 @@ static struct kvm *kvm_create_vm(unsigned long type) >> if (init_srcu_struct(&kvm->irq_srcu)) >> goto out_err_no_irq_srcu; >> >> + refcount_set(&kvm->users_count, 1); >> for (i = 0; i < KVM_ADDRESS_SPACE_NUM; i++) { >> struct kvm_memslots *slots = kvm_alloc_memslots(); >> >> @@ -667,7 +668,6 @@ static struct kvm *kvm_create_vm(unsigned long type) >> goto out_err_no_arch_destroy_vm; >> } >> >> - refcount_set(&kvm->users_count, 1); >> r = kvm_arch_init_vm(kvm, type); >> if (r) >> goto out_err_no_arch_destroy_vm; >> @@ -696,8 +696,8 @@ static struct kvm *kvm_create_vm(unsigned long type) >> hardware_disable_all(); >> out_err_no_disable: >> kvm_arch_destroy_vm(kvm); >> - WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); >> out_err_no_arch_destroy_vm: >> + WARN_ON_ONCE(!refcount_dec_and_test(&kvm->users_count)); >> for (i = 0; i < KVM_NR_BUSES; i++) >> kfree(kvm_get_bus(kvm, i)); >> for (i = 0; i < KVM_ADDRESS_SPACE_NUM; i++) > > Good point, I will handle these two patches later. No problem, I can send v2 after testing. Paolo