Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2520803pxa; Mon, 24 Aug 2020 17:11:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyA6oVhzcT8aFKRCCy3QX7RtPEqwfbKfWP0ycN/20bJx3n+nTa66DUDNnoDEg3Yh1+7HZ2C X-Received: by 2002:a50:a68a:: with SMTP id e10mr7874291edc.189.1598314277939; Mon, 24 Aug 2020 17:11:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598314277; cv=none; d=google.com; s=arc-20160816; b=F1CXdbHjzswa95JRNbAMmC4MhajI6tQSdJaV6OWbLT7ZZpgsPY6DnVXOBfnHQj8YTi vDUFdr+5McfhIejuwz84j+earkLP7Vv1v1VnxfAxMSljXdptmCyHA17LWnzXVSQUt9Vq 7lAZIrAD3Ckdnzt1qrZDpy3FFSbDaAMnQ51bQWR0gHk7Gir8+Qc0KEKjYF4Mydz+054/ wMDOksXCF5OeX1UbGP8Ac7YMPkjoXt/FqUtUmnrZ0LGAc3/F7oH6mpI3U2kWRMn/mQ9K GjSN4I+ySy9AY20UKMN6U7LVMOFRJ5YgnKKaciZuHjqOFBr37GxXzx/kyHA/2Qg98+LP +f9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=DMYgrdsisOfaYB5Vt+WInMgy/hU88t3JaJRlvdyaNxk=; b=RBZoSZiw+5pL6xqGgahYAS028G+GwSHOl2p3YiRrDatPsVOQhovjeBoeFfn/1Iuw9+ ZyhrjHAAc+lVmVTeVIZIpmMPpJaEcuBKgXXnnhbq2VBlCWu9d/vq18gveNALJJvJbX/0 hiM398eb2spdVJiQ8z7Aio7MPtEZ1Hu+c6c4lKMrDF33+66x8SwFvqw00E/9VRR78NaU IlJwmkyKR1Rqq7sSG8VsoTVACHwyCrc8tsroSzTu+pZd12mLpTyMv/x3yXKrbEn6vqLn ky7d65ZkHtUjGIZ1JmlaGyXlzQ76FdiGN/RtXCstcSgPqldJoYywxZhtQBQwxpzdDGU0 M+vg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h8si3343386edw.611.2020.08.24.17.10.54; Mon, 24 Aug 2020 17:11:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727968AbgHYAJX (ORCPT + 99 others); Mon, 24 Aug 2020 20:09:23 -0400 Received: from mga14.intel.com ([192.55.52.115]:65187 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726189AbgHYAJW (ORCPT ); Mon, 24 Aug 2020 20:09:22 -0400 IronPort-SDR: in6mQyaE3lxWCYtRDXPWM6P4GGEKYWJCFKDgTEk2WgUS4sOkZKc1/on3YEaQs9QD8vFVgG/120 1a4yRG9JIcdQ== X-IronPort-AV: E=McAfee;i="6000,8403,9723"; a="155266726" X-IronPort-AV: E=Sophos;i="5.76,350,1592895600"; d="scan'208";a="155266726" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Aug 2020 17:09:21 -0700 IronPort-SDR: 8YS13PJ3V8TKh9YR7Yhpg2pMk3nq/iOi8BK+54EBEiC07H5IaJaawmddGdUrWtpr6gKiVj2mZp SpWR03Ye0FAA== X-IronPort-AV: E=Sophos;i="5.76,350,1592895600"; d="scan'208";a="443424528" Received: from sjchrist-ice.jf.intel.com (HELO sjchrist-ice) ([10.54.31.34]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Aug 2020 17:09:21 -0700 Date: Mon, 24 Aug 2020 17:09:20 -0700 From: Sean Christopherson To: Jim Mattson Cc: Vitaly Kuznetsov , Paolo Bonzini , Wanpeng Li , kvm list , LKML Subject: Re: [PATCH] KVM: VMX: fix crash cleanup when KVM wasn't used Message-ID: <20200825000920.GB15046@sjchrist-ice> References: <20200401081348.1345307-1-vkuznets@redhat.com> <20200822034046.GE4769@sjchrist-ice> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 24, 2020 at 03:45:26PM -0700, Jim Mattson wrote: > On Mon, Aug 24, 2020 at 11:57 AM Jim Mattson wrote: > > > > On Fri, Aug 21, 2020 at 8:40 PM Sean Christopherson > > wrote: > > > I agree the code is a mess (kvm_init() and kvm_exit() included), but I'm > > > pretty sure hardware_disable_nolock() is guaranteed to be a nop as it's > > > impossible for kvm_usage_count to be non-zero if vmx_init() hasn't > > > finished. > > > > Unless I'm missing something, there's no check for a non-zero > > kvm_usage_count on this path. There is such a check in > > hardware_disable_all_nolock(), but not in hardware_disable_nolock(). > > However, cpus_hardware_enabled shouldn't have any bits set, so > everything's fine. Nothing to see here, after all. Ugh, I forgot that hardware_disable_all_nolock() does a BUG_ON() instead of bailing on !kvm_usage_count.