Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp546594pxk; Wed, 2 Sep 2020 08:27:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxDIGMtGFAgdSVLDsH7D1Atn/C3CnhniOa4OCwHfGHaFclHYvt0W/7DBJJbZy/cGzyb4/+j X-Received: by 2002:aa7:d353:: with SMTP id m19mr554341edr.275.1599060437065; Wed, 02 Sep 2020 08:27:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599060437; cv=none; d=google.com; s=arc-20160816; b=JDgHfOwEtcJN0IuhlZG+SX1pw7OUWrMZig4JJYf+FxJ8MK2A4Ghp+L1FlsHEjcX0+y SOQUof2xah4tX0tqZRFLh73FItZ3Bl1yxI1+YBgPaMu+bdAMYng68+zy+Ct8Y6Lkw0nx 2q+a43CFDUAYG2EcON2oFCRoUUXyn9mYZMI9kbuy4YnwmiWUO1WZn0v3CXzhGkrtvDzh IMJBnrJNP58Uf2TzF4mq0A+LWLZZOYmoYPF0S943vUc69dhSsCmaaWazJO9tucXOksDu Kge48Dhchf1+vljj4p3ws69T+6oRnvsLqP9XSJVUfXJdaGujgXDHXEYXpF2uciKQjWb+ OgSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=J8KLpy8GJ3/o5hayUAcLWdRs1vR8e2Tag+M1J2njOZA=; b=YK6MilHnMvAN3VSCUk+ifvLQ7Ghehanb12gRzHXq46mI0WoGWvbZzQevNvpfuprMfc jm6DDAchdgYO/uXw5U9/esQ86wnJjIdFWdaddzlWQeCXj8mBlI8ELsao1hFEXmm4y3uR hj/VFqNC3YRJGecVlhkXDLYmBPRexERMPI4AvVYzbJ01JyS7Kfs92G0eJe4KLt3VG24u IQ9D5LcVxnrgIBTQ+xmgF5Wn4O4VvNUEZ6YfDikzFtJsKe0mKX2n7ungERIb8+JdkYKQ D8VVP5oma8FlsIVCgBkZvSHQO11cGrlZzHTD+I1F+Yze7mxZe4uTDe/UsWxZkLkV4jY5 4bFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k3si2807462eds.225.2020.09.02.08.26.53; Wed, 02 Sep 2020 08:27:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727892AbgIBPYM (ORCPT + 99 others); Wed, 2 Sep 2020 11:24:12 -0400 Received: from mga09.intel.com ([134.134.136.24]:44207 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726637AbgIBPVD (ORCPT ); Wed, 2 Sep 2020 11:21:03 -0400 IronPort-SDR: WXReCybxJdxHS2J5btFqGPIY4jVz16bnTx3g5NMWm6AWaeZZ9fphe4awJpXVYNpyo89GDnOMd/ 4l0e66/WAcJw== X-IronPort-AV: E=McAfee;i="6000,8403,9732"; a="158398293" X-IronPort-AV: E=Sophos;i="5.76,383,1592895600"; d="scan'208";a="158398293" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Sep 2020 08:18:50 -0700 IronPort-SDR: 84PhDN9HHr/+zSjnMDCSGNAPptVMhcinqyKwasO4yk24J3FhV2mRwDQaVWAeny12WobOhMqmF2 k/mrv8Lkysdg== X-IronPort-AV: E=Sophos;i="5.76,383,1592895600"; d="scan'208";a="446557920" Received: from sjchrist-ice.jf.intel.com (HELO sjchrist-ice) ([10.54.31.34]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Sep 2020 08:18:49 -0700 Date: Wed, 2 Sep 2020 08:18:48 -0700 From: Sean Christopherson To: Vitaly Kuznetsov Cc: Jim Mattson , Paolo Bonzini , Wanpeng Li , kvm list , LKML Subject: Re: [PATCH] KVM: VMX: fix crash cleanup when KVM wasn't used Message-ID: <20200902151848.GA11695@sjchrist-ice> References: <20200401081348.1345307-1-vkuznets@redhat.com> <20200822034046.GE4769@sjchrist-ice> <20200825000920.GB15046@sjchrist-ice> <87pn75wzpj.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87pn75wzpj.fsf@vitty.brq.redhat.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 01, 2020 at 12:36:40PM +0200, Vitaly Kuznetsov wrote: > Sean Christopherson writes: > > > On Mon, Aug 24, 2020 at 03:45:26PM -0700, Jim Mattson wrote: > >> On Mon, Aug 24, 2020 at 11:57 AM Jim Mattson wrote: > >> > > >> > On Fri, Aug 21, 2020 at 8:40 PM Sean Christopherson > >> > wrote: > >> > > I agree the code is a mess (kvm_init() and kvm_exit() included), but I'm > >> > > pretty sure hardware_disable_nolock() is guaranteed to be a nop as it's > >> > > impossible for kvm_usage_count to be non-zero if vmx_init() hasn't > >> > > finished. > >> > > >> > Unless I'm missing something, there's no check for a non-zero > >> > kvm_usage_count on this path. There is such a check in > >> > hardware_disable_all_nolock(), but not in hardware_disable_nolock(). > >> > >> However, cpus_hardware_enabled shouldn't have any bits set, so > >> everything's fine. Nothing to see here, after all. > > > > Ugh, I forgot that hardware_disable_all_nolock() does a BUG_ON() instead of > > bailing on !kvm_usage_count. > > But we can't hit this BUG_ON(), right? I'm failing to see how > hardware_disable_all_nolock() can be reached with kvm_usage_count==0. Correct, I was mostly talking to myself.