Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp262651pxu; Tue, 5 Jan 2021 10:10:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJzbZMsNglUnUvSCVq4uDvaJwYlyahNLwb+oTES7zd86jir4IZKcLGyF9xbRNr3xs1/XCII3 X-Received: by 2002:a05:6402:17cb:: with SMTP id s11mr967090edy.119.1609870236376; Tue, 05 Jan 2021 10:10:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1609870236; cv=none; d=google.com; s=arc-20160816; b=vImPhf06K5uTC8IECn5RLZI7WgZqkoNAv8FczQaET3CyL8xHukaeVFkj/wkNhL6niL /F6/b31R3Dbx6E0xTab3VKt6DsS5LYnDfx4Gs8euOSAeGXfTqGUp111qK6qsqOiLyigw bxVsqkU2+qdId6nWwsCr+EQ+iJPRxJWR8jfmBZW68N/Z1XwXsPHcba1IUEFkVc/suuox EyjyqL8xMc6nEF8hTOT8NbLIBYNNLmEHTA84g3JmHtK3lyedryYl3DbnMiMcwKFOSX06 sJHQMfH7/lJ2UjG/9tfJFulU85XsWtXZU6dJhcDWcuHUfBj+l6paV66UEqU32fTqV1aO 8PVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=RUDwOl/6SWNVrAvOoL5QSIp3GpHmmT4c6iVV0F9vJZ0=; b=ROSImDodwmZkrOmaZbe/J1zdPMQ2nPUwYQKI06k5ca7fG1fu9mbP1M7Kss/eB6WlAC PT4Yas+8jFGbkFMuuDzfF9IJW3hZ7ottETSCLcIM9zNOWeBfGhE15t+doNLEeiDn5Vig N+jS4PD7oMd1xdl8HSvlHpqtz5l0jp9h69whHozkUgMWkQNSBYVT/2Uo5r3ZPUpWa7Dy IVzpGUaEcI2Fie3dQcLgk632w9ToHiszE/WJFfBTPI/zUsmP6nJaTfoqPSwGMzmjD96B n6AvaaI5ogxXVZiGVHj6CikAiQWxxYlh8sC5NwLlT4HxJd1vK7SP5dMSDVuW1s2lilTy FGHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HvOpBu0C; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dg17si185190edb.531.2021.01.05.10.10.13; Tue, 05 Jan 2021 10:10:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HvOpBu0C; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729325AbhAESH4 (ORCPT + 99 others); Tue, 5 Jan 2021 13:07:56 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:53710 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726306AbhAESH4 (ORCPT ); Tue, 5 Jan 2021 13:07:56 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1609869989; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=RUDwOl/6SWNVrAvOoL5QSIp3GpHmmT4c6iVV0F9vJZ0=; b=HvOpBu0Crhx6GOeQFcvidKo1ujs7nrM+6paXTMzIrg0P7ibE9pQLJZbXvGVSlrecw1yYMR 644+FBqpu/CJWik//YaIbzwB5VuvmDipm7cnqK/ZNVqVO3Cj20woAi+qsFJN6W7jDGsBZu vbwuKaTrx+1dtutdsdRMqSqL9h0o72g= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-145-boTQ_164N0u6DuC6vcBr5g-1; Tue, 05 Jan 2021 13:06:26 -0500 X-MC-Unique: boTQ_164N0u6DuC6vcBr5g-1 Received: by mail-wr1-f71.google.com with SMTP id r8so143730wro.22 for ; Tue, 05 Jan 2021 10:06:26 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=RUDwOl/6SWNVrAvOoL5QSIp3GpHmmT4c6iVV0F9vJZ0=; b=sBEz2wKI3o/Y7iNHNMKIHcmQj7GtZOs7LycPQvnsQsHua3SfVVemN9bVxRd6e+4/OY eVmfNCPKBnz+NKdfdyCeARCUS52+LqrqLqIy5pP95xP26zVHpIx9uZp3bIej17Oq0Emr sYHKZkuZJDb7qRFs2iQiH1xqI2eHn3YAvipbIGoGPM6HH4/pS887l/5KXah3S64g//sr uaq5skG3PklVsWCSPkouw2pfxvgeOgGWy5jn93gDNzpXciJxhKDahR+O0vbziQtl66Um jcQH0Ug5/FvllWFRm1ASoDPY9MoRnsU+R69TCH+tX7vVn0SnAEUwuOqw0twlCW+UYla7 U5xw== X-Gm-Message-State: AOAM533x1XMiO78LPSU7aKxE6Gs4/nnMsESvCBuuoDYuao1z5aK6Rn5r z7GXfRr7gCo1C/z8JexZf1TjxgYVaW+H2gHaXIgh8PkuRR/XpvmAVMNnHnFBLNgQzTJK/0YkJQC oZ6Z4QeDi/JVp1tPYL6kd79uW X-Received: by 2002:a1c:4c0a:: with SMTP id z10mr295120wmf.95.1609869985678; Tue, 05 Jan 2021 10:06:25 -0800 (PST) X-Received: by 2002:a1c:4c0a:: with SMTP id z10mr295096wmf.95.1609869985420; Tue, 05 Jan 2021 10:06:25 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:c8dd:75d4:99ab:290a? ([2001:b07:6468:f312:c8dd:75d4:99ab:290a]) by smtp.gmail.com with ESMTPSA id r15sm762264wrq.1.2021.01.05.10.06.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 05 Jan 2021 10:06:24 -0800 (PST) Subject: Re: reproducible BUG() in kvm_mmu_get_root() in TDP MMU To: Ben Gardon , leohou1402 Cc: "maciej.szmigiero@oracle.com" , "seanjc@google.com" , "linux-kernel@vger.kernel.org" , "kvm@vger.kernel.org" , "cannonmatthews@google.com" , "peterx@redhat.com" , "pshier@google.com" , "pfeiner@google.com" , "junaids@google.com" , "jmattson@google.com" , "yulei.kernel@gmail.com" , "kernellwp@gmail.com" , "vkuznets@redhat.com" References: <4bf6fcae-20e7-3eae-83ec-51fb52110487@oracle.com> <8A352C2E-E7D2-4873-807F-635A595DCAEF@gmail.com> From: Paolo Bonzini Message-ID: Date: Tue, 5 Jan 2021 19:06:23 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/01/21 18:49, Ben Gardon wrote: > for_each_tdp_mmu_root(kvm, root) { > kvm_mmu_get_root(kvm, root); > > kvm_mmu_put_root(kvm, root); > } > > In these cases the get and put root calls are there to ensure that the > root is not freed while the function is running, however they do this > too well. If the put root call reduces the root's root_count to 0, it > should be removed from the roots list and freed before the MMU lock is > released. However the above pattern never bothers to free the root. > The following would fix this bug: > > -kvm_mmu_put_root(kvm, root); > +if (kvm_mmu_put_root(kvm, root)) > + kvm_tdp_mmu_free_root(kvm, root); Is it worth writing a more complex iterator struct, so that for_each_tdp_mmu_root takes care of the get and put? Paolo