Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4384657imw; Tue, 12 Jul 2022 07:07:09 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uXAruIk19nXlY9JJ+fqRUkaHCLTcnCiCiKHPngpIuM2cqTyGn9BMuktDrx0LfAIlFlhK1R X-Received: by 2002:a17:907:7f8c:b0:726:2c53:2f82 with SMTP id qk12-20020a1709077f8c00b007262c532f82mr23446841ejc.140.1657634829268; Tue, 12 Jul 2022 07:07:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657634829; cv=none; d=google.com; s=arc-20160816; b=MfPFu4pwsryppksCxS3JbEj49IRMJqU824RGpSkMrWyEVDZR4Rs67HjYS8FGjpAmBy B0bQVXEZf8EO2/O44IadHPn36jplqAwfsIPZ7gp2PZP5Y0qlbqg8UO143SK5/6806XXx vzgIrhfRv8IEWEmFvLaWB1wQ8xqWbt4kzy7Qy3oM2AWXhRWSQMmkUKXiSkQm87+PP7fF 8b5lv5oVrTZCQ7rdCnfOfajj+qEHDoLThPVbHQ6wwoqtX8YcFwLVEOZ8zbzdJEY3B4Rm Cz3lDh/7ktExzhr8VNbljbyWes1yULnc/dAjFE2tNN9a0DTD9Uag32bAgKKnT25+NAnc QPWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=JgAcjPtcpgNCqfpVZQXf86mfKwE3gQAGcZaJHiCWMKk=; b=VLkt9aLrAt/9UxknJ9dEcGo9vy/KoBGp0TduLbNLdOIVIteD42JuLhaXdUWD/i8xTg 16aW5BAqT8pgcUb924j/UFZ1aQGzfs5vAxFD49DeIP9L2NPI0NEmYBQ3ZeF/qvnyM4os g6OOVPcUOBHrct033EHlC1/FtNOqKs0/1DgwWoM8Istt7vbKxqX+8Cy6KAfL+E3kw668 pkU4RXLO2cEQOYpi9xRdeFc3I1ORX6b0bxZUuLtfkOduC8+odvppTikiaU5wceclu9zz k6bCy9RQz0KnZiKszEEXOz7DSG2QW88CibLYwpSJRNV7lsTvu56rBZXeZhrIB8j6zw8p afmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZoQfGY8W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ga38-20020a1709070c2600b0072b4761be27si12936095ejc.400.2022.07.12.07.06.38; Tue, 12 Jul 2022 07:07:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZoQfGY8W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233041AbiGLNem (ORCPT + 99 others); Tue, 12 Jul 2022 09:34:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232398AbiGLNel (ORCPT ); Tue, 12 Jul 2022 09:34:41 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5134BB6541 for ; Tue, 12 Jul 2022 06:34:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1657632879; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JgAcjPtcpgNCqfpVZQXf86mfKwE3gQAGcZaJHiCWMKk=; b=ZoQfGY8WuWejPz0iko4nsw5QYErgkWMT83AhcsbfoHhq720InJ7nLgGIuZK8XJkupphG/V +iiJ+qBSBpCFo5pDazSJhohu0ZX0itzRIuQUTr8qJz5ULjczhF+sh9sDHyfcJCoebs0CZm j0KMluAnBM3CSnGwVnuHt5NcHFJK0PM= Received: from mail-qv1-f72.google.com (mail-qv1-f72.google.com [209.85.219.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-112-5Hk6EPhEO5qAYltb_XintA-1; Tue, 12 Jul 2022 09:34:28 -0400 X-MC-Unique: 5Hk6EPhEO5qAYltb_XintA-1 Received: by mail-qv1-f72.google.com with SMTP id eb3-20020ad44e43000000b00472e7d52ce6so1810495qvb.17 for ; Tue, 12 Jul 2022 06:34:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=JgAcjPtcpgNCqfpVZQXf86mfKwE3gQAGcZaJHiCWMKk=; b=EGzQM8QPJPhbxiTFuLjR4NxVmJjEAuJQ6S8KiOFsWVXI7XjEkrY1o1rSS6yP9KChh3 sR9exHsPNoRuIXFt2gnUpz9hC7u86/xxRL86HqN7/zoJ6ByhlHCPbhbocp7E8vnxIA3V X6Le0PuWpe47pIdWai5K5fDjxhbgGMSQB1EBthQ6douhUXZPbulWSxM1b2HBW2sQyd8T eBUhu+0f6z+W7zzqjl4kgU3ViAcKFQyFZjzFHgf3dyRtJ290EHKJ+jGwEgeeS68as74s Xz/I72ne0ncdOijo3HCNw37jk/7PkjZc1v1nVpBqlEmjVVG5XG0E3y9VoJyoSMV2j93y 6R5Q== X-Gm-Message-State: AJIora8W8JT+vrJ9rWPJpFWihepbfj8BDANc0FxXvFscAY7pvyAOdRCg Nse8U4j/Uqy0Ln1avDe8u+utpbIhx7F9GIy8RWabMFXgaAxeVIyQVgZmCZXJ5nWX7+9Ud401px+ C9oN83Jyhtp2iqyc9iKDo+lkP X-Received: by 2002:a05:620a:4507:b0:6af:348b:85fe with SMTP id t7-20020a05620a450700b006af348b85femr15472593qkp.629.1657632862388; Tue, 12 Jul 2022 06:34:22 -0700 (PDT) X-Received: by 2002:a05:620a:4507:b0:6af:348b:85fe with SMTP id t7-20020a05620a450700b006af348b85femr15472560qkp.629.1657632862055; Tue, 12 Jul 2022 06:34:22 -0700 (PDT) Received: from [10.35.4.238] (bzq-82-81-161-50.red.bezeqint.net. [82.81.161.50]) by smtp.gmail.com with ESMTPSA id a187-20020ae9e8c4000000b006b5517da3casm8706942qkg.22.2022.07.12.06.34.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Jul 2022 06:34:21 -0700 (PDT) Message-ID: <649b5c71b5ad40e3c74f76c86ad0ca89f9dac3e1.camel@redhat.com> Subject: Re: [PATCH 3/3] KVM: x86: WARN only once if KVM leaves a dangling userspace I/O request From: Maxim Levitsky To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, syzbot+760a73552f47a8cd0fd9@syzkaller.appspotmail.com, Tetsuo Handa , Hou Wenlong Date: Tue, 12 Jul 2022 16:34:18 +0300 In-Reply-To: <20220711232750.1092012-4-seanjc@google.com> References: <20220711232750.1092012-1-seanjc@google.com> <20220711232750.1092012-4-seanjc@google.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.40.4 (3.40.4-5.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2022-07-11 at 23:27 +0000, Sean Christopherson wrote: > Change a WARN_ON() to separate WARN_ON_ONCE() if KVM has an outstanding > PIO or MMIO request without an associated callback, i.e. if KVM queued a > userspace I/O exit but didn't actually exit to userspace before moving > on to something else.  Warning on every KVM_RUN risks spamming the kernel > if KVM gets into a bad state.  Opportunistically split the WARNs so that > it's easier to triage failures when a WARN fires. > > Deliberately do not use KVM_BUG_ON(), i.e. don't kill the VM.  While the > WARN is all but guaranteed to fire if and only if there's a KVM bug, a > dangling I/O request does not present a danger to KVM (that flag is truly > truly consumed only in a single emulator path), and any such bug is > unlikely to be fatal to the VM (KVM essentially failed to do something it > shouldn't have tried to do in the first place).  In other words, note the > bug, but let the VM keep running. > > Signed-off-by: Sean Christopherson > --- >  arch/x86/kvm/x86.c | 6 ++++-- >  1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index 567d13405445..50dc55996416 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -10847,8 +10847,10 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu) >                 r = cui(vcpu); >                 if (r <= 0) >                         goto out; > -       } else > -               WARN_ON(vcpu->arch.pio.count || vcpu->mmio_needed); > +       } else { > +               WARN_ON_ONCE(vcpu->arch.pio.count); > +               WARN_ON_ONCE(vcpu->mmio_needed); > +       } >   >         if (kvm_run->immediate_exit) { >                 r = -EINTR; At some point in the future, the checkpatch.pl should start to WARN the patch submitter if WARN_ON and not WARN_ON_ONCE was used ;-) It already bugs the user about BUG_ON ;-) Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky