Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp882453rdb; Wed, 1 Nov 2023 05:51:28 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFwYNHvO0EnINw5RNOEDlfM5/MN2XMZ6Q2C28/5GKFtMr0sw9kDXULwTzMaKuuf7pWHRlfI X-Received: by 2002:a17:903:41c4:b0:1cc:4a84:27fa with SMTP id u4-20020a17090341c400b001cc4a8427famr9710762ple.9.1698843087822; Wed, 01 Nov 2023 05:51:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698843087; cv=none; d=google.com; s=arc-20160816; b=Wp7l2vQMs868BHnmU9OkDjNcFH2g+anSX27HeCZGYoIdDez8GpuC2kkM62xF/f0uZ7 tl0XICPSinbGpjYFvTTGVh7xYLP4zGWiSRbT2+5RMjwaDT/sLly53zCzObPc3zwZlTUy mf2920ONyhHImKEuHZ3gS0tYPuVUXvFXHjidbtlfOS2VBjPbj0WY6J1VmeT4uVuqh54t Q/1xOovl2ruYqRL+Cc4b+iCfoxAo5wi2PAaOe385hCng8xswFTCNJaL/W/71sjSirqzu wM7XqZagJzU44mTy76oOqg3QdFYrs6Eo9xP15zMHpM4VhTZjyj351IXvQGVqZ20AQmJf Dagg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=DytdUoCbq8poGHKLHOEtAO0D5dohgKyWvCysCxFt+wY=; fh=xK+wiX2TTq7O2X4TlNj4MXVc7h6ma8eyuy1Ur/RMLHE=; b=wrMgWFo378nlDV5AtGUZsFyNqzZw9z0hmlFQfJSsyU4kw1Au0cTAVTkBj9jPMXCoBw WpUrOfM5fkTHmBo3iUE8iYMdZLTfJ+jm9r93UehYX6MKQ18FdYosJtAFV7r9EEWuP810 pbbT5RipG9VEDoIr5YKMLLdNiGpEhXjwYolNtM+SWOeTfN+vWiovGIKesCYJ3RZrxB+U LLgjJAcIdLJkOMXsgQMs7ptVUerpzqIo4ahCOUKSPsiYm7WfsDzISsH57+mDTn+LKmd5 XPucaNfc6GXqdFJELJANwRbDBjFrWMqTEGYMElIaVUq3+KsT1ZpDL6kN2HkQY8np/jRt huTA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=ly5ncPVN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id u12-20020a170902e5cc00b001c9bdaa81e3si3020115plf.633.2023.11.01.05.51.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Nov 2023 05:51:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=ly5ncPVN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 6442480A18C9; Wed, 1 Nov 2023 05:51:21 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235187AbjKAMvH (ORCPT + 99 others); Wed, 1 Nov 2023 08:51:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58472 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231485AbjKAMvF (ORCPT ); Wed, 1 Nov 2023 08:51:05 -0400 Received: from mail-qv1-xf2a.google.com (mail-qv1-xf2a.google.com [IPv6:2607:f8b0:4864:20::f2a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4CAE4E4 for ; Wed, 1 Nov 2023 05:51:03 -0700 (PDT) Received: by mail-qv1-xf2a.google.com with SMTP id 6a1803df08f44-66d264e67d8so43189636d6.1 for ; Wed, 01 Nov 2023 05:51:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1698843062; x=1699447862; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=DytdUoCbq8poGHKLHOEtAO0D5dohgKyWvCysCxFt+wY=; b=ly5ncPVNpoivFRlisDYz8Hb0PEqnyA/XOL1PFjBsoMHY4MzfhZ3R17TRt0h1EkyEjz 3QGvMwZiZRm8l3mc+UdgKXe/WYbIWHxqBvZIQo2mWBKNOBMlLFsjwJ0befWTql4jonoG 1Wg/Z+yLAslqneYeBHQ5zucEBKpJyIbaJdUNH7+LJhCgzEdEarVuzPc9RVGAX+8Vpylw mJspx/gpqRRQgO1xL7LV87CebmifDkfrPTYfrcb1F/lScnAIFMrxitVvih55oReziExH /0KH9vi34r91y0hTLMtzcT20rw+kEP6Sp4Z+eGh6I+Fb9chg1XmiyRmdav/2p217PYdA 4z1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698843062; x=1699447862; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=DytdUoCbq8poGHKLHOEtAO0D5dohgKyWvCysCxFt+wY=; b=gvPlZ+NHzGB8736Fg9C05SXWspRsYPp9Ieq6qTWr7adnpD7b1S4l+KxpODwEL4K/re RVpVMn4M7UK4rfohw9xY4tn01I0zninhR8BiKyT6zd/arZwcTFQ4/KHaAXJhrZsMkVdV 4E6fukUJI876gQkBZPq1CGdBjrmbBfehxKa4p6vVteTa3HQUyGGGKqCsYigdQ6jdqmDZ IyTH5YEorpu5p82FWX9vxg5oo9suh5Blh63evDM5/hqhC2fr6ITJBsXajBXU2lHCVUb+ F0FpCbefoqvRVrdALct+JtgghBQEFC9IwNX7UbPEEtPzg3kd/EC/Xae0xzJlTnvHC1tO KYrg== X-Gm-Message-State: AOJu0Yz3EoUihP5F9kgSafj9X9YZpqnZRMfeLFEZ0MO2ZTjF7N0Cf6Yo Yl/VyEF3TVsyE6ckG9Zt6ahDLYN2Msamys7H+0Dyuw== X-Received: by 2002:a05:6214:262e:b0:66f:bd35:e889 with SMTP id gv14-20020a056214262e00b0066fbd35e889mr16003984qvb.60.1698843062295; Wed, 01 Nov 2023 05:51:02 -0700 (PDT) MIME-Version: 1.0 References: <20231027182217.3615211-1-seanjc@google.com> <20231027182217.3615211-5-seanjc@google.com> In-Reply-To: <20231027182217.3615211-5-seanjc@google.com> From: Fuad Tabba Date: Wed, 1 Nov 2023 12:50:26 +0000 Message-ID: Subject: Re: [PATCH v13 04/35] KVM: WARN if there are dangling MMU invalidations at VM destruction To: Sean Christopherson Cc: Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexander Viro , Christian Brauner , "Matthew Wilcox (Oracle)" , Andrew Morton , kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Xiaoyao Li , Xu Yilun , Chao Peng , Jarkko Sakkinen , Anish Moorthy , David Matlack , Yu Zhang , Isaku Yamahata , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata , "Kirill A . Shutemov" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Wed, 01 Nov 2023 05:51:21 -0700 (PDT) On Fri, Oct 27, 2023 at 7:22=E2=80=AFPM Sean Christopherson wrote: > > Add an assertion that there are no in-progress MMU invalidations when a > VM is being destroyed, with the exception of the scenario where KVM > unregisters its MMU notifier between an .invalidate_range_start() call an= d > the corresponding .invalidate_range_end(). > > KVM can't detect unpaired calls from the mmu_notifier due to the above > exception waiver, but the assertion can detect KVM bugs, e.g. such as the > bug that *almost* escaped initial guest_memfd development. > > Link: https://lore.kernel.org/all/e397d30c-c6af-e68f-d18e-b4e3739c5389@li= nux.intel.com > Signed-off-by: Sean Christopherson > --- Reviewed-by: Fuad Tabba Tested-by: Fuad Tabba Cheers, /fuad > virt/kvm/kvm_main.c | 9 ++++++++- > 1 file changed, 8 insertions(+), 1 deletion(-) > > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > index 1a577a25de47..4dba682586ee 100644 > --- a/virt/kvm/kvm_main.c > +++ b/virt/kvm/kvm_main.c > @@ -1356,9 +1356,16 @@ static void kvm_destroy_vm(struct kvm *kvm) > * No threads can be waiting in kvm_swap_active_memslots() as the > * last reference on KVM has been dropped, but freeing > * memslots would deadlock without this manual intervention. > + * > + * If the count isn't unbalanced, i.e. KVM did NOT unregister its= MMU > + * notifier between a start() and end(), then there shouldn't be = any > + * in-progress invalidations. > */ > WARN_ON(rcuwait_active(&kvm->mn_memslots_update_rcuwait)); > - kvm->mn_active_invalidate_count =3D 0; > + if (kvm->mn_active_invalidate_count) > + kvm->mn_active_invalidate_count =3D 0; > + else > + WARN_ON(kvm->mmu_invalidate_in_progress); > #else > kvm_flush_shadow_all(kvm); > #endif > -- > 2.42.0.820.g83a721a137-goog >