From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BA91D3FD14E; Wed, 18 Mar 2026 16:20:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773850805; cv=none; b=ub1JeJDV+FtWvYQtptTj+yZNyW1Cx2ayKW3gNm0qvl7kyRQGE9moteF3JKixyDcT1rhBnGZEIBSmUUNipQmBbWEwcaOiGrF5y4lA/72NPNGaPV6H9FWd7sgDs6mbJpdpiQWJWoBG42BltMlHWR9zKp4M8qvhKS+ZfxEG7roPKxw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773850805; c=relaxed/simple; bh=lkocgiy6RQPr4M88f7zfZp3Q72SQZIa9w6MUnl6qiiQ=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=bs+hqZhC7wyMedgR6fouPGmKNd/yNRK8e/nvNqzmMSubVhhHDcBmBdwHXWsnuQIO8oeQMhhtTy3Qx8HempB9LuU2V9YU1S8RKOomFwO9DMHYjrxATcnS1LscqDOIrjjmMkGegaYTIx1QV6kUBRle3qPm8kbsj/GfQP72Q6yzCj4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=W9Os/sie; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="W9Os/sie" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0652BC2BC87; Wed, 18 Mar 2026 16:20:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1773850805; bh=lkocgiy6RQPr4M88f7zfZp3Q72SQZIa9w6MUnl6qiiQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=W9Os/sieKonDWhLerwRR2bAwGXkzuyFzf5AVppp6e0ynTZecYDjD0k8m2a2G85Hm6 zRF/oMCfKh1y+XNXL5Tb6ywnNa4tLjwyBCGYuEXlwMhcrol06DY9c7NJVBG/HVzsSP co1BgUuiszE4i4oMY/11/rmhJn0DyzXYsM/yGsuUWTgKlin00x79J+YoEOPq4PAx0D GD0r/L3huX/NwOEgtOfnQ0zVZkCxFkaPmMVtcVudLyCPDWOuqs3vOSKW9PFWTLjhJE 7/8WdK7gHqzbjNG0B+dWugNFZnu65JGf+d6Ez/ZsmpBM0klYfg9TGkIRhaKlkPY3uS FTETwNcaW4i7g== Date: Wed, 18 Mar 2026 16:20:03 +0000 From: Wei Liu To: Michael Kelley Cc: Wei Liu , Stanislav Kinsburskii , "kys@microsoft.com" , "haiyangz@microsoft.com" , "decui@microsoft.com" , "longli@microsoft.com" , "linux-hyperv@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] mshv: Fix error handling in mshv_region_populate_pages Message-ID: <20260318162003.GB262287@liuwe-devbox-debian-v2.local> References: <177375989324.25621.6532741522672582851.stgit@skinsburskii-cloud-desktop.internal.cloudapp.net> <20260318062001.GA262287@liuwe-devbox-debian-v2.local> Precedence: bulk X-Mailing-List: linux-hyperv@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Wed, Mar 18, 2026 at 02:38:49PM +0000, Michael Kelley wrote: > From: Wei Liu Sent: Tuesday, March 17, 2026 11:20 PM > > > > On Tue, Mar 17, 2026 at 09:56:07PM +0000, Michael Kelley wrote: > > > From: Stanislav Kinsburskii Sent: Tuesday, March 17, 2026 8:05 AM > > > > > > > > The current error handling has two issues: > > > > > > > > First, pin_user_pages_fast() can return a short pin count (less than > > > > requested but greater than zero) when it cannot pin all requested pages. > > > > This is treated as success, leading to partially pinned regions being > > > > used, which causes memory corruption. > > > > > > > > Second, when an error occurs mid-loop, already pinned pages from the > > > > current batch are not released before calling mshv_region_evict_pages(), > > > > causing a page reference leak. > > > > > > There's now an online LLM-based tool that is automatically reviewing > > > kernel patches. For this patch, the results are here: > > > > > > > > https://sashiko.dev/#/patchset/177375989324.25621.6532741522672582851.stgit > > %40skinsburskii-cloud-desktop.internal.cloudapp.net > > > > > > It has flagged the commit message as incorrectly referencing the > > > function mshv_region_evict_pages(), which doesn't exist. > > > > > > FWIW, the announcement about sashiko.dev is here: > > > > > > https://lore.kernel.org/lkml/7ia4o6kmpj5s.fsf@castle.c.googlers.com/ > > > > > > Other than the commit message reference, this looks good to me. > > > > > > Reviewed-by: Michael Kelley > > > > The second point is written as if the code here should release the > > already pinned pages before calling mshv_region_invalidate_pages(), but > > the code actually relies on mshv_mem_region_invalidate_pages() to > > release the pages. The change here fixes the accounting. > > > > Second, when an error occurs mid-loop, already pinned pages from the > > current batch are not accounted for before calling > > mshv_region_invalidate_pages(), causing a page reference leak. > > > > And queued up the patch to hyperv-fixes. > > One other thing I noticed: The "Subject" of the patch is wrong. It > mentions mshv_region_populate_pages(), but the function being > modified is actually mshv_region_pin(). Good catch. I have updated the subject line and pushed to hyperv-fixes. Wei > > Michael > > > > > Wei > > > > > > > > > > > > > Fix by treating short pins as errors and explicitly unpinning the > > > > partial batch before cleanup. > > > > > > > > Signed-off-by: Stanislav Kinsburskii > > > > --- > > > > drivers/hv/mshv_regions.c | 6 ++++-- > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > diff --git a/drivers/hv/mshv_regions.c b/drivers/hv/mshv_regions.c > > > > index c28aac0726de..fdffd4f002f6 100644 > > > > --- a/drivers/hv/mshv_regions.c > > > > +++ b/drivers/hv/mshv_regions.c > > > > @@ -314,15 +314,17 @@ int mshv_region_pin(struct mshv_mem_region *region) > > > > ret = pin_user_pages_fast(userspace_addr, nr_pages, > > > > FOLL_WRITE | FOLL_LONGTERM, > > > > pages); > > > > - if (ret < 0) > > > > + if (ret != nr_pages) > > > > goto release_pages; > > > > } > > > > > > > > return 0; > > > > > > > > release_pages: > > > > + if (ret > 0) > > > > + done_count += ret; > > > > mshv_region_invalidate_pages(region, 0, done_count); > > > > - return ret; > > > > + return ret < 0 ? ret : -ENOMEM; > > > > } > > > > > > > > static int mshv_region_chunk_unmap(struct mshv_mem_region *region, > > > > > > > > > > > >