Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4557781imu; Tue, 29 Jan 2019 03:46:15 -0800 (PST) X-Google-Smtp-Source: ALg8bN7YWhdTDWh4xb6VVi2cUPs8wUMrCegHwr906RB+NuI8QcF48/AiKnS0q3V9JGgYZeBNX/dH X-Received: by 2002:a17:902:654a:: with SMTP id d10mr25140900pln.324.1548762375435; Tue, 29 Jan 2019 03:46:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548762375; cv=none; d=google.com; s=arc-20160816; b=0Rqg6LM9Y3dk7KF10cYd/LmHw0VnQmZ/Vf2biHOF8XiaHOplnzdZ8w3eG31IO73axa 6RL0mp298HRhqHvF1Gv7u2AM8BKMzt/S5/7w+cJv4tskqo5ebECQVfNe3vuXNJh8hP96 RuyA5PLqb+nVEV6ogfbHN1oqM+pbhHAwjKSQ69uby6++TvIvxhUNBIs7dsD9z0XJQ2Ap 1fySd5Lm+hKXISfReDRr7XtYeOryW/NOHkc+NS3En0ayPy3M3sZC283vn4RnzEsOEA6w zpPnq07xbsqQH6+WJeHLEtu61veg0IAc/9Uhp1Nvmjd+s2bOEZgKqVDq2hj5vn3QbyjO l5Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4Ssc+umDOVdia4uGxh4WpJiYVgFDkbXq2TlehRPp8EI=; b=AjLlIeOmNoMAtuvyZQjVUVYyefW7j2uVt21zT9sYRekEW7zx7gBFU8EODvBLeTKCdf HOqUngS8i2FEK0tO6vIBZoDyHRCSIwL5HKlSy6xnytHiWsN3hARNGhTfnloF1JCE9GVT TwjPczsVkuuNvwHvRFZqiahvw8rAh7iwawKxV9QRu/+t2+M4aBT4oaAoco3E0HUBIQ6o 8oTYfdB5qqGCjJndrXA2t/QtgqEtJifBAat25a3kkAHMcsx2/q8ClcPc4U9xeANxsAei VD7YfX3vVvusuyEwdliZBmO6w1tb8J+a1z2c07KUovR1iQ2FcQQccSEywSamcgtH47/T IQSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2AxaQpns; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cb2si7136215plb.298.2019.01.29.03.46.00; Tue, 29 Jan 2019 03:46:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2AxaQpns; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730755AbfA2LpY (ORCPT + 99 others); Tue, 29 Jan 2019 06:45:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:35830 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730744AbfA2LpW (ORCPT ); Tue, 29 Jan 2019 06:45:22 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C86232086C; Tue, 29 Jan 2019 11:45:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548762322; bh=EjCC3/oL9EJ8nUMkyAyoBits8BSfuT80B/jivBjwxtI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2AxaQpnsYwAWQkJMROEi07kkrocUFaLCO0nywj+z9QAiM5kiTmV3Nh4VYii6pCnhj ygXyhW7cWqORalELy69q1z3efEnfnZWw1QepTaT4hqQel6ItK51eNz4LVyMJSLflgg n1aJkxGo2a3SKcu0u8HMLPkP2v7Tj0zNLN0EzqQU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wanpeng Li , Sean Christopherson , Paolo Bonzini Subject: [PATCH 4.19 068/103] KVM: x86: Fix PV IPIs for 32-bit KVM host Date: Tue, 29 Jan 2019 12:35:45 +0100 Message-Id: <20190129113204.718342487@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190129113159.567154026@linuxfoundation.org> References: <20190129113159.567154026@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sean Christopherson commit 1ed199a41c70ad7bfaee8b14f78e791fcf43b278 upstream. The recognition of the KVM_HC_SEND_IPI hypercall was unintentionally wrapped in "#ifdef CONFIG_X86_64", causing 32-bit KVM hosts to reject any and all PV IPI requests despite advertising the feature. This results in all KVM paravirtualized guests hanging during SMP boot due to IPIs never being delivered. Fixes: 4180bf1b655a ("KVM: X86: Implement "send IPI" hypercall") Cc: stable@vger.kernel.org Cc: Wanpeng Li Signed-off-by: Sean Christopherson Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/x86.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -6867,10 +6867,10 @@ int kvm_emulate_hypercall(struct kvm_vcp case KVM_HC_CLOCK_PAIRING: ret = kvm_pv_clock_pairing(vcpu, a0, a1); break; +#endif case KVM_HC_SEND_IPI: ret = kvm_pv_send_ipi(vcpu->kvm, a0, a1, a2, a3, op_64_bit); break; -#endif default: ret = -KVM_ENOSYS; break;