Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp557888imp; Thu, 21 Feb 2019 06:49:46 -0800 (PST) X-Google-Smtp-Source: AHgI3IbnbX6Y4q47HjHHKnASTCgHBTL3sI2G0hzC6255jGc7x9CBWW5QBEdT86brJr9g4z+EKIjN X-Received: by 2002:a63:584e:: with SMTP id i14mr10928503pgm.68.1550760586088; Thu, 21 Feb 2019 06:49:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550760586; cv=none; d=google.com; s=arc-20160816; b=zdBBqpswMh7OTOJPy0HKmJdS2RWcyAi/Wxlc1SYMwT7+Hq7a8/BpqUU4T9sjHokMxE AMIp0mKH5SqT8dvOJWT/dzX0asM+nTXn23FMnGHK20i6d5+rsLI4ns35pkETWorFHKi8 8DbgsGDwMLYS1Ciudt8mprOcLhYdSDd7mrIG3w9m1qQb023gNGwz3lx0Mb3ZKjVUmKej Jp+rm5/upqKdk3VQxkx++fEW3wm4xykG7OOEeM/QHAnDVIn8vM6z5J26OQXNWw513YxV emWywgTBbegPpW1EEz7EvBKhchDBQpWGc4AziW4Z5yCI6vNMDiL54mOkXaL8RFlXkCSS pvTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=6XM/KSLzO45QEXrW71nLnCb9elZS0pDgmNtq7cvGsjs=; b=t516PWS/1CpEzwyNd6aRaSE5xejefFtu0uW78VoeH47u7kgQFa/ibwccqgxkb49CON dlSWycU555Ef7wYzDg/FPv13Eyv3CMxK7HcD+vNtIy08tsJdcmAtPNaPiDNESz35FGp5 zuAeoUCZwkXrNKA6B2T+l1zLXj//xl17TygtmW4Fz9o0q9bEVafBIWZZlnFv769gt3nR nluASiUz7zhq88bXNHE1w16IY4xbe+2as8+nmGRQ7BBNnDgjpIwrqeJz9dwY3vIJvB0J B5PEjoNmFto+95vd7TQ6yKS3r1ZLrDye//2ifd60nNwj8Zru2m/YmLDYgIAx11HovkVF a+NA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bg8si2650755plb.109.2019.02.21.06.49.30; Thu, 21 Feb 2019 06:49:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729309AbfBUOrH (ORCPT + 99 others); Thu, 21 Feb 2019 09:47:07 -0500 Received: from mx2.suse.de ([195.135.220.15]:48084 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728232AbfBUOrF (ORCPT ); Thu, 21 Feb 2019 09:47:05 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C670DAFA4; Thu, 21 Feb 2019 14:47:03 +0000 (UTC) Date: Thu, 21 Feb 2019 15:47:01 +0100 From: Joerg Roedel To: Greg Kroah-Hartman Cc: Joerg Roedel , stable@vger.kernel.org, Ben Hutchings , David Woodhouse , Paolo Bonzini , Jim Mattson , linux-kernel@vger.kernel.org Subject: Re: [PATCH stable-4.4.y] KVM: VMX: Fix x2apic check in vmx_msr_bitmap_mode() Message-ID: <20190221144701.GB8380@suse.de> References: <20190221135213.23926-1-joro@8bytes.org> <20190221141530.GA18436@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190221141530.GA18436@kroah.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 21, 2019 at 03:15:30PM +0100, Greg Kroah-Hartman wrote: > Ugh, good catch! > > Any hint as to what type of testing that you did that caught this? I > keep asking people to run some kvm tests, but so far no one is :( We caught this at SUSE while testing candidate kernel updates for one of our service packs using a 4.4-based kernel and debugging turned out that this is issue came in via stable-updates. We also build a vanilla-flavour of the kernel which is nearly identical to the upstream stable tree, but what usually ends up in testing is the full tree with other backports. This particular issue was found by updating some openstack machines with the candidate kernel, which then triggered the problem in some guests. It is also a very special one, since I was only able to trigger the problem on Westmere-based machines with a specific guest-config. Regards, Joerg