Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp644504imp; Thu, 21 Feb 2019 08:21:45 -0800 (PST) X-Google-Smtp-Source: AHgI3IYDrCFt2HQjKdb4H7+uX2wBoM5d/yd1ZNlEKPJdaUqHLVD4eEaQzQwPUe0kzTiQv3s2FkPc X-Received: by 2002:a63:c307:: with SMTP id c7mr13488919pgd.386.1550766105754; Thu, 21 Feb 2019 08:21:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550766105; cv=none; d=google.com; s=arc-20160816; b=PfIm/MyJvhk7II7DPPyhbgJtDtLhiGSEDMsX7D7Siyw2qf5Lca6DiNHzqIpR3y766Q L9ebOw3YrunhLwREkkOOsDH1fN/KrnM/fd/CM5wrVRdGWKaBSIzM7FntKuUWoYq78jd9 pGtVvRE3Opr38Pv+TnWPLW7dp90cR6GZExfV2xqEVtY+rkYJsPGmTMSTjrNRpL4G5vRt lkFE2YwP+q3/xMdtT6ILMJmF+pIyyCfES/Qq/WDm7dlZge3ZBICtU7H1J0D8jC+t+C84 apyGcyEXBJ7glB4vy57tkFCmS6OVa03O7Ek5OdRcTK2EYj9WN9sRneu5jxCSb3ly/eX3 PMVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=990wELLTHQN0B0NIt7XC2O35j/bFSO3jxadTmQq/kYo=; b=e7zGBXwFXTvT73R8ijQgzOCTvQv7IE068ir5gJObc+GLHv+OaYDUw0Zgd8rXSLaoCN FJjQF+XqEnYTbaADsKSoYoTdCkmS0njkASvSijD7yP27h/Bagvid5lQn4/OvyxSBfa3v OrlAEfYs6vOtlSk3AqKWpoDWNu3H/aIMSZ5XJd0iP+jEN057y1pyymvl0ZahkNu9f5aC zwb63j31CMxWLolr5c3C/4Mfyx5g1YcxF00qr1ofTzOgmLReyoaifT0O/Ma7+lQqtQqp bWiMtBoXeQolerLK3L2iUBQObtKmphPsIuV+0ZkwRoXQCLoUdHOPXCwxFX4HpulU+ZRN ALlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LtgTiVIC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y142si439384pfb.149.2019.02.21.08.21.30; Thu, 21 Feb 2019 08:21:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LtgTiVIC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727174AbfBUQUg (ORCPT + 99 others); Thu, 21 Feb 2019 11:20:36 -0500 Received: from mail.kernel.org ([198.145.29.99]:39946 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726265AbfBUQUg (ORCPT ); Thu, 21 Feb 2019 11:20:36 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EA2C120836; Thu, 21 Feb 2019 16:20:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550766035; bh=g8a0jQRoJWFhN0EfdgP0DOOdrmeOSpezIEfnelfCx+w=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LtgTiVIC1pHAiBwVhwx5wMQ3tqZuPVdMp8qu9rgeLVu6Gi0jTwWKu4ktFrU8y1Opn zdcGfUE1+nkuOUJqN9wCKf/a/rpX8OLT1jDX51uow8CI+8XzFl5/J9txgPYxiWVcik D1NWTaRslj8o0VE7EisFN/YKPNvBN/VFajJ4gAMc= Date: Thu, 21 Feb 2019 17:20:32 +0100 From: Greg Kroah-Hartman To: Joerg Roedel Cc: Joerg Roedel , stable@vger.kernel.org, Ben Hutchings , David Woodhouse , Paolo Bonzini , Jim Mattson , linux-kernel@vger.kernel.org Subject: Re: [PATCH stable-4.4.y] KVM: VMX: Fix x2apic check in vmx_msr_bitmap_mode() Message-ID: <20190221162032.GF25800@kroah.com> References: <20190221135213.23926-1-joro@8bytes.org> <20190221141530.GA18436@kroah.com> <20190221144701.GB8380@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190221144701.GB8380@suse.de> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 21, 2019 at 03:47:01PM +0100, Joerg Roedel wrote: > On Thu, Feb 21, 2019 at 03:15:30PM +0100, Greg Kroah-Hartman wrote: > > Ugh, good catch! > > > > Any hint as to what type of testing that you did that caught this? I > > keep asking people to run some kvm tests, but so far no one is :( > > We caught this at SUSE while testing candidate kernel updates for one of > our service packs using a 4.4-based kernel and debugging turned > out that this is issue came in via stable-updates. We also build a > vanilla-flavour of the kernel which is nearly identical to the upstream > stable tree, but what usually ends up in testing is the full tree with > other backports. > > This particular issue was found by updating some openstack machines with > the candidate kernel, which then triggered the problem in some guests. > It is also a very special one, since I was only able to trigger the > problem on Westmere-based machines with a specific guest-config. Nice work. Any chance that "test" could be added to the kvm testing scripts that I think are being worked on somewhere? Ideally we would have caught this before it ever hit the stable tree. Due to the lack of good KVM testing, that's one of the areas I am always most worried about :( thanks, greg k-h