Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp693357imp; Thu, 21 Feb 2019 09:16:32 -0800 (PST) X-Google-Smtp-Source: AHgI3IaKLx0LKZIZNtIT9GhwsG3ANw1PpyzNPHR8IXSwXLCF65qn9WJrbzmuxu89kTVM3s2UvpP3 X-Received: by 2002:a63:f718:: with SMTP id x24mr13581055pgh.107.1550769392356; Thu, 21 Feb 2019 09:16:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550769392; cv=none; d=google.com; s=arc-20160816; b=EQrTr8Tnaf5T/df/Ck3417HS7d8XeCsZFFjic/PPjQwwwl3DFAVihgj/wfrI0646b6 lkU93EH4eREH6gGPbmzULh/5zeWizAc9NWu+n3PDn9nWGYv0oGl3w8dQ//QsQKIEYyc7 i8lbxCKlID+ukPjfHIFqnvCMDF0f92XIfEozxVaD5+Y2MdFU9t2kpCQVXtM3XssfMtHV duYw0PJ85dNuZq1MAzFjQzZlL/RUZ66ixCo4Cad8j++trTFgLc5pkYsEyY2wCF3f/4KP z0ILdH5NSqSSrfjEh65gP4CWqF8GQgI351pWsVkMNO3ySsp9O00VSUtsS9GWO6SxWtFg CmjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=HOAUYkHyRNhC1pUGOGSFUlr9NkbWqU8mijIm7bRFoAI=; b=qM3G3NS4FWfv0rtMODfpfnf0EwwhbB+mgxjrYJJaCYRTpTQ+OMVNg2900yQgVRch0D LK8L7ahUVFIItwr9VNjHKetlO3ull0oLXsDrsx8WW1HXtrfIcqU2RuQzU1XLGfvmpGhA pZJrbRz5ZQ7+oWEr0cQJDdo6+AOCEow43wr28FUATS1LLreGr0zsAcjRVchuTW6ylFxx T6FI7H2DFgiVICaO+IU4UZZeOk2PO7VVZS8IpDWJVHOHfyyspkAqpSheOUdAPEoVi+XK eQ/ohcKfTMHYNS0SL33t8novKE1riqW3bECLFHOrXssdq3vM2NN8d9l2ew45zqTmKqgZ 73Yg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c3si19235262plr.178.2019.02.21.09.16.17; Thu, 21 Feb 2019 09:16:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728635AbfBURPs (ORCPT + 99 others); Thu, 21 Feb 2019 12:15:48 -0500 Received: from mga09.intel.com ([134.134.136.24]:56028 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728404AbfBURPr (ORCPT ); Thu, 21 Feb 2019 12:15:47 -0500 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Feb 2019 09:15:43 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,396,1544515200"; d="scan'208";a="119753743" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.181]) by orsmga008.jf.intel.com with ESMTP; 21 Feb 2019 09:15:43 -0800 Date: Thu, 21 Feb 2019 09:15:42 -0800 From: Sean Christopherson To: Greg Kroah-Hartman Cc: Joerg Roedel , Joerg Roedel , stable@vger.kernel.org, Ben Hutchings , David Woodhouse , Paolo Bonzini , Jim Mattson , linux-kernel@vger.kernel.org Subject: Re: [PATCH stable-4.4.y] KVM: VMX: Fix x2apic check in vmx_msr_bitmap_mode() Message-ID: <20190221171541.GA7019@linux.intel.com> References: <20190221135213.23926-1-joro@8bytes.org> <20190221141530.GA18436@kroah.com> <20190221144701.GB8380@suse.de> <20190221162032.GF25800@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190221162032.GF25800@kroah.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 21, 2019 at 05:20:32PM +0100, Greg Kroah-Hartman wrote: > On Thu, Feb 21, 2019 at 03:47:01PM +0100, Joerg Roedel wrote: > > On Thu, Feb 21, 2019 at 03:15:30PM +0100, Greg Kroah-Hartman wrote: > > > Ugh, good catch! > > > > > > Any hint as to what type of testing that you did that caught this? I > > > keep asking people to run some kvm tests, but so far no one is :( > > > > We caught this at SUSE while testing candidate kernel updates for one of > > our service packs using a 4.4-based kernel and debugging turned > > out that this is issue came in via stable-updates. We also build a > > vanilla-flavour of the kernel which is nearly identical to the upstream > > stable tree, but what usually ends up in testing is the full tree with > > other backports. > > > > This particular issue was found by updating some openstack machines with > > the candidate kernel, which then triggered the problem in some guests. > > It is also a very special one, since I was only able to trigger the > > problem on Westmere-based machines with a specific guest-config. > > Nice work. Any chance that "test" could be added to the kvm testing > scripts that I think are being worked on somewhere? Ideally we would > have caught this before it ever hit the stable tree. Due to the lack of > good KVM testing, that's one of the areas I am always most worried about This bug exists only in the 4.4.y backport; upstream, 4.9.y and 4.14.y all had the correct code from the get-go. And there is already a KVM unit test that *should* hit this, albeit somewhat indirectly. I'll verify the tests that touch the TPR actually run with x2APIC enabled. Assuming the KVM unit test actually works, it's not a stretch for the bug to esacpe, e.g. if the tests weren't run on 4.4.y at all, or were only run on hardware with x2APIC.