Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp205095yba; Mon, 20 May 2019 07:22:45 -0700 (PDT) X-Google-Smtp-Source: APXvYqya+afAhB7mSA8U52ri4kJYczFwy0V/pY2CrxjKhA45KtQRQKbk4W3qADCOPNL7RKWzEAC5 X-Received: by 2002:aa7:881a:: with SMTP id c26mr73877221pfo.254.1558362165815; Mon, 20 May 2019 07:22:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558362165; cv=none; d=google.com; s=arc-20160816; b=NLSgO/Uqq2q+E4d4hZEM7dt0jUPCjnckM+BjFM58bof67FVm+5wCVAfFDz8rjw5atk CZ5y3ARoHD4s9GrQ5lTkJV4/gIxjbNfQDwU0Kifbr6e1IlbkWBN9CTAXpNmAMH+32A4Q RB8+TMkf1/08gPSkNy+vRvgH6iD2ZoEfaTXglX/yx+bCTSKwfyVE1/M/3cnrl7FTy537 OTcssU49ZXVbZ4Wv5c2GzOWQJLym6zQYngLYSt+O41frhG9TaAvnw2efGR/KmwT+bwmA jmq3H8zuSb8rkPpPPhDpMQLakfEvAnWK6WyyVgichyK9I2vBBwObbvWY5E2fOo0DZ1Ij vjNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=3xXPvZpyjHsgmFWoKd9d5EDj4j0NbyZe+58R2bsw9kA=; b=fk2qH1EehyLVuF2V7SFVipqSjGJyHlgUoc7vdfl83Y1gLhVPl1AuMmk38wu93sdEuA MyzjPlk4hqoLlKYh6vlCz8wzeG957Uqez4G+/vyk4x1Siy15v20E8pMMWCrfCZL+H9uO EXp3tPa08UN3uAim5jDfU/cIfmBc6figkaiTfeemtzvWAlI8FmssLnT64DqJXBD6qVxF GAdaa0xbDAAK9SWbh9CF1paiMvzvXv+F7KZZBV2xWroatnlg2spK5yqU6tvn/5nUUe+U URWOIefCnmuqTV5nFKEjf9ugDeHyPSVJStLZeVLq3666Gt5IDv1W+UiK8i/ZjOGKQZ+d DwuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f34si18762813plf.258.2019.05.20.07.22.30; Mon, 20 May 2019 07:22:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731689AbfETKgk (ORCPT + 99 others); Mon, 20 May 2019 06:36:40 -0400 Received: from mail-wm1-f65.google.com ([209.85.128.65]:50553 "EHLO mail-wm1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731668AbfETKgk (ORCPT ); Mon, 20 May 2019 06:36:40 -0400 Received: by mail-wm1-f65.google.com with SMTP id f204so12753965wme.0 for ; Mon, 20 May 2019 03:36:39 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=3xXPvZpyjHsgmFWoKd9d5EDj4j0NbyZe+58R2bsw9kA=; b=Wt+tj0eBsZYq3NmNrfnFewGX8f0JjWbDUybvX/qHzdmDvkk2LtN5MkIPk/DfyRzSuV ct2IpVU2/U6IN6FJKUqha/zgsQlauEfcwJpvPnzw9LBJHUpU037Y074CuY6rX/wcyfFO e8Sa6oYpydeg+WhJH+s34JoUOQq+EWrKbauyGP5d/21SIrx9MHWQEEvYBvCN6cNDdYME DgOEZXWScHv87xMLtTlMzWXs6fSkDCHHFUAZLO0iiKYd4puV0EVKLAs7lfO+D60uEJtU bQBZRjnAyxYzf+ZJVz71mChz39dDKaHGa9l1rmyFfUDuHI76OVuYcIyPU9JoyZf23elK ADzQ== X-Gm-Message-State: APjAAAWqzp4kGkTo07s9YrRMtprVygXO/MS2Shxjn77Pl4SmSYNsEs0R 7oA5p2x5sJlaFyhxfmbqLM1R8Q== X-Received: by 2002:a1c:ca19:: with SMTP id a25mr11412291wmg.105.1558348598772; Mon, 20 May 2019 03:36:38 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:ac04:eef9:b257:b844? ([2001:b07:6468:f312:ac04:eef9:b257:b844]) by smtp.gmail.com with ESMTPSA id m10sm9686930wmf.40.2019.05.20.03.36.38 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Mon, 20 May 2019 03:36:38 -0700 (PDT) Subject: Re: [PATCH 4/4] KVM: nVMX: Fix using __this_cpu_read() in preemptible context To: Wanpeng Li , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= References: <1558082990-7822-1-git-send-email-wanpengli@tencent.com> <1558082990-7822-4-git-send-email-wanpengli@tencent.com> From: Paolo Bonzini Message-ID: <4874aa09-7f46-7ca5-5d32-1d7b1cb1eef3@redhat.com> Date: Mon, 20 May 2019 12:36:37 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <1558082990-7822-4-git-send-email-wanpengli@tencent.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 17/05/19 10:49, Wanpeng Li wrote: > From: Wanpeng Li > > BUG: using __this_cpu_read() in preemptible [00000000] code: qemu-system-x86/4590 > caller is nested_vmx_enter_non_root_mode+0xebd/0x1790 [kvm_intel] > CPU: 4 PID: 4590 Comm: qemu-system-x86 Tainted: G OE 5.1.0-rc4+ #1 > Call Trace: > dump_stack+0x67/0x95 > __this_cpu_preempt_check+0xd2/0xe0 > nested_vmx_enter_non_root_mode+0xebd/0x1790 [kvm_intel] > nested_vmx_run+0xda/0x2b0 [kvm_intel] > handle_vmlaunch+0x13/0x20 [kvm_intel] > vmx_handle_exit+0xbd/0x660 [kvm_intel] > kvm_arch_vcpu_ioctl_run+0xa2c/0x1e50 [kvm] > kvm_vcpu_ioctl+0x3ad/0x6d0 [kvm] > do_vfs_ioctl+0xa5/0x6e0 > ksys_ioctl+0x6d/0x80 > __x64_sys_ioctl+0x1a/0x20 > do_syscall_64+0x6f/0x6c0 > entry_SYSCALL_64_after_hwframe+0x49/0xbe > > Accessing per-cpu variable should disable preemption, this patch extends the > preemption disable region for __this_cpu_read(). > > Cc: Paolo Bonzini > Cc: Radim Krčmář > Signed-off-by: Wanpeng Li > --- > arch/x86/kvm/vmx/nested.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c > index 0c601d0..8f6f69c 100644 > --- a/arch/x86/kvm/vmx/nested.c > +++ b/arch/x86/kvm/vmx/nested.c > @@ -2792,14 +2792,13 @@ static int nested_vmx_check_vmentry_hw(struct kvm_vcpu *vcpu) > : "cc", "memory" > ); > > - preempt_enable(); > - > if (vmx->msr_autoload.host.nr) > vmcs_write32(VM_EXIT_MSR_LOAD_COUNT, vmx->msr_autoload.host.nr); > if (vmx->msr_autoload.guest.nr) > vmcs_write32(VM_ENTRY_MSR_LOAD_COUNT, vmx->msr_autoload.guest.nr); > > if (vm_fail) { > + preempt_enable(); > WARN_ON_ONCE(vmcs_read32(VM_INSTRUCTION_ERROR) != > VMXERR_ENTRY_INVALID_CONTROL_FIELD); > return 1; > @@ -2811,6 +2810,7 @@ static int nested_vmx_check_vmentry_hw(struct kvm_vcpu *vcpu) > local_irq_enable(); > if (hw_breakpoint_active()) > set_debugreg(__this_cpu_read(cpu_dr7), 7); > + preempt_enable(); > > /* > * A non-failing VMEntry means we somehow entered guest mode with > Queued, thanks. Paolo