Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp3315893ybh; Mon, 5 Aug 2019 16:18:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqzlUbnW5O0vgiq8dXixJbfhXtHH0ufOoUBcV4VdfPWrqR1GjdDPWDwYPWaJJjn/daSSRiAw X-Received: by 2002:aa7:8acb:: with SMTP id b11mr438621pfd.109.1565047108697; Mon, 05 Aug 2019 16:18:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565047108; cv=none; d=google.com; s=arc-20160816; b=PS5qKEH/nY7Vf4EHkjaLy4Bmm1iXR5faiy1E5qDbgrCQkcSUMb/8s2fQQ/sfkUkbkX jSyXweAzxBUpz1F6+7/ruGKsQeDaa4EDAgGW+EG8f0u3cPXplbAfPisFjxnQOQl4bzgd uTE9Led9KHvs0VndF0Tg9zfQwbIQrAOp7q1KSqrUSr+3NVmQ5Z+z4CDblGMk6J1FsC70 zFMTf8M0KjveRiOZw/bnh49ykHKRyn8aXhEeIaDA/Vq3hH4ZDyPAuNLyBSfXA62eFIST P8a6kEv10fQEiPUauSFdZe36Ce8kYcrnuoU27Xq0CmqCqkuYXMq0/vJL5mH5Q+0I250u RlCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject; bh=PeMpHB1UaVYGh8oqL7/+H8waTPb/Jq8dxVIPc4CJ+Qk=; b=GmEC7yNT8vHbgvp3ASOmVi1TzGaGxhe7YakY/t0l7lxnIfUsS+pHJWJItb4Bbdlehm /xMKUnHUhmtnPGQKSJzFeZXCu3W9y2sM3/WvCoPI+BPnrATtMvItkvjecxWJZRehlbMK odzUw+P2st1nV/MZXILuAn0rJhFixzI6pBzOtoapfGhPB/OciXyET6Pq/+yRIEESeRqv SOuxajWRmpu6r+76oi9p2hasbXFSemfG8zgHTsYeK0PidySm4X35PpsqCRtJQx8dSWjo g/pzvkHPlP9yCPaF/8PPByWe/WC8L0n9t9B5tjyc80gVmuUJYk3ppgRj4ar6j5tFel9H BYPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 37si37317514pgz.39.2019.08.05.16.18.12; Mon, 05 Aug 2019 16:18:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730975AbfHEXRc (ORCPT + 99 others); Mon, 5 Aug 2019 19:17:32 -0400 Received: from mail-wr1-f65.google.com ([209.85.221.65]:39269 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730875AbfHEXRb (ORCPT ); Mon, 5 Aug 2019 19:17:31 -0400 Received: by mail-wr1-f65.google.com with SMTP id x4so32813305wrt.6 for ; Mon, 05 Aug 2019 16:17:30 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=PeMpHB1UaVYGh8oqL7/+H8waTPb/Jq8dxVIPc4CJ+Qk=; b=jr9QHnfZR7SVU5sK9TR9a2Rw0NmnoNMVsVZf8d1gW8GIw7C1ZYrhogxFgt4d8OGCQM 7pLAjr1yCMktYUSPR5UkTOF9bwdSnO0yP7LV99Vx+SOD/TY6ceUYztx7igdyFSCsbBE2 fR5Cf/bwDmush7+BvSsuFhL9syHCGQWuvAXiqrsoHELLewsBJ5hjWM5xV0y/uLQPFWku LewG2ppo6wvzGvwlwsyx1kk366jAzSdNgOEeTOfG/i9C4iCgW+KA+cJgLLcwWOg+0Xxm bUD8F+QL7/ysqgOSeLhRZcVqlshZIZU8aD95TW3DSSuEZ7qSWtOyu5c0KhPkHYnfON4v kZJg== X-Gm-Message-State: APjAAAUs+uygcmGKPIuAmbqpPySGTROBXzFFfTdq+Sdk2eQQJG15lcEX uDLz+V7Zk4WMc81dhDl8Vm7hbA== X-Received: by 2002:a5d:67cd:: with SMTP id n13mr342350wrw.138.1565047049292; Mon, 05 Aug 2019 16:17:29 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:dc26:ed70:9e4c:3810? ([2001:b07:6468:f312:dc26:ed70:9e4c:3810]) by smtp.gmail.com with ESMTPSA id h14sm85951308wrs.66.2019.08.05.16.17.28 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Mon, 05 Aug 2019 16:17:28 -0700 (PDT) Subject: Re: [PATCH v4 1/6] KVM: Fix leak vCPU's VMCS value into other pCPU To: Wanpeng Li , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Christian Borntraeger , Marc Zyngier , stable@vger.kernel.org References: <1564970604-10044-1-git-send-email-wanpengli@tencent.com> From: Paolo Bonzini Openpgp: preference=signencrypt Message-ID: <9acbc733-442f-0f65-9b56-ff800a3fa0f5@redhat.com> Date: Tue, 6 Aug 2019 01:17:27 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <1564970604-10044-1-git-send-email-wanpengli@tencent.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/08/19 04:03, Wanpeng Li wrote: > From: Wanpeng Li > > After commit d73eb57b80b (KVM: Boost vCPUs that are delivering interrupts), a > five years old bug is exposed. Running ebizzy benchmark in three 80 vCPUs VMs > on one 80 pCPUs Skylake server, a lot of rcu_sched stall warning splatting > in the VMs after stress testing: > > INFO: rcu_sched detected stalls on CPUs/tasks: { 4 41 57 62 77} (detected by 15, t=60004 jiffies, g=899, c=898, q=15073) > Call Trace: > flush_tlb_mm_range+0x68/0x140 > tlb_flush_mmu.part.75+0x37/0xe0 > tlb_finish_mmu+0x55/0x60 > zap_page_range+0x142/0x190 > SyS_madvise+0x3cd/0x9c0 > system_call_fastpath+0x1c/0x21 > > swait_active() sustains to be true before finish_swait() is called in > kvm_vcpu_block(), voluntarily preempted vCPUs are taken into account > by kvm_vcpu_on_spin() loop greatly increases the probability condition > kvm_arch_vcpu_runnable(vcpu) is checked and can be true, when APICv > is enabled the yield-candidate vCPU's VMCS RVI field leaks(by > vmx_sync_pir_to_irr()) into spinning-on-a-taken-lock vCPU's current > VMCS. > > This patch fixes it by checking conservatively a subset of events. > > Cc: Paolo Bonzini > Cc: Radim Krčmář > Cc: Christian Borntraeger > Cc: Marc Zyngier > Cc: stable@vger.kernel.org > Fixes: 98f4a1467 (KVM: add kvm_arch_vcpu_runnable() test to kvm_vcpu_on_spin() loop) > Signed-off-by: Wanpeng Li > --- > v3 -> v4: > * just test KVM_REQ_* > * rename the hook to apicv_has_pending_interrupt > * wrap with #ifdef CONFIG_KVM_ASYNC_PF > v2 -> v3: > * check conservatively a subset of events > v1 -> v2: > * checking swait_active(&vcpu->wq) for involuntary preemption > > arch/mips/kvm/mips.c | 5 +++++ > arch/powerpc/kvm/powerpc.c | 5 +++++ > arch/s390/kvm/kvm-s390.c | 5 +++++ > arch/x86/include/asm/kvm_host.h | 1 + > arch/x86/kvm/svm.c | 6 ++++++ > arch/x86/kvm/vmx/vmx.c | 6 ++++++ > arch/x86/kvm/x86.c | 16 ++++++++++++++++ > include/linux/kvm_host.h | 1 + > virt/kvm/arm/arm.c | 5 +++++ > virt/kvm/kvm_main.c | 16 +++++++++++++++- > 10 files changed, 65 insertions(+), 1 deletion(-) > > diff --git a/arch/mips/kvm/mips.c b/arch/mips/kvm/mips.c > index 2cfe839..95a4642 100644 > --- a/arch/mips/kvm/mips.c > +++ b/arch/mips/kvm/mips.c > @@ -98,6 +98,11 @@ int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu) > return !!(vcpu->arch.pending_exceptions); > } > > +bool kvm_arch_dy_runnable(struct kvm_vcpu *vcpu) Using a __weak definition for the default implementation is a bit more concise. Queued with that change. Paolo