Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1702654ybl; Tue, 3 Dec 2019 11:17:55 -0800 (PST) X-Google-Smtp-Source: APXvYqxad2uZA4UzNQwTwD5W0/OfdHwbXjDofHJ7n62/CAUTMTFA+ulveeUn65wZbUL7h1ipPI+5 X-Received: by 2002:a9d:7592:: with SMTP id s18mr4632711otk.130.1575400674943; Tue, 03 Dec 2019 11:17:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575400674; cv=none; d=google.com; s=arc-20160816; b=nkA3wVssU3C8c9/dwTzh52XX8Ps9CfBarEH0eDfKluFzPPL/a7K9alWo0dfl1J8Ezt v7qgwKCUTJosfnLD5u75dxQnv29s9FOk225/RtEQyPUSZ0HfUYeD5vBc0CL11j9drPzN wAU4XnWqqk0x/opFJdRr8gwdCVke4o+dZ9Fxg5u9vSY9Ao2jZxBuyIeExEnPsARnLCry VncZsc/i29+Savp6VzIlVu3Ttw7fz1QvCW8W/VlhZzCADFSJ+BOPt2ipCuQXhuKaXdJ9 fyL97utkLLg+jKRbn5USwNwE9dybsF+LYLZC6I07meDzRWUWJo94lpd1TkeVVDR/C0gG iLew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=vu9W6bWdcElfLAtNyQ4b++hGLC7GxCH8s3nFewr5fZw=; b=nhPTzH7i8h5dnpMq6Xf0qe3gee+E4AhtwuBTqdvSfyIWDDBON0OwhzxHBPJX1gbMN2 jrcqmqBrGDJ/OvWl71/Ggxdsx4/HBuDMn66LYIOpzOx6aofbumUXH3uzwWBwjnPEjgDX 6Wzu32TgexcEiwx50TCR+SXPuMPAQMQXBc7foquBsyog4qDkuAukoKNRe9DpN67d+iQP InPNH0cDIkledu5Y49WG9QG33lEuVIjqM9GFynEUkm1TzfYqQVsuqBO7+cuR1YUI1/95 k8QZFgZg90XjGgUU7FTLUfvkbay2sU72xRlekoyOL/tT4bLe+3BazSW1uxaEiLeB8IaP V2CA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IzLA9b69; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q127si1927681oic.99.2019.12.03.11.17.42; Tue, 03 Dec 2019 11:17:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IzLA9b69; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727379AbfLCTRA (ORCPT + 99 others); Tue, 3 Dec 2019 14:17:00 -0500 Received: from mail.kernel.org ([198.145.29.99]:58458 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726057AbfLCTQ7 (ORCPT ); Tue, 3 Dec 2019 14:16:59 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 43F5D20803; Tue, 3 Dec 2019 19:16:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575400617; bh=RwkH1ulrDvXWwzr0DH2in8vnq4W1hdcqSlSTktOsmNc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IzLA9b69IyyKmXf2EXkqbAryRlspPIP5VjeAoyBOihZMSOcXm+XynlTzth95G6uek gkaOC+z46RheKclf3vLkhThYMZ8sil0fhwSsVi2JEUqNF/HR+5ey4D3GE/CYSkevZP Bj/Sy0bDVEI9pv3r5OFVopvLNm17rlK9I/1wzLBo= Date: Tue, 3 Dec 2019 20:16:55 +0100 From: Greg Kroah-Hartman To: Paolo Bonzini Cc: Jack Wang , linux-kernel@vger.kernel.org, stable , Sean Christopherson , Jim Mattson , Sasha Levin Subject: Re: [PATCH 4.19 067/306] KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() Message-ID: <20191203191655.GC2734645@kroah.com> References: <20191127203114.766709977@linuxfoundation.org> <20191127203119.676489279@linuxfoundation.org> <20191202145105.GA571975@kroah.com> <828cf8b7-11ac-e707-57b6-cb598cc37f1b@redhat.com> <1387d9b8-0e08-a22e-6dd1-4b7ea58567b3@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1387d9b8-0e08-a22e-6dd1-4b7ea58567b3@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 03, 2019 at 01:52:47PM +0100, Paolo Bonzini wrote: > On 03/12/19 13:27, Jack Wang wrote: > >>> Should we simply revert the patch, maybe also > >>> 9fe573d539a8 ("KVM: nVMX: reset cache/shadows when switching loaded VMCS") > >>> > >>> Both of them are from one big patchset: > >>> https://patchwork.kernel.org/cover/10616179/ > >>> > >>> Revert both patches recover the regression I see on kvm-unit-tests. > >> Greg already included the patches that the bot missed, so it's okay. > >> > >> Paolo > >> > > Sorry, I think I gave wrong information initially, it's 9fe573d539a8 > > ("KVM: nVMX: reset cache/shadows when switching loaded VMCS") > > which caused regression. > > > > Should we revert or there's following up fix we should backport? > > Hmm, let's revert all four. This one, the two follow-ups and 9fe573d539a8. 4? I see three patches here, the 2 follow-up patches that I applied to the queue, and the "original" backport of b7031fd40fcc ("KVM: nVMX: reset cache/shadows when switching loaded VMCS") which showed up in the 4.14.157 and 4.19.87 kernels. confused, greg k-h