* Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree
@ 2017-10-02 12:30 gregkh
2017-10-03 7:46 ` Stefan Lippers-Hollmann
0 siblings, 1 reply; 5+ messages in thread
From: gregkh @ 2017-10-02 12:30 UTC (permalink / raw)
To: pbonzini, arei.gonglei, gregkh, longpeng2, rkrcmar,
wangxinxin.wang, weidong.huang
Cc: stable, stable-commits
This is a note to let you know that I've just added the patch titled
KVM: VMX: avoid double list add with VT-d posted interrupts
to the 4.13-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
and it can be found in the queue-4.13 subdirectory.
If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@vger.kernel.org> know about it.
>From 8b306e2f3c41939ea528e6174c88cfbfff893ce1 Mon Sep 17 00:00:00 2001
From: Paolo Bonzini <pbonzini@redhat.com>
Date: Tue, 6 Jun 2017 12:57:05 +0200
Subject: KVM: VMX: avoid double list add with VT-d posted interrupts
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
From: Paolo Bonzini <pbonzini@redhat.com>
commit 8b306e2f3c41939ea528e6174c88cfbfff893ce1 upstream.
In some cases, for example involving hot-unplug of assigned
devices, pi_post_block can forget to remove the vCPU from the
blocked_vcpu_list. When this happens, the next call to
pi_pre_block corrupts the list.
Fix this in two ways. First, check vcpu->pre_pcpu in pi_pre_block
and WARN instead of adding the element twice in the list. Second,
always do the list removal in pi_post_block if vcpu->pre_pcpu is
set (not -1).
The new code keeps interrupts disabled for the whole duration of
pi_pre_block/pi_post_block. This is not strictly necessary, but
easier to follow. For the same reason, PI.ON is checked only
after the cmpxchg, and to handle it we just call the post-block
code. This removes duplication of the list removal code.
Cc: Huangweidong <weidong.huang@huawei.com>
Cc: Gonglei <arei.gonglei@huawei.com>
Cc: wangxin <wangxinxin.wang@huawei.com>
Cc: Radim Krčmář <rkrcmar@redhat.com>
Tested-by: Longpeng (Mike) <longpeng2@huawei.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
arch/x86/kvm/vmx.c | 62 +++++++++++++++++++++--------------------------------
1 file changed, 25 insertions(+), 37 deletions(-)
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -11394,10 +11394,11 @@ static void __pi_post_block(struct kvm_v
struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
struct pi_desc old, new;
unsigned int dest;
- unsigned long flags;
do {
old.control = new.control = pi_desc->control;
+ WARN(old.nv != POSTED_INTR_WAKEUP_VECTOR,
+ "Wakeup handler not enabled while the VCPU is blocked\n");
dest = cpu_physical_id(vcpu->cpu);
@@ -11414,14 +11415,10 @@ static void __pi_post_block(struct kvm_v
} while (cmpxchg(&pi_desc->control, old.control,
new.control) != old.control);
- if(vcpu->pre_pcpu != -1) {
- spin_lock_irqsave(
- &per_cpu(blocked_vcpu_on_cpu_lock,
- vcpu->pre_pcpu), flags);
+ if (!WARN_ON_ONCE(vcpu->pre_pcpu == -1)) {
+ spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->pre_pcpu));
list_del(&vcpu->blocked_vcpu_list);
- spin_unlock_irqrestore(
- &per_cpu(blocked_vcpu_on_cpu_lock,
- vcpu->pre_pcpu), flags);
+ spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->pre_pcpu));
vcpu->pre_pcpu = -1;
}
}
@@ -11441,7 +11438,6 @@ static void __pi_post_block(struct kvm_v
*/
static int pi_pre_block(struct kvm_vcpu *vcpu)
{
- unsigned long flags;
unsigned int dest;
struct pi_desc old, new;
struct pi_desc *pi_desc = vcpu_to_pi_desc(vcpu);
@@ -11451,34 +11447,20 @@ static int pi_pre_block(struct kvm_vcpu
!kvm_vcpu_apicv_active(vcpu))
return 0;
- vcpu->pre_pcpu = vcpu->cpu;
- spin_lock_irqsave(&per_cpu(blocked_vcpu_on_cpu_lock,
- vcpu->pre_pcpu), flags);
- list_add_tail(&vcpu->blocked_vcpu_list,
- &per_cpu(blocked_vcpu_on_cpu,
- vcpu->pre_pcpu));
- spin_unlock_irqrestore(&per_cpu(blocked_vcpu_on_cpu_lock,
- vcpu->pre_pcpu), flags);
+ WARN_ON(irqs_disabled());
+ local_irq_disable();
+ if (!WARN_ON_ONCE(vcpu->pre_pcpu != -1)) {
+ vcpu->pre_pcpu = vcpu->cpu;
+ spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->pre_pcpu));
+ list_add_tail(&vcpu->blocked_vcpu_list,
+ &per_cpu(blocked_vcpu_on_cpu,
+ vcpu->pre_pcpu));
+ spin_unlock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->pre_pcpu));
+ }
do {
old.control = new.control = pi_desc->control;
- /*
- * We should not block the vCPU if
- * an interrupt is posted for it.
- */
- if (pi_test_on(pi_desc) == 1) {
- spin_lock_irqsave(&per_cpu(blocked_vcpu_on_cpu_lock,
- vcpu->pre_pcpu), flags);
- list_del(&vcpu->blocked_vcpu_list);
- spin_unlock_irqrestore(
- &per_cpu(blocked_vcpu_on_cpu_lock,
- vcpu->pre_pcpu), flags);
- vcpu->pre_pcpu = -1;
-
- return 1;
- }
-
WARN((pi_desc->sn == 1),
"Warning: SN field of posted-interrupts "
"is set before blocking\n");
@@ -11503,7 +11485,12 @@ static int pi_pre_block(struct kvm_vcpu
} while (cmpxchg(&pi_desc->control, old.control,
new.control) != old.control);
- return 0;
+ /* We should not block the vCPU if an interrupt is posted for it. */
+ if (pi_test_on(pi_desc) == 1)
+ __pi_post_block(vcpu);
+
+ local_irq_enable();
+ return (vcpu->pre_pcpu == -1);
}
static int vmx_pre_block(struct kvm_vcpu *vcpu)
@@ -11519,12 +11506,13 @@ static int vmx_pre_block(struct kvm_vcpu
static void pi_post_block(struct kvm_vcpu *vcpu)
{
- if (!kvm_arch_has_assigned_device(vcpu->kvm) ||
- !irq_remapping_cap(IRQ_POSTING_CAP) ||
- !kvm_vcpu_apicv_active(vcpu))
+ if (vcpu->pre_pcpu == -1)
return;
+ WARN_ON(irqs_disabled());
+ local_irq_disable();
__pi_post_block(vcpu);
+ local_irq_enable();
}
static void vmx_post_block(struct kvm_vcpu *vcpu)
Patches currently in stable-queue which might be from pbonzini@redhat.com are
queue-4.13/kvm-vmx-simplify-and-fix-vmx_vcpu_pi_load.patch
queue-4.13/kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
queue-4.13/genirq-fix-cpumask-check-in-__irq_startup_managed.patch
queue-4.13/kvm-nvmx-don-t-allow-l2-to-access-the-hardware-cr8.patch
queue-4.13/kvm-x86-handle-async-pf-in-rcu-read-side-critical-sections.patch
queue-4.13/kvm-vmx-extract-__pi_post_block.patch
queue-4.13/kvm-nvmx-fix-host_cr3-host_cr4-cache.patch
queue-4.13/kvm-vmx-do-not-bug-on-out-of-bounds-guest-irq.patch
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree
2017-10-02 12:30 Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree gregkh
@ 2017-10-03 7:46 ` Stefan Lippers-Hollmann
2017-10-03 8:08 ` Paolo Bonzini
0 siblings, 1 reply; 5+ messages in thread
From: Stefan Lippers-Hollmann @ 2017-10-03 7:46 UTC (permalink / raw)
To: gregkh
Cc: linux-kernel, pbonzini, arei.gonglei, longpeng2, rkrcmar,
wangxinxin.wang, weidong.huang, stable
[-- Attachment #1: Type: text/plain, Size: 5590 bytes --]
Hi
On 2017-10-02, gregkh@linuxfoundation.org wrote:
> This is a note to let you know that I've just added the patch titled
>
> KVM: VMX: avoid double list add with VT-d posted interrupts
>
> to the 4.13-stable tree which can be found at:
> http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
>
> The filename of the patch is:
> kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
> and it can be found in the queue-4.13 subdirectory.
This patch, as part of the current queue-4.13, breaks the build on
i386 (amd64/ x86_64 builds fine):
CC [M] arch/x86/kvm/vmx.o
In file included from /build/linux-aptosid-4.13/arch/x86/include/asm/atomic.h:7:0,
from /build/linux-aptosid-4.13/include/linux/atomic.h:4,
from /build/linux-aptosid-4.13/include/linux/mm_types_task.h:12,
from /build/linux-aptosid-4.13/include/linux/mm_types.h:4,
from /build/linux-aptosid-4.13/arch/x86/kvm/irq.h:25,
from /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:19:
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c: In function '__pi_post_block':
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:129:2: warning: '__ret' is used uninitialized in this function [-Wuninitialized]
__ret; \
^~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:86:21: note: '__ret' was declared here
__typeof__(*(ptr)) __ret; \
^
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
__raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
^~~~~~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
__cmpxchg(ptr, old, new, sizeof(*(ptr)))
^~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11422:11: note: in expansion of macro 'cmpxchg'
} while (cmpxchg(&pi_desc->control, old.control,
^~~~~~~
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c: In function 'vmx_vcpu_load':
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2226:2: warning: '__ret' may be used uninitialized in this function [-Wmaybe-uninitialized]
} while (cmpxchg(&pi_desc->control, old.control,
^
In file included from /build/linux-aptosid-4.13/arch/x86/include/asm/atomic.h:7:0,
from /build/linux-aptosid-4.13/include/linux/atomic.h:4,
from /build/linux-aptosid-4.13/include/linux/mm_types_task.h:12,
from /build/linux-aptosid-4.13/include/linux/mm_types.h:4,
from /build/linux-aptosid-4.13/arch/x86/kvm/irq.h:25,
from /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:19:
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:86:21: note: '__ret' was declared here
__typeof__(*(ptr)) __ret; \
^
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
__raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
^~~~~~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
__cmpxchg(ptr, old, new, sizeof(*(ptr)))
^~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2226:11: note: in expansion of macro 'cmpxchg'
} while (cmpxchg(&pi_desc->control, old.control,
^~~~~~~
In function 'vmx_vcpu_pi_load',
inlined from 'vmx_vcpu_load' at /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2301:2:
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:127:3: error: call to '__cmpxchg_wrong_size' declared with attribute error: Bad argument size for cmpxchg
__cmpxchg_wrong_size(); \
^~~~~~~~~~~~~~~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
__raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
^~~~~~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
__cmpxchg(ptr, old, new, sizeof(*(ptr)))
^~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2226:11: note: in expansion of macro 'cmpxchg'
} while (cmpxchg(&pi_desc->control, old.control,
^~~~~~~
In function '__pi_post_block',
inlined from 'pi_post_block' at /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11521:2,
inlined from 'vmx_post_block' at /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11530:2:
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:127:3: error: call to '__cmpxchg_wrong_size' declared with attribute error: Bad argument size for cmpxchg
__cmpxchg_wrong_size(); \
^~~~~~~~~~~~~~~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
__raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
^~~~~~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
__cmpxchg(ptr, old, new, sizeof(*(ptr)))
^~~~~~~~~
/build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11422:11: note: in expansion of macro 'cmpxchg'
} while (cmpxchg(&pi_desc->control, old.control,
^~~~~~~
/build/linux-aptosid-4.13/scripts/Makefile.build:302: recipe for target 'arch/x86/kvm/vmx.o' failed
make[7]: *** [arch/x86/kvm/vmx.o] Error 1
Reverting just these patches from queue-4.13
kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
kvm-vmx-simplify-and-fix-vmx_vcpu_pi_load.patch
fixes the problem for me (tested on i386 and x86_64); the failing config
for i386 is attached (xz compressed).
Regards
Stefan Lippers-Hollmann
[-- Attachment #2: config-4.13.0-4.slh.2-aptosid-686.xz --]
[-- Type: application/x-xz, Size: 36128 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree
2017-10-03 7:46 ` Stefan Lippers-Hollmann
@ 2017-10-03 8:08 ` Paolo Bonzini
2017-10-03 22:30 ` Stefan Lippers-Hollmann
0 siblings, 1 reply; 5+ messages in thread
From: Paolo Bonzini @ 2017-10-03 8:08 UTC (permalink / raw)
To: Stefan Lippers-Hollmann, gregkh
Cc: linux-kernel, arei.gonglei, longpeng2, rkrcmar, wangxinxin.wang,
weidong.huang, stable
On 03/10/2017 09:46, Stefan Lippers-Hollmann wrote:
> Hi
>
> On 2017-10-02, gregkh@linuxfoundation.org wrote:
>> This is a note to let you know that I've just added the patch titled
>>
>> KVM: VMX: avoid double list add with VT-d posted interrupts
>>
>> to the 4.13-stable tree which can be found at:
>> http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
>>
>> The filename of the patch is:
>> kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
>> and it can be found in the queue-4.13 subdirectory.
>
> This patch, as part of the current queue-4.13, breaks the build on
> i386 (amd64/ x86_64 builds fine):
>
> CC [M] arch/x86/kvm/vmx.o
> In file included from /build/linux-aptosid-4.13/arch/x86/include/asm/atomic.h:7:0,
> from /build/linux-aptosid-4.13/include/linux/atomic.h:4,
> from /build/linux-aptosid-4.13/include/linux/mm_types_task.h:12,
> from /build/linux-aptosid-4.13/include/linux/mm_types.h:4,
> from /build/linux-aptosid-4.13/arch/x86/kvm/irq.h:25,
> from /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:19:
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c: In function '__pi_post_block':
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:129:2: warning: '__ret' is used uninitialized in this function [-Wuninitialized]
> __ret; \
> ^~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:86:21: note: '__ret' was declared here
> __typeof__(*(ptr)) __ret; \
> ^
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
> __raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
> ^~~~~~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
> __cmpxchg(ptr, old, new, sizeof(*(ptr)))
> ^~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11422:11: note: in expansion of macro 'cmpxchg'
> } while (cmpxchg(&pi_desc->control, old.control,
> ^~~~~~~
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c: In function 'vmx_vcpu_load':
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2226:2: warning: '__ret' may be used uninitialized in this function [-Wmaybe-uninitialized]
> } while (cmpxchg(&pi_desc->control, old.control,
> ^
> In file included from /build/linux-aptosid-4.13/arch/x86/include/asm/atomic.h:7:0,
> from /build/linux-aptosid-4.13/include/linux/atomic.h:4,
> from /build/linux-aptosid-4.13/include/linux/mm_types_task.h:12,
> from /build/linux-aptosid-4.13/include/linux/mm_types.h:4,
> from /build/linux-aptosid-4.13/arch/x86/kvm/irq.h:25,
> from /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:19:
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:86:21: note: '__ret' was declared here
> __typeof__(*(ptr)) __ret; \
> ^
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
> __raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
> ^~~~~~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
> __cmpxchg(ptr, old, new, sizeof(*(ptr)))
> ^~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2226:11: note: in expansion of macro 'cmpxchg'
> } while (cmpxchg(&pi_desc->control, old.control,
> ^~~~~~~
> In function 'vmx_vcpu_pi_load',
> inlined from 'vmx_vcpu_load' at /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2301:2:
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:127:3: error: call to '__cmpxchg_wrong_size' declared with attribute error: Bad argument size for cmpxchg
> __cmpxchg_wrong_size(); \
> ^~~~~~~~~~~~~~~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
> __raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
> ^~~~~~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
> __cmpxchg(ptr, old, new, sizeof(*(ptr)))
> ^~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:2226:11: note: in expansion of macro 'cmpxchg'
> } while (cmpxchg(&pi_desc->control, old.control,
> ^~~~~~~
> In function '__pi_post_block',
> inlined from 'pi_post_block' at /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11521:2,
> inlined from 'vmx_post_block' at /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11530:2:
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:127:3: error: call to '__cmpxchg_wrong_size' declared with attribute error: Bad argument size for cmpxchg
> __cmpxchg_wrong_size(); \
> ^~~~~~~~~~~~~~~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:133:2: note: in expansion of macro '__raw_cmpxchg'
> __raw_cmpxchg((ptr), (old), (new), (size), LOCK_PREFIX)
> ^~~~~~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/include/asm/cmpxchg.h:148:2: note: in expansion of macro '__cmpxchg'
> __cmpxchg(ptr, old, new, sizeof(*(ptr)))
> ^~~~~~~~~
> /build/linux-aptosid-4.13/arch/x86/kvm/vmx.c:11422:11: note: in expansion of macro 'cmpxchg'
> } while (cmpxchg(&pi_desc->control, old.control,
> ^~~~~~~
> /build/linux-aptosid-4.13/scripts/Makefile.build:302: recipe for target 'arch/x86/kvm/vmx.o' failed
> make[7]: *** [arch/x86/kvm/vmx.o] Error 1
>
>
> Reverting just these patches from queue-4.13
> kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
> kvm-vmx-simplify-and-fix-vmx_vcpu_pi_load.patch
> fixes the problem for me (tested on i386 and x86_64); the failing config
> for i386 is attached (xz compressed).
There is another patch in the kvm tree to fix it, I'll send it to stable
immediately.
Paolo
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree
2017-10-03 8:08 ` Paolo Bonzini
@ 2017-10-03 22:30 ` Stefan Lippers-Hollmann
2017-10-04 7:56 ` Greg KH
0 siblings, 1 reply; 5+ messages in thread
From: Stefan Lippers-Hollmann @ 2017-10-03 22:30 UTC (permalink / raw)
To: Paolo Bonzini
Cc: gregkh, linux-kernel, arei.gonglei, longpeng2, rkrcmar,
wangxinxin.wang, weidong.huang, stable
Hi
On 2017-10-03, Paolo Bonzini wrote:
> On 03/10/2017 09:46, Stefan Lippers-Hollmann wrote:
> > On 2017-10-02, gregkh@linuxfoundation.org wrote:
> >> This is a note to let you know that I've just added the patch titled
> >>
> >> KVM: VMX: avoid double list add with VT-d posted interrupts
> >>
> >> to the 4.13-stable tree which can be found at:
> >> http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
> >>
> >> The filename of the patch is:
> >> kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
> >> and it can be found in the queue-4.13 subdirectory.
> >
> > This patch, as part of the current queue-4.13, breaks the build on
> > i386 (amd64/ x86_64 builds fine):
[...]
> There is another patch in the kvm tree to fix it, I'll send it to stable
> immediately.
Thanks, I can confirm this to work in 4.13.5-rc1 (including
"KVM: VMX: use cmpxchg64") for i386 and x86_64.
Unrelated to this specific, solved, issue I can confirm kernel
4.9.53-rc1 to build and boot on armhf (ipq8065) and 4.4.90-rc1
on mips (ar71xx).
Thanks a lot, regards
Stefan Lippers-Hollmann
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree
2017-10-03 22:30 ` Stefan Lippers-Hollmann
@ 2017-10-04 7:56 ` Greg KH
0 siblings, 0 replies; 5+ messages in thread
From: Greg KH @ 2017-10-04 7:56 UTC (permalink / raw)
To: Stefan Lippers-Hollmann
Cc: Paolo Bonzini, linux-kernel, arei.gonglei, longpeng2, rkrcmar,
wangxinxin.wang, weidong.huang, stable
On Wed, Oct 04, 2017 at 12:30:21AM +0200, Stefan Lippers-Hollmann wrote:
> Hi
>
> On 2017-10-03, Paolo Bonzini wrote:
> > On 03/10/2017 09:46, Stefan Lippers-Hollmann wrote:
> > > On 2017-10-02, gregkh@linuxfoundation.org wrote:
> > >> This is a note to let you know that I've just added the patch titled
> > >>
> > >> KVM: VMX: avoid double list add with VT-d posted interrupts
> > >>
> > >> to the 4.13-stable tree which can be found at:
> > >> http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
> > >>
> > >> The filename of the patch is:
> > >> kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch
> > >> and it can be found in the queue-4.13 subdirectory.
> > >
> > > This patch, as part of the current queue-4.13, breaks the build on
> > > i386 (amd64/ x86_64 builds fine):
> [...]
> > There is another patch in the kvm tree to fix it, I'll send it to stable
> > immediately.
>
> Thanks, I can confirm this to work in 4.13.5-rc1 (including
> "KVM: VMX: use cmpxchg64") for i386 and x86_64.
>
> Unrelated to this specific, solved, issue I can confirm kernel
> 4.9.53-rc1 to build and boot on armhf (ipq8065) and 4.4.90-rc1
> on mips (ar71xx).
Nice, thanks for testing and letting me know.
greg k-h
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2017-10-04 7:56 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-10-02 12:30 Patch "KVM: VMX: avoid double list add with VT-d posted interrupts" has been added to the 4.13-stable tree gregkh
2017-10-03 7:46 ` Stefan Lippers-Hollmann
2017-10-03 8:08 ` Paolo Bonzini
2017-10-03 22:30 ` Stefan Lippers-Hollmann
2017-10-04 7:56 ` Greg KH
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.