This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verification-needed-xenial' to 'verification-failed-
xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908428

Title:
  4.4 kernel panics in kvm wake_up() handler

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  [Description]

  User reported that 4.4 kernels are affected by the bug in [1].

  The bug presents itself with the following trace :

  [219901.424329] CPU: 19 PID: 0 Comm: swapper/19 Tainted: G           OE   
4.4.0-133-generic #159~14.04.1-Ubuntu
  [219901.441800] task: ffff885f62e63fc0 ti: ffff885f62e7c000 task.ti: 
ffff885f62e7c000
  [219901.449408] RIP: 0010:[<ffffffffc09c8cfd>]  [<ffffffffc09c8cfd>] 
wakeup_handler+0x6d/0xa0 [kvm_intel]
  [219901.458791] RSP: 0018:ffff885f7c043f70  EFLAGS: 00010083
  [219901.464217] RAX: ffff885f7c040000 RBX: dead0000000000b8 RCX: 
ffff885f7c0586c0
  [219901.471480] RDX: dead000000000100 RSI: 0000000000000000 RDI: 
ffff885f7c0586b0
  [219901.478741] RBP: ffff885f7c043f90 R08: 0000000000000000 R09: 
0000c7ffc2ec9069
  [219901.486003] R10: 0000000000000494 R11: ffff885f7c057370 R12: 
00000000000186b0
  [219901.493267] R13: 0000000000000013 R14: 00000000000186c0 R15: 
ffff885f62e7c000
  [219901.500528] FS:  0000000000000000(0000) GS:ffff885f7c040000(0000) 
knlGS:0000000000000000
  [219901.511738] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [219901.517597] CR2: 00007f6d57098000 CR3: 0000003183dfe000 CR4: 
0000000000362670
  [219901.524860] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
  [219901.532121] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 
0000000000000400
  [219901.539384] Stack:
  [219901.541509]  0000000000000000 0000000000000013 0000000000000000 
0000000000000000
  [219901.549120]  ffff885f7c043fa8 ffffffff8102fa99 ffffffff81f40200 
ffff885f62e7fe98
  [219901.556747]  ffffffff8182131f ffff885f62e7fde8 <EOI>  ffff885f62e7c000 
0000000000000000
  [219901.565006] Call Trace:
  [219901.567567]  <IRQ>
  [219901.569592]  [<ffffffff8102fa99>] smp_kvm_posted_intr_wakeup_ipi+0x59/0x70
  [219901.576795]  [<ffffffff8182131f>] kvm_posted_intr_wakeup_ipi+0xbf/0xd0
  [219901.583431]  <EOI>
  [219901.585456]  [<ffffffff81037b30>] ? hard_disable_TSC+0x30/0x30
  [219901.591621]  [<ffffffff810645a6>] ? native_safe_halt+0x6/0x10
  [219901.597479]  [<ffffffff81037b4e>] default_idle+0x1e/0xe0
  [219901.602900]  [<ffffffff810386c5>] arch_cpu_idle+0x15/0x20
  [219901.608416]  [<ffffffff810c3e7a>] default_idle_call+0x2a/0x40
  [219901.614270]  [<ffffffff810c41d0>] cpu_startup_entry+0x2e0/0x350
  [219901.620305]  [<ffffffff81050c2c>] start_secondary+0x16c/0x190

  The root cause is blocked_vcpu_on_cpu list is corrupted.
  This bug is fixed  with the patchset found in [2].
  Only the first 3 (out of 4) of them have made their way in upstream kernel and
  are the ones needed to fix the bug.

  [Test case]
  It was not possible to reproduce this bug locally.
  A test kernel with the fixing patches has been provided to the user and they 
confirmed that it resolves the issue.

  [Regression Potential]

  The patches have been accepted upstream in 4.14 and so far there are no known 
regressions.
  Backporting the patches was necessary; original patches modify 
pi_pre/post_block functions which are not present in 4.4.
  These functions are introduced by upstream commit bc22512bb24c(kvm: vmx: 
rename vmx_pre/post_block to pi_pre/post_block).
  Appropriate changes where made for the patches to modify vmx_pre/post_block 
function without changing the functionality of the patches.
  Testing has not revealed any regressions.

  
  [Other]

  Only 4.4 kernels are affected.

  
  [1] https://marc.info/?l=kvm&m=149559827906211&w=2
  [2] https://lore.kernel.org/lkml/20170606105707.23207-1-pbonz...@redhat.com/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1908428/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to