From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 52C93C43603 for ; Thu, 19 Dec 2019 15:28:19 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2400221D7D for ; Thu, 19 Dec 2019 15:28:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576769299; bh=sQSHOUejb0NrITZ23gNkinjyHOPbHZHsfdYvVQRdAdw=; h=Date:From:To:Cc:Subject:List-ID:From; b=rLln5dgV9loWWMxJsfeYTZ9FnIjihDQYWiE1bcf8cqU+Ni5cUj2yVeh3r6qG7cQyA SkHxgoEcuPIBA5cFkgeX43TjTmdIxRyfxo2qtsNKM305kUvVAx1Wz5wX21kI68vYW6 toTOpvOr0jlOATq2/aJScJ9rmUy6JaL9KmLxv9ew= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726789AbfLSP2S (ORCPT ); Thu, 19 Dec 2019 10:28:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:38542 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726759AbfLSP2S (ORCPT ); Thu, 19 Dec 2019 10:28:18 -0500 Received: from localhost (lfbn-ncy-1-150-155.w83-194.abo.wanadoo.fr [83.194.232.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 08342206EC; Thu, 19 Dec 2019 15:28:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576769297; bh=sQSHOUejb0NrITZ23gNkinjyHOPbHZHsfdYvVQRdAdw=; h=Date:From:To:Cc:Subject:From; b=Cfe1T0qkWZG+J2JW8IqUpK72QwIko7lthhk8rJLz5xbd1lly0aD/7qE38mw7CSM1/ aKLM5FSOCtyau30JeizBYJz2pWjswGW6dfUyGhUKrN2rWxFiJygTsoNhIJG0gKXGUh NkJOq7dPQIv/EGEHHhO5wuPbFwLr5QxJBF3CfzGA= Date: Thu, 19 Dec 2019 16:28:15 +0100 From: Frederic Weisbecker To: Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org Subject: Async page fault delivered while irq are disabled? Message-ID: <20191219152814.GA24080@lenoir> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org Hi, While checking the x86 async page fault code, I can't find anything that prevents KVM_PV_REASON_PAGE_READY to be injected while the guest has interrupts disabled. If that page fault happens to trap in an interrupt disabled section, there may be a deadlock due to the call to wake_up_process() which locks the rq->lock (among others). Given how long that code is there, I guess such an issue would have been reported for a while already. But I just would like to be sure we are checking that. Can someone enlighten me? Thanks.