Bug 1772653 - Latency spikes after recent CVE application
Summary: Latency spikes after recent CVE application
Keywords:
Status: CLOSED DUPLICATE of bug 1772738
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: kernel-rt
Version: 8.2
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: 8.0
Assignee: Clark Williams
QA Contact: Qiao Zhao
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-11-14 19:52 UTC by Tom Rix
Modified: 2023-08-08 02:49 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-11-15 13:16:14 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Tom Rix 2019-11-14 19:52:42 UTC
Description of problem:


The KVM-RT team saw large cyclictest latency's during testing of RT kernels
that were built with the recent set of CVEs.

One of these CVEs, CVE-2018-1220, introduced code for recovering
shattered huge pages in the kvm/mmu.c code. A settable
variable in this code, nx_huge_pages_recovery_ratio, was defaulted to
the value 60, which means that the recovery code would loop potentially
60 times while the kvm->mmu_lock was held. This bit of code introduced
very large (> 5000us) on single VMs with multiple vCPUs. On a single VM with 1
vCPU, the max latency was around 138us which is still unacceptable. 

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 3 Paolo Bonzini 2019-11-15 13:16:14 UTC
This is not related to the JCC erratum, so I'm closing this as a duplicate of bug 1772738, which points to the right fix.

*** This bug has been marked as a duplicate of bug 1772738 ***


Note You need to log in before you can comment on or make changes to this bug.