Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755763AbdGKPzI (ORCPT ); Tue, 11 Jul 2017 11:55:08 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55700 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752619AbdGKPzH (ORCPT ); Tue, 11 Jul 2017 11:55:07 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com E87D3C04577C Authentication-Results: ext-mx08.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx08.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=rkrcmar@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com E87D3C04577C Date: Tue, 11 Jul 2017 17:54:58 +0200 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Wanpeng Li Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Wanpeng Li , Nadav Amit Subject: Re: [PATCH] KVM: VMX: Fix invalid guest state detection after task-switch emulation Message-ID: <20170711155458.GB28875@potion> References: <1499757180-20439-1-git-send-email-wanpeng.li@hotmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1499757180-20439-1-git-send-email-wanpeng.li@hotmail.com> X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Tue, 11 Jul 2017 15:55:07 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1925 Lines: 47 2017-07-11 00:13-0700, Wanpeng Li: > From: Wanpeng Li > > This can be reproduced by EPT=1, unrestricted_guest=N, emulate_invalid_state=Y > or EPT=0, the trace of kvm-unit-tests/taskswitch2.flat is like below, it tries > to emulate invalid guest state task-switch: > > kvm_exit: reason TASK_SWITCH rip 0x0 info 40000058 0 > kvm_emulate_insn: 42000:0:0f 0b (0x2) > kvm_emulate_insn: 42000:0:0f 0b (0x2) failed > kvm_inj_exception: #UD (0x0) > kvm_entry: vcpu 0 > kvm_exit: reason TASK_SWITCH rip 0x0 info 40000058 0 > kvm_emulate_insn: 42000:0:0f 0b (0x2) > kvm_emulate_insn: 42000:0:0f 0b (0x2) failed > kvm_inj_exception: #UD (0x0) > ...................... > > It appears that the task-switch emulation updates rflags (and vm86 > flag) only after the segments are loaded, causing vmx->emulation_required > to be set, when in fact invalid guest state emulation is not needed. > > This patch fixes it by updating vmx->emulation_required after the > rflags (and vm86 flag) is updated in task-switch emulation. > > Suggested-by: Nadav Amit > Cc: Paolo Bonzini > Cc: Radim Krčmář > Cc: Nadav Amit > Signed-off-by: Wanpeng Li > --- > arch/x86/kvm/vmx.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index f50cbfd..70270a2 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -6255,6 +6255,7 @@ static int handle_task_switch(struct kvm_vcpu *vcpu) > * TODO: What about debug traps on tss switch? > * Are we supposed to inject them and update dr6? > */ > + vmx->emulation_required = emulation_required(vcpu); Hm, so the problem happened because changes to rflags can flip the value of emulation_required(). I would add this line to vmx_set_rflags() to make sure that we fixed everything, thanks.