Received: by 10.223.185.116 with SMTP id b49csp721615wrg; Sat, 10 Feb 2018 18:05:23 -0800 (PST) X-Google-Smtp-Source: AH8x225trceL3cDoGjL+k/wVOVqSMv9QlO8XmzQijG4BkP2exqSnoZaazwY6yvHsqQmh/6BHuyaX X-Received: by 10.98.93.9 with SMTP id r9mr7429268pfb.55.1518314723068; Sat, 10 Feb 2018 18:05:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518314723; cv=none; d=google.com; s=arc-20160816; b=l4F7NGQgn3WayspWM9+o8MKx+SSZikC4zaoG8s9vTzFuvdXqjsd34pSD+FUxsKuddr N3qogLHv9w0A8bWPfY0igJkp+aFj0CS4vowme/lJehaAGHohdrNCdaPzzHEskUTFEy+q 3C9fANo/ydG4F+et8ymd+oqgUbzKMUtzHpIHzBcDF9jSZilWca1HswmZrPY1WZCaq884 xNWToRkof0z/uNHdTDhKgpFYUQTYdGPKq6+TZ28VDBajjZ/3FY8jtBWDndB502WO83UX bbWMky826OIVGXPrYVQXUqzqytrXs0QNVIbZtt6yaZO8DLbzRrDCwMoI79GTCqpPpKdY 4ykQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=M/LLHkhreVHAOCze8sC9v3mUA8sFsMrsC6lAwsZocfU=; b=JuHDa2wJO7UUobnoSZV544tcz1MJkWS2kIhzt+jz1VwGVpo6GOxquq3NwTE2fpXI62 LNqmjLpVGjYV/pxDIjgCXo/mCWC+nN9YbAEAtbfr9nIO4bOP+n/cLvM4oRxx5v3VRFDi 09O+HxwgL814eii88oth0O04ttIgyFDCxy634gN9f8p/MSRhZa0vIutxMG4qGO4GlcMq DjaKXcZSTlUiLl44JzpHephqDoVARWRWrKqH4kURrferj5BypVu+89p0jhBVjEVURX+o 7xUXGMKRe4j6qwPJ9ne+EOXGcmJTt/x+hYX7H77e/C6gTeivgT0HPEiUUSLOUUb3bphp H82Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o21si3380554pgv.679.2018.02.10.18.05.09; Sat, 10 Feb 2018 18:05:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752100AbeBKCE3 (ORCPT + 99 others); Sat, 10 Feb 2018 21:04:29 -0500 Received: from mga12.intel.com ([192.55.52.136]:46437 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751149AbeBKCE2 (ORCPT ); Sat, 10 Feb 2018 21:04:28 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 10 Feb 2018 18:04:28 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,493,1511856000"; d="scan'208";a="203061041" Received: from gao-cwp.sh.intel.com ([10.239.13.104]) by fmsmga005.fm.intel.com with ESMTP; 10 Feb 2018 18:04:26 -0800 From: Chao Gao To: kvm@vger.kernel.org Cc: Chao Gao , linux-kernel@vger.kernel.org, x86@kernel.org, "H. Peter Anvin" , Ingo Molnar , Thomas Gleixner , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Paolo Bonzini , Liran Alon Subject: [PATCH v3] KVM: VMX: Don't halt vcpu when L1 is injecting events to L2 Date: Sun, 11 Feb 2018 10:06:30 +0800 Message-Id: <1518314790-31774-1-git-send-email-chao.gao@intel.com> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Although L2 is in halt state, it will be in the active state after VM entry if the VM entry is vectoring according to SDM 26.6.2 Activity State. Halting the vcpu here means the event won't be injected to L2 and this decision isn't reported to L1. Thus L0 drops an event that should be injected to L2. Cc: Liran Alon Signed-off-by: Chao Gao --- changes in v3: - s/VECTORING_INFO_VALID_MASK/INTR_INFO_VALID_MASK - Changes of subject, comments. Changes in v2: - Remove VID stuff. Only handle event injection in this patch. Signed-off-by: Chao Gao --- arch/x86/kvm/vmx.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index bb5b488..cf7c2fc 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -10985,7 +10985,12 @@ static int nested_vmx_run(struct kvm_vcpu *vcpu, bool launch) if (ret) return ret; - if (vmcs12->guest_activity_state == GUEST_ACTIVITY_HLT) + /* + * If we're entering a halted L2 vcpu and the L2 vcpu won't be woken + * by event injection, halt vcpu. + */ + if ((vmcs12->guest_activity_state == GUEST_ACTIVITY_HLT) && + !(vmcs12->vm_entry_intr_info_field & INTR_INFO_VALID_MASK)) return kvm_vcpu_halt(vcpu); vmx->nested.nested_run_pending = 1; -- 1.9.1