Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1357119ybz; Wed, 22 Apr 2020 19:28:03 -0700 (PDT) X-Google-Smtp-Source: APiQypKdrtY2TuUKtXEUsxOfEIAyPaaB3fTkJf6JBW3vuR3eJ4yXz1Z2ay4QLJRg46o/z93grFvg X-Received: by 2002:aa7:cd06:: with SMTP id b6mr1053426edw.67.1587608883272; Wed, 22 Apr 2020 19:28:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587608883; cv=none; d=google.com; s=arc-20160816; b=MbSKRyThTdEXHUj4MAl/ZJvG1ifQlW/BtfMTOydUIhrWeeHFxUPepWmgykTViMe4A5 bw4vJlKi8DAFHtuYZ1mNg4980Fd+SsUk0j+6z4K/c9jFV2EjRK8lrZ1Kxt5KLh7NQmxY Wue0BVVmQxVphZlk65NUQHYlnvbFEBGD+g6iI13sCTkZz/I1D3LsHjFJT8qS6XHB+QGW 9kBOynlZKVJaca1Vbhj5YrmwUQ3GDPLYymkKFmxDf5piU0g4jBShE6Auq9sH6XK+MGnW to/A4BDWlQSeWya0K8Qvd8/V7+I7P3anx83SmoFf3LZRXoA5VUl6ZyvkGpHpdo5sLkQ4 r3Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=9FMwzn/khoV2Qh6W1/a6NJ74m7ca/8vNbunnKQF2YcE=; b=yQh4LlAGcaYwV1qBScXj97DPkU7sQgZwEqWlXNUAS6P/z5+pNQ5wUoYXSpXaCBVnUF MgMuegDOFY4N9r1ZGsw03Zm9LAc6KGdM4AfGl6k41+IOZ0WhMl9cYIqyMtfgUqO8qMsO nmmra7NooHbgS0jhzG7RHtT74rX7N0S5g6louoILJd1Bqq+m/goux0sj7cy67Im0KR0/ xKqPaRzBFmF42aFhGiXAQPQuJ+Gt8/HHlT0N68oMY7YRBB2tcnLSYEZncE1HTOs6oXaH IsifSQrCz4+LgH21PJlPeOWQpR8pNVWdIK0AlBrp936XlsLuTOrMaRxZo3Kzm1r3rIXq ysmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s9si579247ejz.335.2020.04.22.19.27.41; Wed, 22 Apr 2020 19:28:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726689AbgDWC0U (ORCPT + 99 others); Wed, 22 Apr 2020 22:26:20 -0400 Received: from mga06.intel.com ([134.134.136.31]:33067 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726583AbgDWCZ7 (ORCPT ); Wed, 22 Apr 2020 22:25:59 -0400 IronPort-SDR: +nBxMxcXqWWx39b15NuvTH0UJG7KCKtBAyuyRdi2WfqI7bzD6at7Mbl9YSoHab3ifDPBt7AI9M BccvzRKMF+EA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Apr 2020 19:25:55 -0700 IronPort-SDR: GP1MlK79NuNQBiJH1vB+o7Gny4E38M0BKWoSiowH0vr7O/PvyqUKi5hWRgXOJyAzoeKnFstH+T 4TEzb4JKsuzg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,305,1583222400"; d="scan'208";a="259273958" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.202]) by orsmga006.jf.intel.com with ESMTP; 22 Apr 2020 19:25:54 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Oliver Upton , Peter Shier Subject: [PATCH 09/13] KVM: nVMX: Prioritize SMI over nested IRQ/NMI Date: Wed, 22 Apr 2020 19:25:46 -0700 Message-Id: <20200423022550.15113-10-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200423022550.15113-1-sean.j.christopherson@intel.com> References: <20200423022550.15113-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Check for an unblocked SMI in vmx_check_nested_events() so that pending SMIs are correctly prioritized over IRQs and NMIs when the latter events will trigger VM-Exit. This also fixes an issue where an SMI that was marked pending while processing a nested VM-Enter wouldn't trigger an immediate exit, i.e. would be incorrectly delayed until L2 happened to take a VM-Exit. Fixes: 64d6067057d96 ("KVM: x86: stubs for SMM support") Signed-off-by: Sean Christopherson --- arch/x86/kvm/vmx/nested.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index 1fdaca5fd93d..8c16b190816b 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -3750,6 +3750,12 @@ static int vmx_check_nested_events(struct kvm_vcpu *vcpu) return 0; } + if (vcpu->arch.smi_pending && !is_smm(vcpu)) { + if (block_nested_events) + return -EBUSY; + goto no_vmexit; + } + if (vcpu->arch.nmi_pending && !vmx_nmi_blocked(vcpu)) { if (block_nested_events) return -EBUSY; -- 2.26.0