Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp891178ybg; Wed, 10 Jun 2020 17:02:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwSEq/UK4MavKvRL0ul5MhqkD20IURcugEjhLb8z6lew0B5T+xOTi4mdQF5/tNILhby5/r X-Received: by 2002:a17:906:b817:: with SMTP id dv23mr5691100ejb.185.1591833761837; Wed, 10 Jun 2020 17:02:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591833761; cv=none; d=google.com; s=arc-20160816; b=nZ3i0FZzN5lQPrUydyNyd74GPzeoz05tskQySKQmVJSr69kWExgpfIZKkMus1OKy1v v5cUXr6cMA/4CEs/H3BUc4YGQ45pUy1hQulc1NZIH2jPubnhuWrCJWBZSwXg1P3LR5nn 5Q0NA/t5KfwsYheguhGA8OMxBcdvZFipAXYFB7yMkmmXwT3+pYOnpzel2+jjY7V5jqs3 xW31hcdVDjX5oKE45s9X4CGAPBODnYAuxPhwxmIgaf+RVaFPzgjX3R2LfS8605Fmdm86 iph35fMACYQ4TnlfT8J3J2Ona2Am17XGeubsbjBa6wIkbu6jsAuD9tqrbSbw3Qv36mc5 cgDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=nxxJ4/1M1f115cqndrKz1lCc/XWJ1JC4i/dEEzx9jJs=; b=uTLrzhV3YcqEvNQ7QhJRfUsi7AdQ49nNly+ySpeUGBvUSjvFnjY1D5ZgJs/PWeXJ6V Q50aQzzUVzpJMcdRYioQXlzFLm2KaFM1bcYhtb1QL6OBS9i+8y6jJ3k3YmBxLlNN5sAu Uy+RP5EgourNoQj9G3dceqaQLb3umtqdMq14sl93gHEItEMWUuS12ZacJ0EJWQM8p6tH wDhnWPzbpDfHKsEtGeDyRVP8t7V9WwKUxqq57udyHsK4UBpRVgpg9d3EmRHHoTWTKWG9 xb3Ukf3KEoGnBfEHB8psQT0BkN3LplJHCKsGxRHkIzxgU5cPp+cF+Q3Edt05Igljo8zP N1mQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dp6si987767ejc.472.2020.06.10.17.02.18; Wed, 10 Jun 2020 17:02:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726942AbgFKAAe (ORCPT + 99 others); Wed, 10 Jun 2020 20:00:34 -0400 Received: from mga17.intel.com ([192.55.52.151]:14660 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726768AbgFKAAd (ORCPT ); Wed, 10 Jun 2020 20:00:33 -0400 IronPort-SDR: SE10CC9A2LBsv546AGLOiHuc7GowI8HTvDN60gL5uQ52fVdI1or8DrfCURFOdK/z//bsSm4352 Rc5dF1hdLjTA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jun 2020 17:00:33 -0700 IronPort-SDR: NfMrcfm4ZnQtCNeqiWz2f8LzNdPP5sEYFf+z0qJHcPzA1Lu9xULjvDHTDroLNGpGfphpgx34Y0 lqAh+XDgkz0g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,497,1583222400"; d="scan'208";a="380228276" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.152]) by fmsmga001.fm.intel.com with ESMTP; 10 Jun 2020 17:00:32 -0700 Date: Wed, 10 Jun 2020 17:00:32 -0700 From: Sean Christopherson To: Andy Lutomirski Cc: "David P. Reed" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , Allison Randal , Enrico Weigelt , Greg Kroah-Hartman , Kate Stewart , "Peter Zijlstra (Intel)" , Randy Dunlap , Martin Molnar , Andy Lutomirski , Alexandre Chartre , Jann Horn , Dave Hansen , linux-kernel@vger.kernel.org Subject: Re: [PATCH] Fix undefined operation VMXOFF during reboot and crash Message-ID: <20200611000032.GI18790@linux.intel.com> References: <20200610181254.2142-1-dpreed@deepplum.com> <3F5CEF02-0561-4E28-851B-8E993F76DC9B@amacapital.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <3F5CEF02-0561-4E28-851B-8E993F76DC9B@amacapital.net> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 10, 2020 at 02:59:19PM -0700, Andy Lutomirski wrote: > > > > On Jun 10, 2020, at 11:21 AM, David P. Reed wrote: > > > > If a panic/reboot occurs when CR4 has VMX enabled, a VMXOFF is > > done on all CPUS, to allow the INIT IPI to function, since > > INIT is suppressed when CPUs are in VMX root operation. > > However, VMXOFF causes an undefined operation fault if the CPU is not > > in VMX operation, that is, VMXON has not been executed, or VMXOFF > > has been executed, but VMX is enabled. > > I’m surprised. Wouldn’t this mean that emergency reboots always fail it a VM > is running? I would think someone would have noticed before. The call to cpu_vmxoff() is conditioned on CR4.VMXE==1, which KVM toggles in tandem with VMXON and VMXOFF. Out of tree hypervisors presumably do the same. That's obviously not atomic though, e.g. VMXOFF will #UD if the vmxoff_nmi() NMI arrives between CR4.VMXE=1 and VMXON, or between VMXOFF and CR4.VMXE=0.