Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp155180ybh; Tue, 14 Jul 2020 21:20:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIiMuJ/9l2MvtFJz8/1EMDKTGC26yPDOmhpyn2KpoW4gE9Y+Znrj80bqLeNb/Sf6CS4TIA X-Received: by 2002:a17:906:c259:: with SMTP id bl25mr7460341ejb.303.1594786846485; Tue, 14 Jul 2020 21:20:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594786846; cv=none; d=google.com; s=arc-20160816; b=yg1TlowY3+q43tNbnIvnC60M5mxPjOo8ZMRqlvTW/dPpG2svvVPRC8XsKxE7HHlJOO TAaVEmIeCfLPpgh/8jyZgCWZ7eqN/bdWJx3dXgz+G20yw4d95tm6wWOHavG6Cw0lmE7+ UOMtt8KHMTK7s4fbELMET68LN2QyZY2AovgAnrNVBAiZ1OzoLX6/YbxfWpqE/Iza7z3q VYJ67HZ55y6UhjRMeh68ckh3kTeYopjb1qsrqzhXZroUVVUMRjKJak6fPSAW0ByhWg9p TNtefD0EkwIMKUtvyuxJq4cjKMLAYEvoU5d7LJnr1D+qVaGSo+LEEFBNnrAVrc6YcPUW JgZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=xQ7sQZoTgdd3jwEc9HyJGEbyQUhYgzZtxP5ZtYFq4tw=; b=H31mcBiFnoD5lY9UfSA1v4XZwpfJzcz2IR2oGpfKgzI6unsXYAHTUNq0OXG+YeuYxq 2MrtYu0x7BBrOloFzB1MvSojVdOaO9mnE1eINU6oZpyDw+E/Qvy+SwOQIZGxLjF8TD+p L+6+i04dWlqwTacQk7SiCbgfgHLpZffosnJJdKqw8fI2HpICkrxu++spwGXt0PXaSJ6O McxzXzQzcSlYeyMOPqPUXF5S+QSJTKoAyTcrHYmVicFcOlz1HxjNseeMMoOasvUA4SPG W4MX8BM8cS9DY7YWkKAQgVm+8vjtInGqnsT3VGPqKNi3ZZ0tO1s/x5w4sDPKaUpwOCLM 0mXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f9si525413edy.84.2020.07.14.21.20.23; Tue, 14 Jul 2020 21:20:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725881AbgGOEGC (ORCPT + 99 others); Wed, 15 Jul 2020 00:06:02 -0400 Received: from mga17.intel.com ([192.55.52.151]:16670 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725770AbgGOEGB (ORCPT ); Wed, 15 Jul 2020 00:06:01 -0400 IronPort-SDR: keFLI2pZFftDHBMkkaHIc3kzVRpmz8P2NqsA0yi9/+K9R5lvaJ1qIrsZWX4vD6Zdt4CmF/oj4Y XNLcJuyamPkQ== X-IronPort-AV: E=McAfee;i="6000,8403,9682"; a="129167478" X-IronPort-AV: E=Sophos;i="5.75,353,1589266800"; d="scan'208";a="129167478" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Jul 2020 21:06:01 -0700 IronPort-SDR: oLkwvnypvmrjiOV2yo8kXfycM+VsPm00teLTHWLLxxVaKBlwcl9+ijgnqqc48T1EM0ZxqhjFZ6 k/LDhNNQntRw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,353,1589266800"; d="scan'208";a="485587000" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.152]) by fmsmga006.fm.intel.com with ESMTP; 14 Jul 2020 21:06:00 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Dan Cross , Peter Shier Subject: [PATCH 0/7] KVM: nVMX: Bug fixes and cleanup Date: Tue, 14 Jul 2020 21:05:50 -0700 Message-Id: <20200715040557.5889-1-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.26.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix for a brutal segment caching bug that manifested as random nested VM-Enter failures when running with unrestricted guest disabled. A few more bug fixes and cleanups for stuff found by inspection when hunting down the caching issue. Sean Christopherson (7): KVM: nVMX: Reset the segment cache when stuffing guest segs KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails KVM: nVMX: Explicitly check for valid guest state for !unrestricted guest KVM: nVMX: Move free_nested() below vmx_switch_vmcs() KVM: nVMX: Ensure vmcs01 is the loaded VMCS when freeing nested state KVM: nVMX: Drop redundant VMCS switch and free_nested() call KVM: nVMX: WARN on attempt to switch the currently loaded VMCS arch/x86/kvm/vmx/nested.c | 103 ++++++++++++++++++++------------------ arch/x86/kvm/vmx/vmx.c | 8 +-- arch/x86/kvm/vmx/vmx.h | 10 ++++ 3 files changed, 66 insertions(+), 55 deletions(-) -- 2.26.0