Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp3760306pxt; Tue, 10 Aug 2021 10:40:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwMeg8tTVKYXhX/SGzkxJFd4su+zYmDddCMt1QUdCP78LcT34dFUxeYTNdFCrj+00tFdC0o X-Received: by 2002:a05:6638:33a2:: with SMTP id h34mr12113894jav.43.1628617250469; Tue, 10 Aug 2021 10:40:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628617250; cv=none; d=google.com; s=arc-20160816; b=Rz/4HvPZkeEGUpV73DycEA7936/vTDSHP2aY35pADFBe2M5hCNzCA4DffBU63yp1LW zt3JFySmJdup2ZdsBk2D3Asv4/de88lMMNQqRukuVCwSbbNpVD4D9TRfR/jMWIL4AiMY E+UqBqRJ+9omFnI8KnpHX7Ps+lnN7UTa/VLhhhpZrl8u9hJZazdO9mLmk4EAKq/WWRcW TvexIRe/sPjQv9zkjpr8xWVo2Mi+x1P3crzUfNeiOb0pCTJmcgKCasWR/tocKKdpfECm RgN2srO1IoCeLgE1Kjagxtom7LHVr0AXtL7mE+Ai7RGZ16xr4GCOumUUcpooXf/NfMgP Mntw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EVJvAY6XOZK0w4ovT9MUysBhcUCxpa5Og5n639RYuN0=; b=eWgQmSm1+I1lplwthRkM+Bf6uAJx0QGMu0koQFuQC0+g8wDNbxNmHMkSoHhpPub18Q VKcYrovJnGzpRCcEJzw9odwA5fOp5tewrZPvYDIvSBh7cgBDmS2lPPnDCK7KUF4xKKh2 x8WJThnd8e7egaEaddnpRgMi7xp6X1f6DfeABAUgKavd2mH2B7qvPw9OrD116od9aGKC 6syq6yTpU8eMy2ooZvYI41F0y+wbxX9FyiFYyWJnuwzxiIlcI06WXEhRXKVETPnezc0S Y2x+dkXD4+ZnB7wISnz8l9ZAHlLxe7HSjI7qq3acQacxEkczgARRdBNL5YHV+Kbr7ziw K3GQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nSJ4nhPe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y14si3236056ilb.66.2021.08.10.10.40.36; Tue, 10 Aug 2021 10:40:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nSJ4nhPe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234153AbhHJRjw (ORCPT + 99 others); Tue, 10 Aug 2021 13:39:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:41122 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234559AbhHJRhe (ORCPT ); Tue, 10 Aug 2021 13:37:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E751B60EB9; Tue, 10 Aug 2021 17:36:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1628616964; bh=TYT5NeFwsBQ94lj/QQDt11nY09z/HFuhKLvdT1TQT+g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nSJ4nhPemrxz0jbQNXUvhRWndALgiYXPzmBeFSKQfhGZRGp/SREMS6WbHsabOY/bF BTENGvvbdA0plCoPSVLRai8NlXp2zXapeHBzLTNVIlkAq2AKzs98+rmzBGkDU8/fBF +UhpvQB9GzNdlpl0Jy58lmL9sPY+xM9UzBI3jX4I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stas Sergeev , Sean Christopherson , Paolo Bonzini Subject: [PATCH 5.4 70/85] KVM: x86: accept userspace interrupt only if no event is injected Date: Tue, 10 Aug 2021 19:30:43 +0200 Message-Id: <20210810172950.606721789@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210810172948.192298392@linuxfoundation.org> References: <20210810172948.192298392@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paolo Bonzini commit fa7a549d321a4189677b0cea86e58d9db7977f7b upstream. Once an exception has been injected, any side effects related to the exception (such as setting CR2 or DR6) have been taked place. Therefore, once KVM sets the VM-entry interruption information field or the AMD EVENTINJ field, the next VM-entry must deliver that exception. Pending interrupts are processed after injected exceptions, so in theory it would not be a problem to use KVM_INTERRUPT when an injected exception is present. However, DOSEMU is using run->ready_for_interrupt_injection to detect interrupt windows and then using KVM_SET_SREGS/KVM_SET_REGS to inject the interrupt manually. For this to work, the interrupt window must be delayed after the completion of the previous event injection. Cc: stable@vger.kernel.org Reported-by: Stas Sergeev Tested-by: Stas Sergeev Fixes: 71cc849b7093 ("KVM: x86: Fix split-irqchip vs interrupt injection window request") Reviewed-by: Sean Christopherson Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/x86.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -3638,8 +3638,17 @@ static int kvm_cpu_accept_dm_intr(struct static int kvm_vcpu_ready_for_interrupt_injection(struct kvm_vcpu *vcpu) { - return kvm_arch_interrupt_allowed(vcpu) && - kvm_cpu_accept_dm_intr(vcpu); + /* + * Do not cause an interrupt window exit if an exception + * is pending or an event needs reinjection; userspace + * might want to inject the interrupt manually using KVM_SET_REGS + * or KVM_SET_SREGS. For that to work, we must be at an + * instruction boundary and with no events half-injected. + */ + return (kvm_arch_interrupt_allowed(vcpu) && + kvm_cpu_accept_dm_intr(vcpu) && + !kvm_event_needs_reinjection(vcpu) && + !vcpu->arch.exception.pending); } static int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu,