Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp687345iob; Wed, 4 May 2022 06:07:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVnuq4aoN2LiMnVOU7EDnLO9UoEQUkzlq1f/R6fyahXNMrKsil6XIEyYXXYQRHE/i2BRKi X-Received: by 2002:a17:906:8a79:b0:6f3:c84b:42f2 with SMTP id hy25-20020a1709068a7900b006f3c84b42f2mr19399228ejc.499.1651669632080; Wed, 04 May 2022 06:07:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651669632; cv=none; d=google.com; s=arc-20160816; b=wud3e08kM4Rk+6snN54d/HNfuoYgwEqCDO2pM8/BjYbzcA7MJVmMuyyiso2E0Vyvpb AsAtCiwvMgSZ4nUQh8/IaVwFmL+l+esgSjXn50MHZDcdhcev5KmH6IYYSIoCtVtqgj7g uEhvtloMSxvNIdyOGdliJQw/yTztPTZJmpcV58tSehyE6e79KVfvNkbH8oJJGZltfShE zfFSSYNlwYScoZ9BXVL69RgcQQelAuNUSFACsIfxsksc8RzYqnRtc3ESy2zoSCuIY6mo cwQ31NtXcxyhJcW/vguk7N2cgmJd1+4t7Kdq6CR6oeSPwkt/ip4SQtoA+43W/uVlhafp 6d9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=p42ujX9orUiN3OgFIB7H1+2tqHSQ2wyI3UPSSooZMyQ=; b=ffFDwJRto1q/Eqceln+Lh4k/dun9NmZO8VUiGKJ+KNz0fAuLAGQb7uS7Rq1e4dINj7 BsHh2fPhoKmiP7UcW+qRSI8Fw7eSNX1y+mJsf6iDmKw+43fieVkBpZIoHWQV28xTxdjY EiUT0bzER+czgqv9aXlDBXmLvm0+PEST9YWYYSR8HrKzJ2AvWrzEpVF2Zm0hwxCwNbmX i1otrbdNJ/L3EjCYnCADpE/iiCCDRVAdDlfjHCvrMkK9iiFgG4aTm+I4UNuC3VsxfHbh Zs8C2cmuYB9MMmKMgql6A5MiSEJol7RZa0KepYG0USiCtUlstiDgCBcvwjoO6mfS14OP K00w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="VtQMbm/w"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lo23-20020a170906fa1700b006f38d674824si14056220ejb.2.2022.05.04.06.06.43; Wed, 04 May 2022 06:07:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="VtQMbm/w"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349861AbiEDMom (ORCPT + 99 others); Wed, 4 May 2022 08:44:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59466 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349870AbiEDMoa (ORCPT ); Wed, 4 May 2022 08:44:30 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A8BDC34B8B for ; Wed, 4 May 2022 05:40:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1651668053; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=p42ujX9orUiN3OgFIB7H1+2tqHSQ2wyI3UPSSooZMyQ=; b=VtQMbm/wasnhsJuBP4vfgpMEBGeihp0rv/Vm/71GMMCsjiqEBrpNG0+flP5JegT0NeAzg6 7t00W4eFz6c2tRYzzyekx4VVT9a+oDQMoAV+hy0Om7nEeX/rWOhSafUfCvUTNdHaCRlYR7 IO+zRf/9o1f3y7j5epo1PJIe1PtZvKg= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-528-CcVyKRYINI-YO_JLDinMVQ-1; Wed, 04 May 2022 08:40:50 -0400 X-MC-Unique: CcVyKRYINI-YO_JLDinMVQ-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 241FA29AB40B; Wed, 4 May 2022 12:40:50 +0000 (UTC) Received: from starship (unknown [10.40.192.26]) by smtp.corp.redhat.com (Postfix) with ESMTP id ECAD4155F649; Wed, 4 May 2022 12:40:47 +0000 (UTC) Message-ID: <03ff8d87c7aa513cf4b394b7ef5a769c17f865fa.camel@redhat.com> Subject: Re: [PATCH v3 00/12] KVM: SVM: Fix soft int/ex re-injection From: Maxim Levitsky To: Sean Christopherson , "Maciej S. Szmigiero" Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Date: Wed, 04 May 2022 15:40:46 +0300 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.7 X-Spam-Status: No, score=-3.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2022-05-03 at 18:48 +0000, Sean Christopherson wrote: > On Mon, May 02, 2022, Maciej S. Szmigiero wrote: > > From: "Maciej S. Szmigiero" > > > > This series is an updated version of Sean's SVM soft interrupt/exception > > re-injection fixes patch set, which in turn extended and generalized my > > nSVM L1 -> L2 event injection fixes series. > > > > Detailed list of changes in this version: > > * "Downgraded" the commit affecting !nrips CPUs to just drop nested SVM > > support for such parts instead of SVM support in general, > > > > * Removed the BUG_ON() from svm_inject_irq() completely, instead of > > replacing it with WARN() - Maxim has pointed out it can still be triggered > > by userspace via KVM_SET_VCPU_EVENTS, > > > > * Updated the new KVM self-test to switch to an alternate IDT before attempting > > a second L1 -> L2 injection to cause intervening NPF again, > > > > * Added a fix for L1/L2 NMI state confusion during L1 -> L2 NMI re-injection, > > > > * Updated the new KVM self-test to also check for the NMI injection > > scenario being fixed (that was found causing issues with a real guest), > > > > * Changed "kvm_inj_virq" trace event "reinjected" field type to bool, > > > > * Integrated the fix from patch 5 for nested_vmcb02_prepare_control() call > > argument in svm_set_nested_state() to patch 1, > > > > * Collected Maxim's "Reviewed-by:" for tracepoint patches. > > > > Previous versions: > > Sean's v2: > > https://lore.kernel.org/kvm/20220423021411.784383-1-seanjc@google.com > > > > Sean's v1: > > https://lore.kernel.org/kvm/20220402010903.727604-1-seanjc@google.com > > > > My original series: > > https://lore.kernel.org/kvm/cover.1646944472.git.maciej.szmigiero@oracle.com > > > > Maciej S. Szmigiero (4): > > KVM: nSVM: Sync next_rip field from vmcb12 to vmcb02 > > KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 > > LOL, this should win some kind of award for most ridiculous multi-author patch :-) > > Series looks good, thanks! > Well I think I, Paolo, and you hold the record for this, when we fixed the AVIC inhibition races, remember? Patch series also looks overall good to me, but I haven't checked everything to be honest. Best regards, Maxim Levitsky