Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2181040iof; Tue, 7 Jun 2022 22:23:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzR9zU5kjQGz0Z2dKCUdzuq03bwc6E1yhC766ZmFcEMDNmoSn1rGXhl2L9NoiqI7UVlFpFy X-Received: by 2002:a17:903:2348:b0:163:fc70:a4cd with SMTP id c8-20020a170903234800b00163fc70a4cdmr32563137plh.89.1654665807539; Tue, 07 Jun 2022 22:23:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654665807; cv=none; d=google.com; s=arc-20160816; b=iAPDBGztySl5DG6gxcEmq8yeuDfAc3uvEssuLTfQQcKjPb6IL4hFPyxJXyKd4ASb0S LQfGLqKhqlV7toHbkNCudh6hHjCdEWImCjW32jAXKf1f65WVT2RQZ6YGGGU6CTfG7MMQ 08jhPGeNVt+bmuLfrnwzdXCIr9xiGYylSe8qVeW9bHbKyWQhSPt7qLlK3GVmQGvf9Nfb HMlxJDpRFnWd6SX/YUzluUZcoBrm4jwebZQ2Cs4PA0DTt49NZ85qZCLE7O/+KNrE43Py L1ckYHeLjGD//WrLUr66G1CcBkv7SHX0Hp1QTWoavMFjAl9vMVZ3iBwMKsgrprQWfIr5 ZXeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=9btwV5h8ptlMevpkwB1eHlF3KzuEFXT7bT70FrlkmYo=; b=tMK2h5BbKa5fVMKd4y8tytI1d5hvYw7Pqk+50l12A0t+S9v50na+HPW8AgdOvDoqcf YM+kNxOUl7KaNPFexDR40BdhaImK0jp/kFNeqtvS7fEZbpufRRUNnasf/gflQ3ejTTfV r48Gx+4zJoJsYCDJauwokDwJItm9vprL2duDDU18fVyTwRK+fGHS6drU6rQQVyytS6fm kEj9ueIuoMITNuWsgEa9Vi0DD8vZBG11sJGwbJWyHVTco4g4bFacb3vstpdgKpg9r9HH LgtGTd5OElfPwSw81mlkPU0OMUIFa17gZZvSWrwLbE1Z23dNWt5zyZRJM+nIt7m6dZst vJVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aF5f2xVr; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id u10-20020a056a00158a00b0051826918034si20635001pfk.1.2022.06.07.22.23.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 22:23:27 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aF5f2xVr; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 4F06C31335D; Tue, 7 Jun 2022 21:50:26 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244501AbiFGNMS (ORCPT + 99 others); Tue, 7 Jun 2022 09:12:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37278 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243662AbiFGNMP (ORCPT ); Tue, 7 Jun 2022 09:12:15 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 47E67267D for ; Tue, 7 Jun 2022 06:12:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1654607533; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9btwV5h8ptlMevpkwB1eHlF3KzuEFXT7bT70FrlkmYo=; b=aF5f2xVrkAC46+7d+wi6wLLa/bRrZ927vXem16N51JolEgSBDt0iZHzfBfPPDGY69u5qL3 4RVH9HYxgDSYwSaT15F984ZgAbLgJmxZml4d15AaKvnu1guXOVb8NiHbLeRFsjr9w9Itzx ic6NZJcS4eFKex2OyXx6sKIpMwTdaC0= Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-41-3RPt_WnmMU6m9ngYGu78yA-1; Tue, 07 Jun 2022 09:12:12 -0400 X-MC-Unique: 3RPt_WnmMU6m9ngYGu78yA-1 Received: by mail-qv1-f69.google.com with SMTP id jo22-20020a056214501600b004646309a886so10881736qvb.2 for ; Tue, 07 Jun 2022 06:12:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=9btwV5h8ptlMevpkwB1eHlF3KzuEFXT7bT70FrlkmYo=; b=J1/rbawKS5eRDAXURWMF6Whwe7dpv/UuVwdcPPIhSlGZi73J/AavhR3NOZRfD+aYmA xD90+1Cg3AdkL35pjlOQdW5dDYqDUsi2eNEhaXEnrDVZMbhJ+fv4L1cianngKJ16VA/a 66VGLSqOAGKUlxkm1GkHrL12QtmjS1V3QNt/H+7uzLNjP7cndJhF5yYo1wu/p8OhtRI1 4WAprT2t9KrVdDsLLXj5I3vnkGUr5P9xzQyImECpvm6LU80eYPjpyZCGggDMiTRsWnx5 wnClb81S0ntcnaDmCWU+y3dpJ1S7P10NuR6CYR97uEjnKVzVmSxn0nfuoWEw15KULQXs Hcbg== X-Gm-Message-State: AOAM533ss9nhmLWq/d0ac2V8A5xS70mKFLJF9q67pRqJI90mRb+QBqlg qxqk0sf46QoLrM/lzNzSf6Oe6d7Dk8nGYdX5N1Gx2F6JF0tODLel8VawU2qqgfXFdG1RExg/2tg JerfyRM5s5oIKURuXaKeCU7MT X-Received: by 2002:ac8:5b56:0:b0:2f3:eb25:910e with SMTP id n22-20020ac85b56000000b002f3eb25910emr21765652qtw.616.1654607531787; Tue, 07 Jun 2022 06:12:11 -0700 (PDT) X-Received: by 2002:ac8:5b56:0:b0:2f3:eb25:910e with SMTP id n22-20020ac85b56000000b002f3eb25910emr21765618qtw.616.1654607531527; Tue, 07 Jun 2022 06:12:11 -0700 (PDT) Received: from [10.35.4.238] (bzq-82-81-161-50.red.bezeqint.net. [82.81.161.50]) by smtp.gmail.com with ESMTPSA id z22-20020ac87116000000b00304f7449e17sm1439142qto.93.2022.06.07.06.12.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 06:12:10 -0700 (PDT) Message-ID: <45e9ccafcdb48c7521b697b41e849dab98a7a76c.camel@redhat.com> Subject: Re: [PATCH 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI From: Maxim Levitsky To: Santosh Shukla , Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Jim Mattson , Joerg Roedel , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 07 Jun 2022 16:12:07 +0300 In-Reply-To: References: <20220602142620.3196-1-santosh.shukla@amd.com> <20220602142620.3196-5-santosh.shukla@amd.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.40.4 (3.40.4-2.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2022-06-07 at 16:10 +0300, Maxim Levitsky wrote: > On Thu, 2022-06-02 at 19:56 +0530, Santosh Shukla wrote: > > In the VNMI case, Report NMI is not allowed when the processor set the > > V_NMI_MASK to 1 which means the Guest is busy handling VNMI. > > > > Signed-off-by: Santosh Shukla > > --- > >  arch/x86/kvm/svm/svm.c | 6 ++++++ > >  1 file changed, 6 insertions(+) > > > > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > > index d67a54517d95..a405e414cae4 100644 > > --- a/arch/x86/kvm/svm/svm.c > > +++ b/arch/x86/kvm/svm/svm.c > > @@ -3483,6 +3483,9 @@ bool svm_nmi_blocked(struct kvm_vcpu *vcpu) > >         struct vmcb *vmcb = svm->vmcb; > >         bool ret; > >   > > +       if (is_vnmi_enabled(vmcb) && is_vnmi_mask_set(vmcb)) > > +               return true; > > How does this interact with GIF? if the guest does clgi, will the > CPU update the V_NMI_MASK on its own If vGIF is enabled? > > What happens if vGIF is disabled and vNMI is enabled? KVM then intercepts > the stgi/clgi, and it should then update the V_NMI_MASK? > > > > > > + > >         if (!gif_set(svm)) > >                 return true; > >   > > @@ -3618,6 +3621,9 @@ static void svm_enable_nmi_window(struct kvm_vcpu *vcpu) > >  { > >         struct vcpu_svm *svm = to_svm(vcpu); > >   > > +       if (is_vnmi_enabled(svm->vmcb) && is_vnmi_mask_set(svm->vmcb)) > > +               return; > > This might have hidden assumption that we will only enable NMI window when vNMI is masked. Also what if vNMI is already pending? Best regards, Maxim Levitsky > > > > > + > >         if ((vcpu->arch.hflags & (HF_NMI_MASK | HF_IRET_MASK)) == HF_NMI_MASK) > >                 return; /* IRET will cause a vm exit */ > >   > > > Best regards, >         Maxim Levitsky