Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp4792293rwe; Tue, 30 Aug 2022 17:38:53 -0700 (PDT) X-Google-Smtp-Source: AA6agR689uuoxKsDbHRPok/46uSxJ8wjsq2I3o0eVLDu9GUCF2UbJW7nG1j/U9fdzmO5oLudBMxg X-Received: by 2002:a17:907:7290:b0:741:7eac:7eba with SMTP id dt16-20020a170907729000b007417eac7ebamr9029742ejc.375.1661906333037; Tue, 30 Aug 2022 17:38:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661906333; cv=none; d=google.com; s=arc-20160816; b=kGudZPtLQADBr+an6JiRjWlMWKdN6orpVui6hbIS9YSC1DHihxqjW5UHXD4744pL5d vMloiKZnyAfRoOFmjXj2K+qYjGWt0I8y4DxVNtQ4KXnQYlqc8ICJsgiGtqEpzBIgzoFF gBPZCbzgyVkU8ewi4763K2CxUOpUibcjpLqhYM6xd0Waw7OgFDwQ6vFcHBOfsOC3PRFL pq0b21LrwDfk+4fUmxh2ZnviywnqGAC2wG6+N7FBbIXVGyF4mFqvQnZoQhbpKGkIdTcf ZITtKptFgevg8C/5yT/IudfMmdaAU9C7lGnPusnK/awpxk1X6vEFLV/Q7GvKiNP+Chdx tZlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:reply-to:dkim-signature; bh=Loe3MlTGcMk80vSZPHjHmMjavqy1PId/3gp5j3Ud0uU=; b=Rg197Mbor+ypiqEm0XtZV688zSuoB0bN9l008fkq0KMzxFBdRrwdQpzH5IAf73XUlD 2/HEBLVlZzPbTHYr5V1elnviHxeEEjb+2vUkmntvQESmciAh1iKpPcUtWXuCEHZN2C/C FUz3iius5bUIDuqjxz0NXFa7fD/B8049kjeeARKOgnMtP+eeE2kKA1E1tbNdTjNaq4Sz nT9f7JCEn7JHt97VdL5+yJSOyOqpPxfVXt3hDa+lCPyV+rA4raTqYueJAQPexeNf5ko4 nc6XLGx5iCzH+GcF6Ov5L7dyz7USh2O+q5+6xo6SCK08UW+vjzV3sJXc/gt6twZPR7BR Qyvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=B+TprnwR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oz44-20020a1709077dac00b0073117e47fe5si3659635ejc.997.2022.08.30.17.38.27; Tue, 30 Aug 2022 17:38:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=B+TprnwR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230251AbiHaAhE (ORCPT + 99 others); Tue, 30 Aug 2022 20:37:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47906 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231829AbiHaAgN (ORCPT ); Tue, 30 Aug 2022 20:36:13 -0400 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D9E66A00D0 for ; Tue, 30 Aug 2022 17:35:22 -0700 (PDT) Received: by mail-pl1-x64a.google.com with SMTP id p8-20020a170902e74800b0017307429ca3so8946029plf.17 for ; Tue, 30 Aug 2022 17:35:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc; bh=Loe3MlTGcMk80vSZPHjHmMjavqy1PId/3gp5j3Ud0uU=; b=B+TprnwR0pgPPbE76syVYpuZqhC1waR/eOXBEcoJkGVOWULQh6Z3lQadB1ByrLmS8r OxnmBpGiT+g6/soGVFO18dm2EY7FONP7o6ts3u1yMAVXctVTCy/rXTNEWdihDYn5dTFM v9LU3DTRxwQlQQqr7tKQAtF4L5HHUpbrUJr+WOdFUU6ZQaXIX9YNBZIdVhRvwRNvPWoi N5DGrsUfQTJGitQYuDBOotavc1C1MqjBqiwFSt0j9tUhJn6IS5lrdhCnUFmv9hd/sltO s4DZBu45EZx7NN4jTnSrlhJwP/DXyzPx1SWrxbjA2TZ9Q1tDp0nl5c1ZeXWaYWZxzAC/ 1GDQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc; bh=Loe3MlTGcMk80vSZPHjHmMjavqy1PId/3gp5j3Ud0uU=; b=EqWQvVNkHq7R5sKucyfIpKHJeGDVhDMg1JaxWi1SyLrRsUXieAaP+WVWfEnCgK+cxv ouawgBfN3gcTCArUN7ZlWFkqMYJrG9CXUd+Cq/WssNXoSj4IF2gZ/3KHRYap8Wo+ABq7 0rIEnniOTE4hkqFJXpe2ajWDnuXYp9lJJtRdODfByF5l7Z4nu3DmzpqlnK7SHFfj7n3n ePt1bC1r0AG0Q/vri/Dz2RFo2pTkYIbEYclEw2ksglUADwlcaxx2RC9Y1W5gd4C4/qQN qtbGWo3mJO1ADO6kcjt46F1gbqPYkwBB8Ez9LE7wh2oYSf37obgTgsgk1IAjpq7n9pD8 K+6A== X-Gm-Message-State: ACgBeo3yHN8XiHhHY4HD6bIXGugebgXYDs5bfkvt8s2YronLyTxjRIzr Jv0GZnU5mqxjlEY/zIbhH19hKh6YUgU= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:90b:4c8d:b0:1f5:409b:b017 with SMTP id my13-20020a17090b4c8d00b001f5409bb017mr659921pjb.52.1661906110868; Tue, 30 Aug 2022 17:35:10 -0700 (PDT) Reply-To: Sean Christopherson Date: Wed, 31 Aug 2022 00:34:48 +0000 In-Reply-To: <20220831003506.4117148-1-seanjc@google.com> Mime-Version: 1.0 References: <20220831003506.4117148-1-seanjc@google.com> X-Mailer: git-send-email 2.37.2.672.g94769d06f0-goog Message-ID: <20220831003506.4117148-2-seanjc@google.com> Subject: [PATCH 01/19] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Suravee Suthikulpanit , Maxim Levitsky , Li RongQing Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Emulate ICR writes on AVIC IPI failures due to invalid targets using the same logic as failures due to invalid types. AVIC acceleration fails if _any_ of the targets are invalid, and crucially VM-Exits before sending IPIs to targets that _are_ valid. In logical mode, the destination is a bitmap, i.e. a single IPI can target multiple logical IDs. Doing nothing causes KVM to drop IPIs if at least one target is valid and at least one target is invalid. Fixes: 18f40c53e10f ("svm: Add VMEXIT handlers for AVIC") Cc: stable@vger.kernel.org Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/avic.c | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/arch/x86/kvm/svm/avic.c b/arch/x86/kvm/svm/avic.c index 6919dee69f18..b1ade555e8d0 100644 --- a/arch/x86/kvm/svm/avic.c +++ b/arch/x86/kvm/svm/avic.c @@ -496,14 +496,18 @@ int avic_incomplete_ipi_interception(struct kvm_vcpu *vcpu) trace_kvm_avic_incomplete_ipi(vcpu->vcpu_id, icrh, icrl, id, index); switch (id) { + case AVIC_IPI_FAILURE_INVALID_TARGET: case AVIC_IPI_FAILURE_INVALID_INT_TYPE: /* * Emulate IPIs that are not handled by AVIC hardware, which - * only virtualizes Fixed, Edge-Triggered INTRs. The exit is - * a trap, e.g. ICR holds the correct value and RIP has been - * advanced, KVM is responsible only for emulating the IPI. - * Sadly, hardware may sometimes leave the BUSY flag set, in - * which case KVM needs to emulate the ICR write as well in + * only virtualizes Fixed, Edge-Triggered INTRs, and falls over + * if _any_ targets are invalid, e.g. if the logical mode mask + * is a superset of running vCPUs. + * + * The exit is a trap, e.g. ICR holds the correct value and RIP + * has been advanced, KVM is responsible only for emulating the + * IPI. Sadly, hardware may sometimes leave the BUSY flag set, + * in which case KVM needs to emulate the ICR write as well in * order to clear the BUSY flag. */ if (icrl & APIC_ICR_BUSY) @@ -519,8 +523,6 @@ int avic_incomplete_ipi_interception(struct kvm_vcpu *vcpu) */ avic_kick_target_vcpus(vcpu->kvm, apic, icrl, icrh, index); break; - case AVIC_IPI_FAILURE_INVALID_TARGET: - break; case AVIC_IPI_FAILURE_INVALID_BACKING_PAGE: WARN_ONCE(1, "Invalid backing page\n"); break; -- 2.37.2.672.g94769d06f0-goog