Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5630060rdb; Wed, 13 Dec 2023 14:44:43 -0800 (PST) X-Google-Smtp-Source: AGHT+IElA1y2cxGKnU/dBXAOCyTH0UIbyuHBrGfz5+NLqDtMWpX8nIClLNz4xmb6W54zxoZ/Yz2Q X-Received: by 2002:a17:90b:108d:b0:28b:792:f6e5 with SMTP id gj13-20020a17090b108d00b0028b0792f6e5mr156964pjb.0.1702507483041; Wed, 13 Dec 2023 14:44:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702507483; cv=none; d=google.com; s=arc-20160816; b=kWc2aRfHTUltWwmDqlgxiX8ycQgfGSboDmWZvH7JQWwYip18SqXsJnufNIydw9dBb0 SzIdP9FcceGGBaOKfoMl3NeK2sd0AyYeA2y7j+okRdUaUXhjDRd3f2Imx7+LjaeBZzLy dbgiALE90ICkSX0iDedJYoytUMRZZmL8G/EAhogmv55jrYBm/8hj5s8WDQv7mROEap+Z xmeTEZTHAOCbJHckw5jYQ8suORY+sWgaSEyUHS3WACuJSmQi/2U1Dolk2UVbS/9AYbLG UwlqqIyrEHWoJYsITFH+vD4L0fZRu/ZO686efDsSuPTXZNdS5VTWurNckvzl5PlB5GaC 6bcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=wJ/noKt4RR9yP36R44EoDN70UzFeuyznjnW/8U/CnAQ=; fh=7y7GXafDbxPzrN+gONF4PLFsJ7YeR14+QFH5b526lrA=; b=OXb9z5dEcXdv6Vj4VTVrHuhU0ESUMDq4Y2zDKBbs2n1kgFitQjc1NdzjQhYGu7kueU QwSfHg7tz8rfjHt51jzInIP+ACyuPdbvYJV1d0rofiumZQmQTssUYPKVSutISqchuPIu NtNUmK0GfWY9/wtmsd8Wjf01nVAiwR1IYrp00sjBXOIjZhcaiRB6R6NmpZwck7crPde/ GKu0NtLEvi+59cOfizkSAsydu5EQjyK9jqQLThmO6acoZ77VcQiDI2a7WSAUDiROEhPc eY0x9FiHTSdm3Q5IZBa66Hri9qWBu+/KRHN5mNKuDEKz3bbHZZsP1ww0WLWvLGvayLJ5 Oxtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cpmQelrF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id p4-20020a170902b08400b001d35084e9efsi1679564plr.125.2023.12.13.14.44.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Dec 2023 14:44:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cpmQelrF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 4BAC680BC52F; Wed, 13 Dec 2023 14:44:40 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233939AbjLMWoY (ORCPT + 99 others); Wed, 13 Dec 2023 17:44:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45108 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229817AbjLMWoX (ORCPT ); Wed, 13 Dec 2023 17:44:23 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2B861DB for ; Wed, 13 Dec 2023 14:44:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702507458; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=wJ/noKt4RR9yP36R44EoDN70UzFeuyznjnW/8U/CnAQ=; b=cpmQelrFh2kfK6YmAaEdPqt7RajsqRJSunkeJfJTASYW94TaRPxGBt+fOxSasRF2ErfZvi TW3qd5Yh3eisKlbeLrxWoYrpZKVqD2+KBIc+puJfCu6ZvF0wcEjBM3fzSsOikvm5CTq5NR g9mllIu7kG63mgYKm/fNqytDuVrI6BQ= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-211-_UmQjqLVM-G8YawqVKi6LA-1; Wed, 13 Dec 2023 17:44:17 -0500 X-MC-Unique: _UmQjqLVM-G8YawqVKi6LA-1 Received: by mail-wr1-f69.google.com with SMTP id ffacd0b85a97d-3333c009305so6249024f8f.1 for ; Wed, 13 Dec 2023 14:44:16 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702507456; x=1703112256; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=wJ/noKt4RR9yP36R44EoDN70UzFeuyznjnW/8U/CnAQ=; b=RKQQmTYJuvwVkkNDmDVmHJB+aVTny9+L7GoTdOhTaWDm/P1KdkD8CLBZTcA5jR4c1g BOx6Uek+JZWO2l2ze+z5ADna4NfeM44+27Xn0hXSHZyp3DWlRGtnf/ARvJiohN8dEuBa GZHEQBhFlRhK3+y5/5bBrc07I445PiNRrMSHZQol10FTfuoeQDAM5je8NXE9Qm+slUam T/4fUCKLANrX1jhUAc9pi8Tt8vZ53l7dt2LHk9pO9cqM/DXhiH82kLhbJjdnXVLSsw12 qT+Q+R74waov7LYcBBwGlgImB2//K0P+3Mp5AmvNeJIKEDgsHmIfmEC4tfWeoj9s0Ubf zTbQ== X-Gm-Message-State: AOJu0Yywntn4HkLMJ9bncKydmq2K6iwUee4jDfA+BT33aoga9mZCui7Z xfEGNv0+ZhUQ0CSRuMoCfv5NATXCZBO6HsFCuTYN2mcXQk7CYtj3D0MXz7tzmWQxS9VfelDhGyG U2t7uxbE/gSs0NfQnZsIPF2Io X-Received: by 2002:a7b:cd91:0:b0:40c:3399:d5a0 with SMTP id y17-20020a7bcd91000000b0040c3399d5a0mr3902497wmj.100.1702507455962; Wed, 13 Dec 2023 14:44:15 -0800 (PST) X-Received: by 2002:a7b:cd91:0:b0:40c:3399:d5a0 with SMTP id y17-20020a7bcd91000000b0040c3399d5a0mr3902490wmj.100.1702507455621; Wed, 13 Dec 2023 14:44:15 -0800 (PST) Received: from starship ([77.137.131.62]) by smtp.gmail.com with ESMTPSA id az23-20020a05600c601700b0040c0902dc22sm22569330wmb.31.2023.12.13.14.44.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Dec 2023 14:44:15 -0800 (PST) Message-ID: <0c86e5ffb65f07cd3e444038d1f0ed39f0f4130a.camel@redhat.com> Subject: Re: [PATCH v4 10/12] KVM: x86: never write to memory from kvm_vcpu_check_block() From: Maxim Levitsky To: Jim Mattson Cc: Sean Christopherson , alexandru.elisei@arm.com, anup@brainfault.org, aou@eecs.berkeley.edu, atishp@atishpatra.org, borntraeger@linux.ibm.com, chenhuacai@kernel.org, david@redhat.com, frankja@linux.ibm.com, imbrenda@linux.ibm.com, james.morse@arm.com, kvm-riscv@lists.infradead.org, kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-mips@vger.kernel.org, linux-riscv@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, maz@kernel.org, oliver.upton@linux.dev, palmer@dabbelt.com, paul.walmsley@sifive.com, pbonzini@redhat.com, suzuki.poulose@arm.com Date: Thu, 14 Dec 2023 00:44:12 +0200 In-Reply-To: References: <20220921003201.1441511-11-seanjc@google.com> <20231207010302.2240506-1-jmattson@google.com> <5ca5592b21131f515e296afae006e5bb28b1fb87.camel@redhat.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 13 Dec 2023 14:44:40 -0800 (PST) On Wed, 2023-12-13 at 14:31 -0800, Jim Mattson wrote: > On Wed, Dec 13, 2023 at 2:25 PM Maxim Levitsky wrote: > > On Tue, 2023-12-12 at 07:28 -0800, Sean Christopherson wrote: > > > On Sun, Dec 10, 2023, Jim Mattson wrote: > > > > On Thu, Dec 7, 2023 at 8:21 AM Sean Christopherson wrote: > > > > > Doh. We got the less obvious cases and missed the obvious one. > > > > > > > > > > Ugh, and we also missed a related mess in kvm_guest_apic_has_interrupt(). That > > > > > thing should really be folded into vmx_has_nested_events(). > > > > > > > > > > Good gravy. And vmx_interrupt_blocked() does the wrong thing because that > > > > > specifically checks if L1 interrupts are blocked. > > > > > > > > > > Compile tested only, and definitely needs to be chunked into multiple patches, > > > > > but I think something like this mess? > > > > > > > > The proposed patch does not fix the problem. In fact, it messes things > > > > up so much that I don't get any test results back. > > > > > > Drat. > > > > > > > Google has an internal K-U-T test that demonstrates the problem. I > > > > will post it soon. > > > > > > Received, I'll dig in soonish, though "soonish" might unfortunately might mean > > > 2024. > > > > > > > Hi, > > > > So this is what I think: > > > > > > KVM does have kvm_guest_apic_has_interrupt() for this exact purpose, > > to check if nested APICv has a pending interrupt before halting. > > > > > > However the problem is bigger - with APICv we have in essence 2 pending interrupt > > bitmaps - the PIR and the IRR, and to know if the guest has a pending interrupt > > one has in theory to copy PIR to IRR, then see if the max is larger then the current PPR. > > > > Since we don't want to write to guest memory, and the IRR here resides in the guest memory, > > I guess we have to do a 'dry-run' version of 'vmx_complete_nested_posted_interrupt' and call > > it from kvm_guest_apic_has_interrupt(). > > > > What do you think? I can prepare a patch for this. > > > > Can you share a reproducer or write a new one that can be shared? > > See https://lore.kernel.org/kvm/20231211185552.3856862-1-jmattson@google.com/. Thank you! Best regards, Maxim Levitsky > > > Best regards, > > Maxim Levitsky > >