All of lore.kernel.org
 help / color / mirror / Atom feed
* Handle pml in nested vmx
@ 2017-05-02 11:43 Wincy Van
  2017-05-02 13:04 ` Paolo Bonzini
  0 siblings, 1 reply; 3+ messages in thread
From: Wincy Van @ 2017-05-02 11:43 UTC (permalink / raw)
  To: kvm

I find that L2 can't boot in the kvm queue branch.
L0 KVM will inject a nested vmx exit reason 62 (EXIT_REASON_PML_FULL)
to L1, if L1 can't handle this exit reason, it will report a hardware error.

According to my test, both RHEL 6.x (kernel 2.6.32) and VirtualBox for Windows
will be affected by this bug.

Here is my workaround:

diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 379087a..72784ac 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -8135,6 +8135,8 @@ static bool nested_vmx_exit_handled(struct kvm_vcpu *vcpu)
                 * the XSS exit bitmap in vmcs12.
                 */
                return nested_cpu_has2(vmcs12, SECONDARY_EXEC_XSAVES);
+       case EXIT_REASON_PML_FULL:
+               return false;
        case EXIT_REASON_PREEMPTION_TIMER:
                return false;
        default:


If this patch applied, the bug seems to be fixed, but I can't ensure
that L0's pml is
working properly in this scene.

Is this patch doing the right thing (without implement nested pml)?

Thanks,
Wincy

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: Handle pml in nested vmx
  2017-05-02 11:43 Handle pml in nested vmx Wincy Van
@ 2017-05-02 13:04 ` Paolo Bonzini
  2017-05-03  1:53   ` Wincy Van
  0 siblings, 1 reply; 3+ messages in thread
From: Paolo Bonzini @ 2017-05-02 13:04 UTC (permalink / raw)
  To: Wincy Van, kvm



On 02/05/2017 13:43, Wincy Van wrote:
> I find that L2 can't boot in the kvm queue branch.
> L0 KVM will inject a nested vmx exit reason 62 (EXIT_REASON_PML_FULL)
> to L1, if L1 can't handle this exit reason, it will report a hardware error.
> 
> According to my test, both RHEL 6.x (kernel 2.6.32) and VirtualBox for Windows
> will be affected by this bug.
> 
> Here is my workaround:
> 
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 379087a..72784ac 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -8135,6 +8135,8 @@ static bool nested_vmx_exit_handled(struct kvm_vcpu *vcpu)
>                  * the XSS exit bitmap in vmcs12.
>                  */
>                 return nested_cpu_has2(vmcs12, SECONDARY_EXEC_XSAVES);
> +       case EXIT_REASON_PML_FULL:
> +               return false;
>         case EXIT_REASON_PREEMPTION_TIMER:
>                 return false;
>         default:
> 
> 
> If this patch applied, the bug seems to be fixed, but I can't ensure
> that L0's pml is working properly in this scene.
> 
> Is this patch doing the right thing (without implement nested pml)?

Yes, the patch has been posted already (and will be in 4.12) as "[PATCH]
KVM: nVMX: do not leak PML full vmexit to L1"

Thanks,

Paolo

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Handle pml in nested vmx
  2017-05-02 13:04 ` Paolo Bonzini
@ 2017-05-03  1:53   ` Wincy Van
  0 siblings, 0 replies; 3+ messages in thread
From: Wincy Van @ 2017-05-03  1:53 UTC (permalink / raw)
  To: Paolo Bonzini; +Cc: kvm

On Tue, May 2, 2017 at 9:04 PM, Paolo Bonzini <pbonzini@redhat.com> wrote:
>
>
> On 02/05/2017 13:43, Wincy Van wrote:
>> I find that L2 can't boot in the kvm queue branch.
>> L0 KVM will inject a nested vmx exit reason 62 (EXIT_REASON_PML_FULL)
>> to L1, if L1 can't handle this exit reason, it will report a hardware error.
>>
>> According to my test, both RHEL 6.x (kernel 2.6.32) and VirtualBox for Windows
>> will be affected by this bug.
>>
>> Here is my workaround:
>>
>> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
>> index 379087a..72784ac 100644
>> --- a/arch/x86/kvm/vmx.c
>> +++ b/arch/x86/kvm/vmx.c
>> @@ -8135,6 +8135,8 @@ static bool nested_vmx_exit_handled(struct kvm_vcpu *vcpu)
>>                  * the XSS exit bitmap in vmcs12.
>>                  */
>>                 return nested_cpu_has2(vmcs12, SECONDARY_EXEC_XSAVES);
>> +       case EXIT_REASON_PML_FULL:
>> +               return false;
>>         case EXIT_REASON_PREEMPTION_TIMER:
>>                 return false;
>>         default:
>>
>>
>> If this patch applied, the bug seems to be fixed, but I can't ensure
>> that L0's pml is working properly in this scene.
>>
>> Is this patch doing the right thing (without implement nested pml)?
>
> Yes, the patch has been posted already (and will be in 4.12) as "[PATCH]
> KVM: nVMX: do not leak PML full vmexit to L1"
>
OK, missed that, thank you Paolo :-)

Wincy

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2017-05-03  1:54 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-05-02 11:43 Handle pml in nested vmx Wincy Van
2017-05-02 13:04 ` Paolo Bonzini
2017-05-03  1:53   ` Wincy Van

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.