* Handle pml in nested vmx
@ 2017-05-02 11:43 Wincy Van
2017-05-02 13:04 ` Paolo Bonzini
0 siblings, 1 reply; 3+ messages in thread
From: Wincy Van @ 2017-05-02 11:43 UTC (permalink / raw)
To: kvm
I find that L2 can't boot in the kvm queue branch.
L0 KVM will inject a nested vmx exit reason 62 (EXIT_REASON_PML_FULL)
to L1, if L1 can't handle this exit reason, it will report a hardware error.
According to my test, both RHEL 6.x (kernel 2.6.32) and VirtualBox for Windows
will be affected by this bug.
Here is my workaround:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 379087a..72784ac 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -8135,6 +8135,8 @@ static bool nested_vmx_exit_handled(struct kvm_vcpu *vcpu)
* the XSS exit bitmap in vmcs12.
*/
return nested_cpu_has2(vmcs12, SECONDARY_EXEC_XSAVES);
+ case EXIT_REASON_PML_FULL:
+ return false;
case EXIT_REASON_PREEMPTION_TIMER:
return false;
default:
If this patch applied, the bug seems to be fixed, but I can't ensure
that L0's pml is
working properly in this scene.
Is this patch doing the right thing (without implement nested pml)?
Thanks,
Wincy
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: Handle pml in nested vmx
2017-05-02 11:43 Handle pml in nested vmx Wincy Van
@ 2017-05-02 13:04 ` Paolo Bonzini
2017-05-03 1:53 ` Wincy Van
0 siblings, 1 reply; 3+ messages in thread
From: Paolo Bonzini @ 2017-05-02 13:04 UTC (permalink / raw)
To: Wincy Van, kvm
On 02/05/2017 13:43, Wincy Van wrote:
> I find that L2 can't boot in the kvm queue branch.
> L0 KVM will inject a nested vmx exit reason 62 (EXIT_REASON_PML_FULL)
> to L1, if L1 can't handle this exit reason, it will report a hardware error.
>
> According to my test, both RHEL 6.x (kernel 2.6.32) and VirtualBox for Windows
> will be affected by this bug.
>
> Here is my workaround:
>
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 379087a..72784ac 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -8135,6 +8135,8 @@ static bool nested_vmx_exit_handled(struct kvm_vcpu *vcpu)
> * the XSS exit bitmap in vmcs12.
> */
> return nested_cpu_has2(vmcs12, SECONDARY_EXEC_XSAVES);
> + case EXIT_REASON_PML_FULL:
> + return false;
> case EXIT_REASON_PREEMPTION_TIMER:
> return false;
> default:
>
>
> If this patch applied, the bug seems to be fixed, but I can't ensure
> that L0's pml is working properly in this scene.
>
> Is this patch doing the right thing (without implement nested pml)?
Yes, the patch has been posted already (and will be in 4.12) as "[PATCH]
KVM: nVMX: do not leak PML full vmexit to L1"
Thanks,
Paolo
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Handle pml in nested vmx
2017-05-02 13:04 ` Paolo Bonzini
@ 2017-05-03 1:53 ` Wincy Van
0 siblings, 0 replies; 3+ messages in thread
From: Wincy Van @ 2017-05-03 1:53 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: kvm
On Tue, May 2, 2017 at 9:04 PM, Paolo Bonzini <pbonzini@redhat.com> wrote:
>
>
> On 02/05/2017 13:43, Wincy Van wrote:
>> I find that L2 can't boot in the kvm queue branch.
>> L0 KVM will inject a nested vmx exit reason 62 (EXIT_REASON_PML_FULL)
>> to L1, if L1 can't handle this exit reason, it will report a hardware error.
>>
>> According to my test, both RHEL 6.x (kernel 2.6.32) and VirtualBox for Windows
>> will be affected by this bug.
>>
>> Here is my workaround:
>>
>> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
>> index 379087a..72784ac 100644
>> --- a/arch/x86/kvm/vmx.c
>> +++ b/arch/x86/kvm/vmx.c
>> @@ -8135,6 +8135,8 @@ static bool nested_vmx_exit_handled(struct kvm_vcpu *vcpu)
>> * the XSS exit bitmap in vmcs12.
>> */
>> return nested_cpu_has2(vmcs12, SECONDARY_EXEC_XSAVES);
>> + case EXIT_REASON_PML_FULL:
>> + return false;
>> case EXIT_REASON_PREEMPTION_TIMER:
>> return false;
>> default:
>>
>>
>> If this patch applied, the bug seems to be fixed, but I can't ensure
>> that L0's pml is working properly in this scene.
>>
>> Is this patch doing the right thing (without implement nested pml)?
>
> Yes, the patch has been posted already (and will be in 4.12) as "[PATCH]
> KVM: nVMX: do not leak PML full vmexit to L1"
>
OK, missed that, thank you Paolo :-)
Wincy
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2017-05-03 1:54 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-05-02 11:43 Handle pml in nested vmx Wincy Van
2017-05-02 13:04 ` Paolo Bonzini
2017-05-03 1:53 ` Wincy Van
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.