]> git.baikalelectronics.ru Git - kernel.git/commitdiff
KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault
authorSean Christopherson <seanjc@google.com>
Thu, 7 Apr 2022 00:23:15 +0000 (00:23 +0000)
committerPaolo Bonzini <pbonzini@redhat.com>
Wed, 13 Apr 2022 17:37:46 +0000 (13:37 -0400)
Clear the IDT vectoring field in vmcs12 on next VM-Exit due to a double
or triple fault.  Per the SDM, a VM-Exit isn't considered to occur during
event delivery if the exit is due to an intercepted double fault or a
triple fault.  Opportunistically move the default clearing (no event
"pending") into the helper so that it's more obvious that KVM does indeed
handle this case.

Note, the double fault case is worded rather wierdly in the SDM:

  The original event results in a double-fault exception that causes the
  VM exit directly.

Temporarily ignoring injected events, double faults can _only_ occur if
an exception occurs while attempting to deliver a different exception,
i.e. there's _always_ an original event.  And for injected double fault,
while there's no original event, injected events are never subject to
interception.

Presumably the SDM is calling out that a the vectoring info will be valid
if a different exit occurs after a double fault, e.g. if a #PF occurs and
is intercepted while vectoring #DF, then the vectoring info will show the
double fault.  In other words, the clause can simply be read as:

  The VM exit is caused by a double-fault exception.

Fixes: 42b15bc4fa21 ("KVM: nVMX: Exiting from L2 to L1")
Cc: Chenyi Qiang <chenyi.qiang@intel.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
Message-Id: <20220407002315.78092-4-seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx/nested.c
arch/x86/kvm/vmx/vmcs.h

index d1d8675286980fa1ab8c4f693ad69febf64ef862..838ac7ab595053de64b83c4ec99a7b623a02c2d0 100644 (file)
@@ -3695,12 +3695,34 @@ vmcs12_guest_cr4(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12)
 }
 
 static void vmcs12_save_pending_event(struct kvm_vcpu *vcpu,
-                                     struct vmcs12 *vmcs12)
+                                     struct vmcs12 *vmcs12,
+                                     u32 vm_exit_reason, u32 exit_intr_info)
 {
        u32 idt_vectoring;
        unsigned int nr;
 
-       if (vcpu->arch.exception.injected) {
+       /*
+        * Per the SDM, VM-Exits due to double and triple faults are never
+        * considered to occur during event delivery, even if the double/triple
+        * fault is the result of an escalating vectoring issue.
+        *
+        * Note, the SDM qualifies the double fault behavior with "The original
+        * event results in a double-fault exception".  It's unclear why the
+        * qualification exists since exits due to double fault can occur only
+        * while vectoring a different exception (injected events are never
+        * subject to interception), i.e. there's _always_ an original event.
+        *
+        * The SDM also uses NMI as a confusing example for the "original event
+        * causes the VM exit directly" clause.  NMI isn't special in any way,
+        * the same rule applies to all events that cause an exit directly.
+        * NMI is an odd choice for the example because NMIs can only occur on
+        * instruction boundaries, i.e. they _can't_ occur during vectoring.
+        */
+       if ((u16)vm_exit_reason == EXIT_REASON_TRIPLE_FAULT ||
+           ((u16)vm_exit_reason == EXIT_REASON_EXCEPTION_NMI &&
+            is_double_fault(exit_intr_info))) {
+               vmcs12->idt_vectoring_info_field = 0;
+       } else if (vcpu->arch.exception.injected) {
                nr = vcpu->arch.exception.nr;
                idt_vectoring = nr | VECTORING_INFO_VALID_MASK;
 
@@ -3733,6 +3755,8 @@ static void vmcs12_save_pending_event(struct kvm_vcpu *vcpu,
                        idt_vectoring |= INTR_TYPE_EXT_INTR;
 
                vmcs12->idt_vectoring_info_field = idt_vectoring;
+       } else {
+               vmcs12->idt_vectoring_info_field = 0;
        }
 }
 
@@ -4219,8 +4243,8 @@ static void prepare_vmcs12(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12,
                 * Transfer the event that L0 or L1 may wanted to inject into
                 * L2 to IDT_VECTORING_INFO_FIELD.
                 */
-               vmcs12->idt_vectoring_info_field = 0;
-               vmcs12_save_pending_event(vcpu, vmcs12);
+               vmcs12_save_pending_event(vcpu, vmcs12,
+                                         vm_exit_reason, exit_intr_info);
 
                vmcs12->vm_exit_intr_info = exit_intr_info;
                vmcs12->vm_exit_instruction_len = vmcs_read32(VM_EXIT_INSTRUCTION_LEN);
index e325c290a8162c18c5e083d7f5dc547d7f586a79..2b9d7a7e83f779c1919b5245bae654bf697e0498 100644 (file)
@@ -104,6 +104,11 @@ static inline bool is_breakpoint(u32 intr_info)
        return is_exception_n(intr_info, BP_VECTOR);
 }
 
+static inline bool is_double_fault(u32 intr_info)
+{
+       return is_exception_n(intr_info, DF_VECTOR);
+}
+
 static inline bool is_page_fault(u32 intr_info)
 {
        return is_exception_n(intr_info, PF_VECTOR);