[PATCH 00/13] KVM: x86: Event fixes and cleanup

From: Sean Christopherson
Date: Wed Apr 22 2020 - 22:25:57 EST


Most of this series only really affects nVMX, but there are a few x86
changes sprinkled in.

Patches 1 and 2 are alternative fixes[1][2] for bugs where a #DB destined
for L2 is dropped because a lower priority event, e.g. VMX preemption
timer, is serviced and triggers VM-Exit, and where correctly handling the
#DB can result in the preemption timer being dropped.

Patch 3 fixes a semi-theoretical bug. I've been intermittently observing
failures when running the preemption timer unit test in L1, but have never
been able to consistently reproduce the bug. I suspect the issue is
KVM_REQ_EVENT being lost, but can't really confirm this is the case due to
lack of a reproducer.

Patches 4-7 are cleanup/refactoring to fix non-exiting NMI/INTR priority
bugs (similar to above) in patch 8. Although patch 8 is technically a bug
fix, I don't think it's stable material (no sane L1 will notice), which is
why I prioritized (da-dum ching) a clean implementation over an easily
backported patch (a single patch would have been ugly).

Patch 9 fixes a similar issue with SMI priority, and again is probably not
stable material.

Patch 10 addresses a gap in WARN coverage that's effectively introduced
by the bug fix in patch 1.

Patches 11 and 12 replace the extra call to check_nested_events() with a
more precise hack-a-fix. This is a very small step towards a pipe dream
of processing each event class exactly once per run loop (more below).

Patch 13 is a random optimization that caught my eye when starting at this
code over and over.


I really, really dislike KVM's event handling flow. In the (distant)
future I'd love to rework the event injection to process each event
exactly once per loop, as opposed to the current behavior where
check_nested_events() can be called at least twice, if not more depending
on blocking behavior. That would make it much cleaner to correctly handle
event prioritization and likely to maintain the code, but getting there is
a significant rework with a fair number of scary changes.

[1] https://lkml.kernel.org/r/20200414000946.47396-2-jmattson@xxxxxxxxxx
[2] https://lkml.kernel.org/r/20200414000946.47396-1-jmattson@xxxxxxxxxx

Sean Christopherson (13):
KVM: nVMX: Preserve exception priority irrespective of exiting
behavior
KVM: nVMX: Open a window for pending nested VMX preemption timer
KVM: x86: Set KVM_REQ_EVENT if run is canceled with req_immediate_exit
set
KVM: x86: Make return for {interrupt_nmi}_allowed() a bool instead of
int
KVM: nVMX: Move nested_exit_on_nmi() to nested.h
KVM: nVMX: Report NMIs as allowed when in L2 and Exit-on-NMI is set
KVM: VMX: Split out architectural interrupt/NMI blocking checks
KVM: nVMX: Preserve IRQ/NMI priority irrespective of exiting behavior
KVM: nVMX: Prioritize SMI over nested IRQ/NMI
KVM: x86: WARN on injected+pending exception even in nested case
KVM: VMX: Use vmx_interrupt_blocked() directly from vmx_handle_exit()
KVM: x86: Replace late check_nested_events() hack with more precise
fix
KVM: VMX: Use vmx_get_rflags() to query RFLAGS in
vmx_interrupt_blocked()

arch/x86/include/asm/kvm_host.h | 6 ++-
arch/x86/kvm/svm/svm.c | 10 ++--
arch/x86/kvm/vmx/nested.c | 42 +++++++++++------
arch/x86/kvm/vmx/nested.h | 5 ++
arch/x86/kvm/vmx/vmx.c | 84 +++++++++++++++++++++------------
arch/x86/kvm/vmx/vmx.h | 2 +
arch/x86/kvm/x86.c | 32 +++++--------
7 files changed, 113 insertions(+), 68 deletions(-)

--
2.26.0