2015-02-19 16:01+0100, Radim Krčmář: > 2015-02-19 13:07+0100, Kashyap Chamarthy: > 5f3d5799974b8 KVM: nVMX: Rework event injection and recovery: > This concept is based on the rule that a pending vmlaunch/vmresume is > not canceled. Otherwise, we would risk to lose injected events or leak > them into the wrong queues. Encode this rule via a WARN_ON_ONCE at the > entry of nested_vmx_vmexit. > > I wonder if we have broken the invariant since 3.9 ... e011c663b9c786d115c0f45e5b0bfae0c39428d4 KVM: nVMX: Check all exceptions for intercept during delivery to L2 All exceptions should be checked for intercept during delivery to L2, but we check only #PF currently. Drop nested_run_pending while we are at it since exception cannot be injected during vmentry anyway. The last sentence is not true. Can you try if the following patch works? (I know little about nested, so it might be introducing another bug.) Thanks. ---8<--- KVM: nVMX: fix L2 to L1 interrupt leak When vmx->nested.nested_run_pending is set, we aren't expected to exit to L1, but nested_vmx_check_exception() could, since e011c663b9c7. Prevent that. Fixes: e011c663b9c7 ("Check all exceptions for intercept during delivery to L2") Signed-off-by: Radim Krčmář <rkrcmar@xxxxxxxxxx> --- arch/x86/kvm/vmx.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 3f73bfad0349..389166a1b79a 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -2098,6 +2098,9 @@ static int nested_vmx_check_exception(struct kvm_vcpu *vcpu, unsigned nr) { struct vmcs12 *vmcs12 = get_vmcs12(vcpu); + if (to_vmx(vcpu)->nested.nested_run_pending) + return 0; + if (!(vmcs12->exception_bitmap & (1u << nr))) return 0; -- 2.3.0 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html