Re: [PATCH 2/2] KVM: x86: Add kvm_x86_ops callback to allow VMX to stash away CR4.VMXE

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Mar 27, 2019 at 3:05 PM Sean Christopherson
<sean.j.christopherson@xxxxxxxxx> wrote:
> Hmm.  I think we could squeak by without it on a technicality.  Nested
> VMX was only enabled by default after the bug was introduced.  Any
> migration from an older KVM that "officially" supports nested VMX will
> crash the guest ater migration regardless of the target KVM, since KVM
> will signal a #GP on RSM due to CR4.VMXE=1 in the SMM save state area.
> I.e. it wouldn't break anything that wasn't already broken.
>
> Toggling HF_SMM_MASK wouldn't suffer the same fate, i.e. new KVMs would
> happily accept migration from broken KVMs.  That being said, the only
> way that can happen is if migration is triggered during the first SMI
> with CR4.VMXE=1, since the guest will have already crashed due to RSM
> taking a #GP in the broken pre-migration KVM.  Given this is the first
> bug report for the RSM w/ CR4.VMXE=1, I'm going to go out on a limb and
> say that the migration corner case is extremely unlikely, to put it mildly.
>
> So I think we're good?  Maybe add an errata in the docs to note the
> extremely unlikely corner case?

Yeah, probably. Who's using virtual SMM, anyway? :-)

I don't see any tests of virtual SMM in either kvm-unit-tests or
tools/testing/selftests/kvm, but maybe I'm not looking closely enough.



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux