Jim Mattson <jmattson@xxxxxxxxxx> writes: > On Fri, Feb 12, 2021 at 9:55 AM Bandan Das <bsd@xxxxxxxxxx> wrote: >> >> Jim Mattson <jmattson@xxxxxxxxxx> writes: >> >> > On Fri, Feb 12, 2021 at 6:49 AM Bandan Das <bsd@xxxxxxxxxx> wrote: >> >> >> >> Paolo Bonzini <pbonzini@xxxxxxxxxx> writes: >> >> >> >> > On 11/02/21 22:22, Bandan Das wrote: >> >> >> The pcid-disabled test from kvm-unit-tests fails on a Milan host because the >> >> >> processor injects a #GP while the test expects #UD. While setting the intercept >> >> >> when the guest has it disabled seemed like the obvious thing to do, Babu Moger (AMD) >> >> >> pointed me to an earlier discussion here - https://lkml.org/lkml/2020/6/11/949 >> >> >> >> >> >> Jim points out there that #GP has precedence over the intercept bit when invpcid is >> >> >> called with CPL > 0 and so even if we intercept invpcid, the guest would end up with getting >> >> >> and "incorrect" exception. To inject the right exception, I created an entry for the instruction >> >> >> in the emulator to decode it successfully and then inject a UD instead of a GP when >> >> >> the guest has it disabled. >> >> >> >> >> >> Bandan Das (3): >> >> >> KVM: Add a stub for invpcid in the emulator table >> >> >> KVM: SVM: Handle invpcid during gp interception >> >> >> KVM: SVM: check if we need to track GP intercept for invpcid >> >> >> >> >> >> arch/x86/kvm/emulate.c | 3 ++- >> >> >> arch/x86/kvm/svm/svm.c | 22 +++++++++++++++++++++- >> >> >> 2 files changed, 23 insertions(+), 2 deletions(-) >> >> >> >> >> > >> >> > Isn't this the same thing that "[PATCH 1/3] KVM: SVM: Intercept >> >> > INVPCID when it's disabled to inject #UD" also does? >> >> > >> >> Yeah, Babu pointed me to Sean's series after I posted mine. >> >> 1/3 indeed will fix the kvm-unit-test failure. IIUC, It doesn't look like it >> >> handles the case for the guest executing invpcid at CPL > 0 when it's >> >> disabled for the guest - #GP takes precedence over intercepts and will >> >> be incorrectly injected instead of an #UD. >> > >> > I know I was the one to complain about the #GP, but... >> > >> > As a general rule, kvm cannot always guarantee a #UD for an >> > instruction that is hidden from the guest. Consider, for example, >> > popcnt, aesenc, vzeroall, movbe, addcx, clwb, ... >> > I'm pretty sure that Paolo has brought this up in the past when I've >> > made similar complaints. >> >> Ofcourse, even for vm instructions failures, the fixup table always jumps >> to a ud2. I was just trying to address the concern because it is possible >> to inject the correct exception via decoding the instruction. > > But kvm doesn't intercept #GP, except when enable_vmware_backdoor is > set, does it? I don't think it's worth intercepting #GP just to get > this #UD right. I prefer following the spec wherever we can. Otoh, if kvm can't guarantee injecting the right exception, we should change kvm-unit-tests to just check for exceptions and not a specific exception that adheres to the spec. This one's fine though, as long as we don't add a CPL > 0 invpcid test, the other patch that was posted fixes it. Bandan