When kvm.force_emulation_prefix is enabled, instruction with kvm prefix would trigger an UD exception and do instruction emulation. The emulation may need to exit to userspace due to userspace io, and the complete_userspace_io callback may skip instruction, i.e. MSR accesses emulation would exit to userspace if userspace wanted to know about the MSR fault. However, VM_EXIT_INSTRUCTION_LEN in vmcs is invalid now, it should use kvm_emulate_instruction() to skip instruction. Signed-off-by: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx> --- arch/x86/kvm/vmx/vmx.c | 4 ++-- arch/x86/kvm/vmx/vmx.h | 9 +++++++++ 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 1c8b2b6e7ed9..01049d65da26 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -1501,8 +1501,8 @@ static int skip_emulated_instruction(struct kvm_vcpu *vcpu) * (namely Hyper-V) don't set it due to it being undefined behavior, * i.e. we end up advancing IP with some random value. */ - if (!static_cpu_has(X86_FEATURE_HYPERVISOR) || - exit_reason.basic != EXIT_REASON_EPT_MISCONFIG) { + if (!is_ud_exit(vcpu) && (!static_cpu_has(X86_FEATURE_HYPERVISOR) || + exit_reason.basic != EXIT_REASON_EPT_MISCONFIG)) { instr_len = vmcs_read32(VM_EXIT_INSTRUCTION_LEN); /* diff --git a/arch/x86/kvm/vmx/vmx.h b/arch/x86/kvm/vmx/vmx.h index 592217fd7d92..e7a7f580acd1 100644 --- a/arch/x86/kvm/vmx/vmx.h +++ b/arch/x86/kvm/vmx/vmx.h @@ -481,6 +481,15 @@ static inline u32 vmx_get_intr_info(struct kvm_vcpu *vcpu) return vmx->exit_intr_info; } +static inline bool is_ud_exit(struct kvm_vcpu *vcpu) +{ + union vmx_exit_reason exit_reason = to_vmx(vcpu)->exit_reason; + u32 intr_info = vmx_get_intr_info(vcpu); + + return exit_reason.basic == EXIT_REASON_EXCEPTION_NMI && + is_invalid_opcode(intr_info); +} + struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags); void free_vmcs(struct vmcs *vmcs); int alloc_loaded_vmcs(struct loaded_vmcs *loaded_vmcs); -- 2.31.1