On Thu, 2022-07-21 at 16:08 +0000, Sean Christopherson wrote: > On Thu, Jul 21, 2022, Maxim Levitsky wrote: > > On Thu, 2022-07-21 at 14:59 +0000, Sean Christopherson wrote: > > > Yep. Dropping an NMI in the last case is ok, AFAIK no CPU will pend multiple NMIs > > > while another is in-flight. But triggering an immediate exit in svm_nmi_allowed() > > > will hang the vCPU as the second pending NMI will never go away since the vCPU > > > > The idea is to trigger the immediate exit only when a NMI was just injected (V_NMI_PENDING=1) > > but not masked (that is currently in service, that is V_NMI_MASK=0). > > I assume you mean "and an NMI is currently NOT in service"? Yes > > Anyways, we're on the same page, trigger an exit if and only if there's an NMI pending > and the vCPU isn't already handling a vNMI. We may need to explicitly drop one of > the pending NMIs in that case though, otherwise the NMI that _KVM_ holds pending could > get "injected" well after NMIs are unmasked, which could suprise the guest. E.g. > guest IRETs from the second (of three) NMIs, KVM doesn't "inject" that third NMI > until the next VM-Exit, which could be a long time in the future. > > > In case both bits are set, the NMI is dropped, that is no immediate exit is requested. > > > > In this case, next VM entry should have no reason to not inject the NMI and then VM exit > > on the interrupt we raised, so there should not be a problem with forward progress. > > > > There is an issue still, the NMI could also be masked if we are in SMM (I suggested > > setting the V_NMI_MASK manually in this case), thus in this case we won't have more > > that one pending NMI, but I guess this is not that big problem. > > > > We can btw also in this case "open" the NMI window by waiting for RSM intercept. > > (that is just not inject the NMI, and on RSM inject it, I think that KVM already does this) > > > > I think it should overal work, but no doubt I do expect issues and corner cases, > > > > > > > won't make forward progress to unmask NMIs. This can also happen if there are > > > two pending NMIs and GIF=0, i.e. any time there are multiple pending NMIs and NMIs > > > are blocked. > > > > GIF=0 can be dealt with though, if GIF is 0 when 2nd pending NMI arrives, we can > > delay its injection to the moment the STGI is executed and intercept STGI. > > > > We I think already do something like that as well. > > Yep, you're right, svm_enable_nmi_window() sets INTERCEPT_STGI if VGIF is enabled > and GIF=0 (and STGI exits unconditional if VGIF=0? Its not unconditional but KVM has to set the intercept, otherwise the guest will control the host's GIF. Best regards, Maxim Levitsky > ). > > So we have a poor man's NMI-window exiting. Yep, we also intercept IRET for the same purpose, and RSM interception is also a place the NMI are evaluated. We only single step over the IRET, because NMIs are unmasked _after_ the IRET retires. Best regards, Maxim Levitsky >