Jes Sorensen wrote: > On 08/27/10 10:27, Jan Kiszka wrote: >> Am 26.08.2010 22:06, Jes.Sorensen@xxxxxxxxxx wrote: >>> From: Jes Sorensen <Jes.Sorensen@xxxxxxxxxx> >>> >>> Injecting an NMI while GUEST_INTR_STATE_STI is set may fail, >>> which can cause an EXIT with invalid state, resulting in the >>> guest dieing. >> Very interesting. Reality obviously doesn't bother about the statement >> of the vendor [1]. >> >> Just curious: is this limited to specific CPU models or actually a >> generic issue? > > I have been able to reproduce this on a core2 and a nehalem box, so I > think it is at least somewhat generic on Intel. Not sure if it can be > reproduced on AMD. AMD does not differentiate between MOV-SS and STI interrupt shadows. But AMD has its own NMI problems as it does not allow to trap after IRET-from-NMI and requires magic dances which are partly broken in KVM. I'm leaning towards NMI window emulation via the workaround we use for older Intel CPUs without NMI window trapping as well. > > It also seems to be specific to which guest kernel I run, so timing may > play a part as well. For sure, the critical window is one instruction wide... Jan -- Siemens AG, Corporate Technology, CT T DE IT 1 Corporate Competence Center Embedded Linux -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html