[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.1755609446.git.maciej.szmigiero@oracle.com>
Date: Tue, 19 Aug 2025 15:32:13 +0200
From: "Maciej S. Szmigiero" <mail@...iej.szmigiero.name>
To: Paolo Bonzini <pbonzini@...hat.com>,
Sean Christopherson <seanjc@...gle.com>
Cc: Maxim Levitsky <mlevitsk@...hat.com>,
Suravee Suthikulpanit <Suravee.Suthikulpanit@....com>,
Alejandro Jimenez <alejandro.j.jimenez@...cle.com>,
kvm@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] KVM: SVM: Fix missing LAPIC TPR sync into VMCB::V_TPR with AVIC on
From: "Maciej S. Szmigiero" <maciej.szmigiero@...cle.com>
When AVIC is enabled the normal pre-VMRUN LAPIC TPR to VMCB::V_TPR sync in
sync_lapic_to_cr8() is inhibited so any changed TPR in the LAPIC state would
*not* get copied into the V_TPR field of VMCB.
AVIC does sync between these two fields, however it does so only on
explicit guest writes to one of these fields, not on a bare VMRUN.
This is especially true when it is the userspace setting LAPIC state via
KVM_SET_LAPIC ioctl() since userspace does not have access to the guest
VMCB.
Practice shows that it is the V_TPR that is actually used by the AVIC to
decide whether to issue pending interrupts to the CPU (not TPR in TASKPRI),
so any leftover value in V_TPR will cause serious interrupt delivery issues
in the guest when AVIC is enabled.
Fix this issue by explicitly copying LAPIC TPR to VMCB::V_TPR in
avic_apicv_post_state_restore(), which gets called from KVM_SET_LAPIC and
similar code paths when AVIC is enabled.
Add also a relevant set of tests to xapic_state_test so hopefully
we'll be protected against getting such regressions in the future.
Yes, this breaks real guests when AVIC is enabled.
Specifically, the one OS that sometimes needs different handling and its
name begins with letter 'W'.
KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR when setting LAPIC regs
KVM: selftests: Test TPR / CR8 sync and interrupt masking
arch/x86/kvm/svm/avic.c | 23 ++
.../testing/selftests/kvm/include/x86/apic.h | 5 +
.../selftests/kvm/x86/xapic_state_test.c | 265 +++++++++++++++++-
3 files changed, 290 insertions(+), 3 deletions(-)
Powered by blists - more mailing lists