From: Jan Kiszka <jan.kiszka@siemens.com>
To: "Yang, Sheng" <sheng.yang@intel.com>
Cc: Avi Kivity <avi@redhat.com>, kvm-devel <kvm@vger.kernel.org>
Subject: Re: VMX: Host NMI triggering on NMI vmexit
Date: Tue, 23 Sep 2008 10:59:58 +0200 [thread overview]
Message-ID: <48D8B00E.9080706@siemens.com> (raw)
In-Reply-To: <200809231657.02002.sheng.yang@intel.com>
Yang, Sheng wrote:
> On Tuesday 23 September 2008 16:47:54 Jan Kiszka wrote:
>> Yang, Sheng wrote:
>>> On Monday 22 September 2008 19:00:38 Avi Kivity wrote:
>>>> Jan Kiszka wrote:
>>>>>> Maybe the answer is to generate the local nmi via an IPI-to-self
>>>>>> command to the local apic.
>>>>> Going this way leaves me with a few questions: Will it be OK for the
>>>>> related mainainers to export the required service?
>>>> If we can make a case for it (I think we can), then I don't see why not.
>>>>
>>>> Sheng, can you confirm that 'int 2' is problematic, and that
>>>> nmi-via-lapic is the best workaround?
>>> Just back from vacation... :)
>>>
>>> Jan said is true, "int 2" itself won't block subsequent NMIs. But I think
>>> it's too obviously as a hardware issue when using with NMI exiting=1 in
>>> vmx nonroot mode, so I have checked it with my colleague, finally found
>>> these in SDM 3B 23-2:
>>>
>>> The following bullets detail when architectural state is and is not
>>> updated in response to VM exits:
>>> • If an event causes a VM exit *directly*, it does not update
>>> architectural state as it would have if it had it not caused the VM exit:
>>> [...]
>>> — *An NMI causes subsequent NMIs to be blocked*, but only after the VM
>>> exit completes.
>>>
>>> So we needn't worry about that, and this shouldn't cause any trouble
>>> AFAIK...
>> Fine, problems--. :)
>>
>>> Jan, seems we need to do more investigating on the issues you met...
>> Sorry, which one do you mean now?
>
> You said
> "Only true until you have multiple unsynchronized NMI sources, e.g.
> inter-CPU NMIs of kgdb + a watchdog. I just stumbled over several bugs
> in kvm's and my own NMI code that were triggered by such a scenario
> (sigh...)." ?
>
> If it's not related to this one. That's fine. :)
Nope, the actual issues were related to guests facing "NMI storms" (and
should be fixed by my series). That made me wonder what would happen on
the host side if int 2 wasn't safe. But it is, as we know now.
Jan
--
Siemens AG, Corporate Technology, CT SE 2
Corporate Competence Center Embedded Linux
prev parent reply other threads:[~2008-09-23 9:01 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-09-16 11:26 VMX: Host NMI triggering on NMI vmexit Jan Kiszka
2008-09-19 22:37 ` Avi Kivity
2008-09-20 6:55 ` Jan Kiszka
2008-09-22 10:54 ` Jan Kiszka
2008-09-22 11:00 ` Avi Kivity
2008-09-23 5:34 ` Yang, Sheng
2008-09-23 8:47 ` Jan Kiszka
2008-09-23 8:57 ` Yang, Sheng
2008-09-23 8:59 ` Jan Kiszka [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=48D8B00E.9080706@siemens.com \
--to=jan.kiszka@siemens.com \
--cc=avi@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=sheng.yang@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.