]> xenbits.xensource.com Git - people/iwj/xen.git/commitdiff
x86/vvmx: don't enable vmcs shadowing for nested guests
authorSergey Dyasli <sergey.dyasli@citrix.com>
Wed, 20 Dec 2017 14:41:33 +0000 (15:41 +0100)
committerJan Beulich <jbeulich@suse.com>
Wed, 20 Dec 2017 14:41:33 +0000 (15:41 +0100)
Running "./xtf_runner vvmx" in L1 Xen under L0 Xen produces the
following result on H/W with VMCS shadowing:

    Test: vmxon
    Failure in test_vmxon_in_root_cpl0()
      Expected 0x8200000f: VMfailValid(15) VMXON_IN_ROOT
           Got 0x82004400: VMfailValid(17408) <unknown>
    Test result: FAILURE

This happens because SDM allows vmentries with enabled VMCS shadowing
VM-execution control and VMCS link pointer value of ~0ull. But results
of a nested VMREAD are undefined in such cases.

Fix this by not copying the value of VMCS shadowing control from vmcs01
to vmcs02.

Signed-off-by: Sergey Dyasli <sergey.dyasli@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
master commit: 19fdb8e258619aea265af9c183e035e545cbc2d2
master date: 2017-12-01 19:03:27 +0000

xen/arch/x86/hvm/vmx/vvmx.c

index dde02c076b9fc54730cd215580c248092b32e189..013d049f8ad256e5eccfd915cb28a433d312947a 100644 (file)
@@ -633,6 +633,7 @@ void nvmx_update_secondary_exec_control(struct vcpu *v,
                     SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY;
 
     host_cntrl &= ~apicv_bit;
+    host_cntrl &= ~SECONDARY_EXEC_ENABLE_VMCS_SHADOWING;
     shadow_cntrl = get_vvmcs(v, SECONDARY_VM_EXEC_CONTROL);
 
     /* No vAPIC-v support, so it shouldn't be set in vmcs12. */