Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Boris Ostrovsky
On 12/13/2016 02:24 PM, Andrew Cooper wrote: Hello, All of this came about while reviewing some of Jans improvements to the x86 instruction emulator. It turns out that the XSA-156 / CVE-2015-8104 fix, c/s bd2239d9 "x86/HVM: always intercept #AC and #DB", introduced an awkward bug on Intel har

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Andrew Cooper
On 14/12/16 07:29, Tian, Kevin wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Wednesday, December 14, 2016 3:25 AM >> >> Hello, >> >> All of this came about while reviewing some of Jans improvements to the >> x86 instruction emulator. >> >> It turns out that the XSA-156 /

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Jan Beulich
>>> On 13.12.16 at 20:24, wrote: > Experimentally, on both Intel and AMD hardware, the mov_ss shadow > inhibits #DB and the VMexit caused by its interception, whereas the sti > shadow doesn't inhibit #DB. Therefore, my planned fix for VT-x is to > unconditionally clobber the sti shadow if we inte

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 08:29, wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Wednesday, December 14, 2016 3:25 AM >> Executing a sti while singlestepping is active currently causes a >> VMEntry failure, because the #DB is still intercepted, but on re-entry, >> the sti inter

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-13 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Wednesday, December 14, 2016 3:25 AM > > Hello, > > All of this came about while reviewing some of Jans improvements to the > x86 instruction emulator. > > It turns out that the XSA-156 / CVE-2015-8104 fix, c/s bd2239d9 > "x86/HVM:

[Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-13 Thread Andrew Cooper
Hello, All of this came about while reviewing some of Jans improvements to the x86 instruction emulator. It turns out that the XSA-156 / CVE-2015-8104 fix, c/s bd2239d9 "x86/HVM: always intercept #AC and #DB", introduced an awkward bug on Intel hardware. Executing a sti while singlestepping is a