All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: Gleb Natapov <gleb@kernel.org>,
	Marcelo Tosatti <mtosatti@redhat.com>, kvm <kvm@vger.kernel.org>
Subject: Re: [PATCH 00/12] KVM: x86: Fixes for debug registers, IA32_APIC_BASE, and nVMX
Date: Tue, 21 Jan 2014 16:32:38 +0100	[thread overview]
Message-ID: <52DE9316.1040504@siemens.com> (raw)
In-Reply-To: <52D7F5D7.5070708@redhat.com>

On 2014-01-16 16:08, Paolo Bonzini wrote:
> Il 04/01/2014 18:47, Jan Kiszka ha scritto:
>> This is on top of next after merging in the two patches of mine that are
>> only present in master ATM.
>>
>> Highlights:
>>  - reworked fix of DR6 reading on SVM
>>  - full check for invalid writes to IA32_APIC_BASE
>>  - fixed support for halting in L2 (nVMX)
>>  - fully emulated preemption timer (nVMX)
>>  - tracing of nested vmexits (nVMX)
>>
>> The patch "KVM: nVMX: Leave VMX mode on clearing of feature control MSR"
>> is included again, unchanged from previous posting.
>>
>> Most fixes are backed by KVM unit tests, to be posted soon as well.
> 
> I'm applying patches 1-10 (for now to kvm/queue).
> 
> For the last two, I prefer to wait for 3.15.

FWIW, I'm seeing very rare valid IDT vectoring info on NMI exits. As
Jailhouse intercepts no exceptions, nor do any of the other reasons
given in 27.2.3 of the SDM apply here, this must not happen - and real
hw confirms this. Will dig into this once my time permits.

Jan

> 
> Also, for patch 11 I would really prefer to use check_nested_events for
> both VMX and SVM.  I will look at SVM next week.
> 
> Thanks,
> 
> Paolo
> 
>> Jan Kiszka (12):
>>   KVM: x86: Sync DR7 on KVM_SET_DEBUGREGS
>>   KVM: SVM: Fix reading of DR6
>>   KVM: VMX: Fix DR6 update on #DB exception
>>   KVM: x86: Validate guest writes to MSR_IA32_APICBASE
>>   KVM: nVMX: Leave VMX mode on clearing of feature control MSR
>>   KVM: nVMX: Pass vmexit parameters to nested_vmx_vmexit
>>   KVM: nVMX: Add tracepoints for nested_vmexit and nested_vmexit_inject
>>   KVM: nVMX: Clean up handling of VMX-related MSRs
>>   KVM: nVMX: Fix nested_run_pending on activity state HLT
>>   KVM: nVMX: Update guest activity state field on L2 exits
>>   KVM: nVMX: Rework interception of IRQs and NMIs
>>   KVM: nVMX: Fully emulate preemption timer
>>
>>  arch/x86/include/asm/kvm_host.h       |   4 +
>>  arch/x86/include/uapi/asm/msr-index.h |   1 +
>>  arch/x86/kvm/cpuid.h                  |   8 +
>>  arch/x86/kvm/lapic.h                  |   2 +-
>>  arch/x86/kvm/svm.c                    |  15 ++
>>  arch/x86/kvm/vmx.c                    | 399 ++++++++++++++++++++--------------
>>  arch/x86/kvm/x86.c                    |  67 +++++-
>>  7 files changed, 318 insertions(+), 178 deletions(-)
>>

-- 
Siemens AG, Corporate Technology, CT RTC ITP SES-DE
Corporate Competence Center Embedded Linux

      parent reply	other threads:[~2014-01-21 15:32 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-01-04 17:47 [PATCH 00/12] KVM: x86: Fixes for debug registers, IA32_APIC_BASE, and nVMX Jan Kiszka
2014-01-04 17:47 ` [PATCH 01/12] KVM: x86: Sync DR7 on KVM_SET_DEBUGREGS Jan Kiszka
2014-01-04 17:47 ` [PATCH 02/12] KVM: SVM: Fix reading of DR6 Jan Kiszka
2014-01-04 17:47 ` [PATCH 03/12] KVM: VMX: Fix DR6 update on #DB exception Jan Kiszka
2014-01-04 17:47 ` [PATCH 04/12] KVM: x86: Validate guest writes to MSR_IA32_APICBASE Jan Kiszka
2014-01-16 14:07   ` Paolo Bonzini
2014-01-16 14:19     ` Jan Kiszka
2014-01-04 17:47 ` [PATCH 05/12] KVM: nVMX: Leave VMX mode on clearing of feature control MSR Jan Kiszka
2014-01-04 17:47 ` [PATCH 06/12] KVM: nVMX: Pass vmexit parameters to nested_vmx_vmexit Jan Kiszka
2014-01-04 17:47 ` [PATCH 07/12] KVM: nVMX: Add tracepoints for nested_vmexit and nested_vmexit_inject Jan Kiszka
2014-01-04 17:47 ` [PATCH 08/12] KVM: nVMX: Clean up handling of VMX-related MSRs Jan Kiszka
2014-01-04 17:47 ` [PATCH 09/12] KVM: nVMX: Fix nested_run_pending on activity state HLT Jan Kiszka
2014-01-04 17:47 ` [PATCH 10/12] KVM: nVMX: Update guest activity state field on L2 exits Jan Kiszka
2014-01-05 20:01   ` Paolo Bonzini
2014-01-05 20:16     ` Jan Kiszka
2014-01-04 17:47 ` [PATCH 11/12] KVM: nVMX: Rework interception of IRQs and NMIs Jan Kiszka
2014-01-16 15:08   ` Paolo Bonzini
2014-01-04 17:47 ` [PATCH 12/12] KVM: nVMX: Fully emulate preemption timer Jan Kiszka
2014-01-16 15:08 ` [PATCH 00/12] KVM: x86: Fixes for debug registers, IA32_APIC_BASE, and nVMX Paolo Bonzini
2014-01-16 15:12   ` Jan Kiszka
2014-01-16 15:20     ` Paolo Bonzini
2014-01-16 15:38       ` Jan Kiszka
2014-01-21 15:32   ` Jan Kiszka [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=52DE9316.1040504@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=gleb@kernel.org \
    --cc=kvm@vger.kernel.org \
    --cc=mtosatti@redhat.com \
    --cc=pbonzini@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.