All of lore.kernel.org
 help / color / mirror / Atom feed
From: Alexander Graf <agraf@suse.de>
To: Gleb Natapov <gleb@redhat.com>
Cc: mtosatti@redhat.com, avi@redhat.com, kvm@vger.kernel.org
Subject: Re: [PATCH] KVM: handle exit due to INVD in VMX
Date: Sun, 31 Oct 2010 12:01:29 -0700	[thread overview]
Message-ID: <829762F0-FA86-4DDD-9AAC-2213CF2F7FC8@suse.de> (raw)
In-Reply-To: <20101031185651.GI2764@redhat.com>


On 31.10.2010, at 11:56, Gleb Natapov wrote:

> On Sun, Oct 31, 2010 at 11:26:09AM -0700, Alexander Graf wrote:
>> 
>> On 31.10.2010, at 11:22, Gleb Natapov wrote:
>> 
>>> On Sun, Oct 31, 2010 at 11:00:08AM -0700, Alexander Graf wrote:
>>>> 
>>>> On 31.10.2010, at 07:36, Gleb Natapov wrote:
>>>> 
>>>>> Call into emulator when INVD instruction is executed by a guest.
>>>> 
>>>> Why? This is a poor patch description.
>>> Why what? Why we need to handle INVD exit instead of stopping with
>>> unhandled exit error?
>> 
>> Ah, so we get the exit already, but don't handle it? That's an important piece of information that belongs in the patch description. Another thing I as a reader would also like to know is where this got triggered, so which guests would break without the patch.
>> 
> I'll add it to the patch description. The guest that triggered it was
> open firmware, but I do not think this info belongs to patch description
> too.

Quite the contrary, I would be very interested in that information in the patch description. The patch description is what people afterwards use to cherry-pick patches. So this is crucial.

> 
>> I'm also wondering why nobody has seen it before. Is this a regression? Is this exit a side-effect of another feature bit of VMX, so only newer CPUs are affected?
>> 
> I guess nobody seen it because not many guests use the instruction.
> Actually this instruction is useful only for firmware use. This is not a
> regression.

This, too, should go in the patch description :). At least the part that usually only firmware uses it. The part where it has been around since the beginning might be interesting as well from a security point of view. After all, the guest can kill its full kvm context without going through qemu interfaces.


Thanks!

Alex


  reply	other threads:[~2010-10-31 19:01 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-10-31 14:36 [PATCH] KVM: handle exit due to INVD in VMX Gleb Natapov
2010-10-31 18:00 ` Alexander Graf
2010-10-31 18:22   ` Gleb Natapov
2010-10-31 18:26     ` Alexander Graf
2010-10-31 18:56       ` Gleb Natapov
2010-10-31 19:01         ` Alexander Graf [this message]
2010-10-31 19:22           ` Gleb Natapov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=829762F0-FA86-4DDD-9AAC-2213CF2F7FC8@suse.de \
    --to=agraf@suse.de \
    --cc=avi@redhat.com \
    --cc=gleb@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=mtosatti@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.