From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DD657C433E0 for ; Sun, 28 Jun 2020 08:52:04 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BA88B20773 for ; Sun, 28 Jun 2020 08:52:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726166AbgF1Iv7 (ORCPT ); Sun, 28 Jun 2020 04:51:59 -0400 Received: from mga05.intel.com ([192.55.52.43]:43712 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726069AbgF1Iv7 (ORCPT ); Sun, 28 Jun 2020 04:51:59 -0400 IronPort-SDR: 9nvc4uHs/HSIoyq7vyfj1wpEhWEcU/RTG16/n2KIsFnEdSD0bIUOU0eqlFmiLL2eg9ZrgZNxFi sD3LCgDsZmLA== X-IronPort-AV: E=McAfee;i="6000,8403,9665"; a="230601060" X-IronPort-AV: E=Sophos;i="5.75,291,1589266800"; d="scan'208";a="230601060" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jun 2020 01:51:59 -0700 IronPort-SDR: nQCCV7I8aGn72OajMvPuSjKq+toOWQBvs1aHn94Y4JekY0wc6B3vQDItKtKMDkeK5I6L5R01Uu EA8RaPFsdquw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,291,1589266800"; d="scan'208";a="480457278" Received: from chenyi-pc.sh.intel.com ([10.239.159.72]) by fmsmga005.fm.intel.com with ESMTP; 28 Jun 2020 01:51:57 -0700 From: Chenyi Qiang To: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Xiaoyao Li Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC 0/2] Add support for bus lock VM exit Date: Sun, 28 Jun 2020 16:53:39 +0800 Message-Id: <20200628085341.5107-1-chenyi.qiang@intel.com> X-Mailer: git-send-email 2.17.1 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This serial adds the support for bus lock VM exit, which is a sub-feature of bus lock detection in KVM. The left part concerning bus lock debug exception support will be sent out once the kernel part is ready. The first patch applies Sean's refactor to vcpu_vmx.exit_reason at https://patchwork.kernel.org/patch/11500659 It is necessary as bus lock VM exit adds a new modifier bit(bit 26) in exit_reason field in VMCS. The second patch is the enabling work for bus lock VM exit. Document for Bus Lock VM exit is now available at the latest "Intel Architecture Instruction Set Extensions Programming Reference". Document Link: https://software.intel.com/content/www/us/en/develop/download/intel-architecture-instruction-set-extensions-programming-reference.html Chenyi Qiang (1): KVM: VMX: Enable bus lock VM exit Sean Christopherson (1): KVM: VMX: Convert vcpu_vmx.exit_reason to a union arch/x86/include/asm/kvm_host.h | 1 + arch/x86/include/asm/vmx.h | 1 + arch/x86/include/asm/vmxfeatures.h | 1 + arch/x86/include/uapi/asm/vmx.h | 4 +- arch/x86/kvm/vmx/nested.c | 42 ++++++++++------ arch/x86/kvm/vmx/vmx.c | 81 ++++++++++++++++++------------ arch/x86/kvm/vmx/vmx.h | 25 ++++++++- arch/x86/kvm/x86.c | 1 + 8 files changed, 107 insertions(+), 49 deletions(-) -- 2.17.1