On 2013-08-11 09:59, Jan Kiszka wrote:
> From: Jan Kiszka
>
> Allows to parse the result even if the KVM plugin does not yet
> understand a specific exit code.
>
> Signed-off-by: Jan Kiszka
> ---
> plugin_kvm.c | 12
> 1 files changed, 8 insertions(+
On 2013-09-30 11:08, Jan Kiszka wrote:
> On 2013-09-26 17:04, Paolo Bonzini wrote:
>> Il 16/09/2013 10:11, Arthur Chunqi Li ha scritto:
>>> This patch contains the following two changes:
>>> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
>>
mless, the guest kernel has to
manage access to this I/O port anyway.
Signed-off-by: Jan Kiszka
---
hw/i386/kvmvapic.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/hw/i386/kvmvapic.c b/hw/i386/kvmvapic.c
index 1c2dbf5..2d87600 100644
--- a/hw/i386/kvmvapic.c
+++ b/hw/i386/kvmva
On 2013-09-26 17:04, Paolo Bonzini wrote:
> Il 16/09/2013 10:11, Arthur Chunqi Li ha scritto:
>> This patch contains the following two changes:
>> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
>> with some reasons not emulated by L1, preemption timer value should
>> be save in
On 2013-09-27 08:37, Jan Kiszka wrote:
> On 2013-09-26 22:44, Paolo Bonzini wrote:
>> Il 26/09/2013 19:47, Paolo Bonzini ha scritto:
>>>
>>> If I only apply this hunk, which disables the preemption timer while
>>> in L1:
>>>
>>> @@ -8396,6 +8
On 2013-09-26 22:44, Paolo Bonzini wrote:
> Il 26/09/2013 19:47, Paolo Bonzini ha scritto:
>>
>> If I only apply this hunk, which disables the preemption timer while
>> in L1:
>>
>> @@ -8396,6 +8375,8 @@ static void nested_vmx_vmexit(struct kvm_vcpu *vcpu)
>>
>> load_vmcs12_host_state(vcpu,
On 2013-09-26 20:53, Hu Yaohui wrote:
> Hi Jan,
> I am working on some Nested VM related projects. Some other teammates have
> made the modifications to the kvm module.
And these modifications cannot cause the misguided INT3?
> Most of my work depends on his.
> If I could not use Qemu Debug meth
On 2013-09-26 16:14, Hu Yaohui wrote:
> Hi Jan,
> Thanks for your reply.
> On Thu, Sep 26, 2013 at 2:08 AM, Jan Kiszka wrote:
>
>> On 2013-09-25 20:08, Hu Yaohui wrote:
>>> Hi All,
>>> I am trying to debug guest OS through qemu with kvm enabled.
>>> F
On 2013-09-26 17:04, Paolo Bonzini wrote:
> Il 16/09/2013 10:11, Arthur Chunqi Li ha scritto:
>> This patch contains the following two changes:
>> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
>> with some reasons not emulated by L1, preemption timer value should
>> be save in
On 2013-09-22 11:53, Gleb Natapov wrote:
> On Sun, Sep 22, 2013 at 10:53:14AM +0200, Paolo Bonzini wrote:
>> Il 22/09/2013 09:42, Gleb Natapov ha scritto:
>>> On Mon, Sep 16, 2013 at 04:06:10PM +0200, Paolo Bonzini wrote:
Paul Gortmaker reported a BUG on preempt-rt kernels, due to taking the
>
On 2013-09-17 04:29, Arthur Chunqi Li wrote:
> Add some comments on the framework of nested VMX testing, and guides of
> how to write new test cases.
>
> Signed-off-by: Arthur Chunqi Li
> ---
> x86/vmx.c | 25 +
> x86/vmx_tests.c | 13 +
> 2 files ch
On 2013-09-20 20:18, Paul Gortmaker wrote:
> On 13-09-20 02:04 PM, Jan Kiszka wrote:
>> On 2013-09-20 19:51, Paul Gortmaker wrote:
>>> [Re: [PATCH 0/3] KVM: Make kvm_lock non-raw] On 16/09/2013 (Mon 18:12) Paul
>>> Gortmaker wrote:
>>>
>>>> On 13
On 2013-09-20 19:51, Paul Gortmaker wrote:
> [Re: [PATCH 0/3] KVM: Make kvm_lock non-raw] On 16/09/2013 (Mon 18:12) Paul
> Gortmaker wrote:
>
>> On 13-09-16 10:06 AM, Paolo Bonzini wrote:
>>> Paul Gortmaker reported a BUG on preempt-rt kernels, due to taking the
>>> mmu_lock within the raw kvm_lo
On 2013-09-16 16:06, Paolo Bonzini wrote:
> Remove the useless argument, and do not do anything if there are no
> VMs running at the time of the hotplug.
kvm_cpu_hotplug already filters !kvm_usage_count. If we need the check
to be under kvm_lock, drop that line as well. If that is not required
(ma
On 2013-09-16 07:42, Arthur Chunqi Li wrote:
> On Sat, Sep 14, 2013 at 1:15 AM, Paolo Bonzini wrote:
>> Il 06/09/2013 04:04, Arthur Chunqi Li ha scritto:
>>> This patch contains the following two changes:
>>> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
>>> with some reasons
On 2013-09-13 19:15, Paolo Bonzini wrote:
> Il 06/09/2013 04:04, Arthur Chunqi Li ha scritto:
>> +preempt_val_l1 = delta_tsc_l1 >> preempt_scale;
>> +if (preempt_val_l2 <= preempt_val_l1)
>> +preempt_val_l2 = 0;
>> +else
>> +preempt_val_l2 -= preempt_val_l1;
>> +
On 2013-09-09 06:57, Arthur Chunqi Li wrote:
> This series of patches provide the framework of nested EPT and some test
> cases for nested EPT features.
>
> Arthur Chunqi Li (2):
> kvm-unit-tests: VMX: The framework of EPT for nested VMX testing
> kvm-unit-tests: VMX: Test cases for nested EPT
On 2013-09-03 13:50, Gleb Natapov wrote:
> On Mon, Sep 02, 2013 at 05:06:23PM +0800, Arthur Chunqi Li wrote:
>> Hi Gleb, Paolo and Jan,
>>
> Jan, have you reviewed it? Any ACKs?
I've only reviewed v1, but I scheduled v2 for tonight now.
Jan
>
>> Would you please review this series of codes when
ff-by: Jan Kiszka
---
arch/x86/kvm/vmx.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 1f1da43..b43d1f8 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -8186,7 +8186,7 @@ static void load_vmcs12_host_state(struct kvm
On 2013-09-02 11:36, Gleb Natapov wrote:
> On Mon, Sep 02, 2013 at 11:06:53AM +0200, Jan Kiszka wrote:
>> On 2013-09-02 10:21, Gleb Natapov wrote:
>>> On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
>>>> Likely a typo, but a fatal one as kvm_set_cr0 pe
ROM layout may change after reset of devices are hotplugged, so we have
to pick up the physical address again when the ROM is initialized. This
is best achieved by resetting the state to INACTIVE.
CC: qemu-sta...@nongnu.org
Signed-off-by: Jan Kiszka
---
hw/i386/kvmvapic.c | 4 +---
1 file
Addresses the issue Daniel reported in
http://thread.gmane.org/gmane.comp.emulators.qemu/231577
CC: qemu-sta...@nongnu.org
Jan Kiszka (3):
kvmvapic: Catch invalid ROM size
kvmvapic: Enter inactive state on hardware reset
kvmvapic: Clear also physical ROM address when entering INACTIVE
If not caught early, a zero-length ROM will cause a NULL-pointer access
later on in patch_hypercalls when allocating a zero-length ROM copy and
trying to read from it.
CC: qemu-sta...@nongnu.org
Signed-off-by: Jan Kiszka
---
hw/i386/kvmvapic.c | 11 +--
1 file changed, 9 insertions
To avoid misinterpreting INACTIVE after migration as old qemu-kvm's
STANDBY, also clear rom_state_paddr when going back to this state.
CC: qemu-sta...@nongnu.org
Signed-off-by: Jan Kiszka
---
hw/i386/kvmvapic.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/hw/i386/kvmvapic.c b/hw
On 2013-09-03 11:32, Alexey Kardashevskiy wrote:
> On 09/03/2013 07:29 PM, Peter Maydell wrote:
>> On 3 September 2013 09:27, Alexey Kardashevskiy wrote:
>>> Signed-off-by: Alexey Kardashevskiy
>>> ---
>>>
>>> I need this update as VFIO on PPC64/pseries got in upstream kernel
>>> and this is requ
On 2013-09-03 11:04, Gleb Natapov wrote:
> On Tue, Sep 03, 2013 at 10:51:31AM +0200, Jan Kiszka wrote:
>> On 2013-09-03 10:39, Gleb Natapov wrote:
>>> On Thu, Aug 08, 2013 at 04:26:32PM +0200, Jan Kiszka wrote:
>>>> This job is normally performed by the architectural
On 2013-09-03 10:39, Gleb Natapov wrote:
> On Thu, Aug 08, 2013 at 04:26:32PM +0200, Jan Kiszka wrote:
>> This job is normally performed by the architectural EFER set service
>> which we cannot use as it prevents transitions that are valid when
>> switching between L1 and
On 2013-09-02 20:20, Jan Kiszka wrote:
> On 2013-09-02 20:09, Gleb Natapov wrote:
>> On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
>>> On 2013-09-02 15:16, Gleb Natapov wrote:
>>>> On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
>>
On 2013-09-02 20:09, Gleb Natapov wrote:
> On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
>> On 2013-09-02 15:16, Gleb Natapov wrote:
>>> On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
>>>> We need to update EFER.NX befo
On 2013-09-02 15:16, Gleb Natapov wrote:
> On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
>> We need to update EFER.NX before building the nEPT state via
>> nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
>> that claims to have NX disable
On 2013-09-02 10:21, Gleb Natapov wrote:
> On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
>> Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
> Not a typo :) That what Avi asked for do during initial nested VMX
> review: http://markmail.org/message/h
On 2013-08-28 20:12, Lluís Vilanova wrote:
> Jan Kiszka writes:
> [...]
>>> Is it possible to give a nested guest direct access to a device on the
>>> guest?
>>> (more specifically, an AHCI controller).
>
>> Nope, we are lacking support for emulat
On 2013-08-28 16:28, Lluís Vilanova wrote:
> Hi,
>
> I want to get the following setup, but don't know how (or if it's even
> possible):
>
> * A guest VM with two AHCI controllers, with one device each. One of the AHCI
> controllers provides the VM's disk ("system"), while the other provides
>
On 2013-08-27 10:29, 缪天翔 wrote:
> Hi all
>
> I am doing a research project similar to "Turtles" using the nested
> vmx feature of kvm. In detail, I launch a guest kvm (donated as L1) on
> the underlying kvm (donated as L0) and then set up a nested guest
> (donated as L2) upon the L1 guest kvm.
>
On 2013-08-25 17:26, Arthur Chunqi Li wrote:
> This patch contains the following two changes:
> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
> with some reasons not emulated by L1, preemption timer value should
> be save in such exits.
> 2. Add support of "Save VMX-preemption
On 2013-08-25 11:07, Arthur Chunqi Li wrote:
> On Sun, Aug 25, 2013 at 4:53 PM, Jan Kiszka wrote:
>> On 2013-08-25 10:41, Arthur Chunqi Li wrote:
>>> On Sun, Aug 25, 2013 at 4:18 PM, Abel Gordon wrote:
>>>>
>>>>
>>>> kvm-ow...@vger.kernel.org
On 2013-08-25 10:41, Arthur Chunqi Li wrote:
> On Sun, Aug 25, 2013 at 4:18 PM, Abel Gordon wrote:
>>
>>
>> kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM:
>>
>>> From: Jan Kiszka
>>> To: Abel Gordon/Haifa/IBM@IBMIL,
>>> Cc
On 2013-08-25 10:25, Jan Kiszka wrote:
> On 2013-08-25 10:18, Abel Gordon wrote:
>>
>>
>> kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM:
>>
>>> From: Jan Kiszka
>>> To: Abel Gordon/Haifa/IBM@IBMIL,
>>> Cc: g...@redhat.com, kvm ,
On 2013-08-25 10:18, Abel Gordon wrote:
>
>
> kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM:
>
>> From: Jan Kiszka
>> To: Abel Gordon/Haifa/IBM@IBMIL,
>> Cc: g...@redhat.com, kvm , pbonz...@redhat.com,
>> "李春奇 "
>> Date: 2
On 2013-08-25 10:04, Abel Gordon wrote:
>
>
> kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:55:24 AM:
>
>> From: Arthur Chunqi Li
>> To: Abel Gordon/Haifa/IBM@IBMIL,
>> Cc: Jan Kiszka , Gleb Natapov ,
>> kvm , kvm-ow...@vger.kernel.org, Paolo Bonz
On 2013-08-25 09:50, Abel Gordon wrote:
>
>
> kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:43:12 AM:
>
>> From: Jan Kiszka
>> To: Abel Gordon/Haifa/IBM@IBMIL,
>> Cc: g...@redhat.com, kvm@vger.kernel.org, kvm-ow...@vger.kernel.org,
>> pbonz...@redhat.co
On 2013-08-25 09:37, Arthur Chunqi Li wrote:
> On Sun, Aug 25, 2013 at 3:28 PM, Jan Kiszka wrote:
>> On 2013-08-25 09:24, Arthur Chunqi Li wrote:
>>> On Sun, Aug 25, 2013 at 2:44 PM, Jan Kiszka wrote:
>>>> On 2013-08-24 20:44, root wrote:
>>>>>
On 2013-08-25 09:37, Abel Gordon wrote:
>
>
>> From: Jan Kiszka
>> To: "李春奇 " ,
>> Cc: kvm@vger.kernel.org, g...@redhat.com, pbonz...@redhat.com
>> Date: 25/08/2013 09:44 AM
>> Subject: Re: [PATCH] KVM: nVMX: Fully support of nested VMX preemption
On 2013-08-25 09:24, Arthur Chunqi Li wrote:
> On Sun, Aug 25, 2013 at 2:44 PM, Jan Kiszka wrote:
>> On 2013-08-24 20:44, root wrote:
>>> This patch contains the following two changes:
>>> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
>>&g
On 2013-08-08 16:26, Jan Kiszka wrote:
> These patches apply on top of kvm.git queue.
>
> Changes in v3:
> - rebased over queue
> - added "Do not set identity page map for L2"
> - dropped "Fix guest CR3 read-back on VM-exit"
>
> Jan Kiszka
On 2013-08-24 20:44, root wrote:
> This patch contains the following two changes:
> 1. Fix the bug in nested preemption timer support. If vmexit L2->L0
> with some reasons not emulated by L1, preemption timer value should
> be save in such exits.
> 2. Add support of "Save VMX-preemption timer value
On 2013-08-15 10:48, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 4:40 PM, Jan Kiszka wrote:
>> On 2013-08-15 10:35, Arthur Chunqi Li wrote:
>>> On Thu, Aug 15, 2013 at 4:20 PM, Jan Kiszka wrote:
>>>> On 2013-08-15 10:16, Arthur Chunqi Li wrote:
>>>
On 2013-08-15 10:35, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 4:20 PM, Jan Kiszka wrote:
>> On 2013-08-15 10:16, Arthur Chunqi Li wrote:
>>> On Thu, Aug 15, 2013 at 4:06 PM, Jan Kiszka wrote:
>>>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>&g
On 2013-08-15 10:20, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 4:13 PM, Jan Kiszka wrote:
>> On 2013-08-15 10:09, Arthur Chunqi Li wrote:
>>> On Thu, Aug 15, 2013 at 3:58 PM, Jan Kiszka wrote:
>>>> On 2013-08-15 09:51, Arthur Chunqi Li wrote:
>>>
On 2013-08-15 10:16, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 4:06 PM, Jan Kiszka wrote:
>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>>> Add test cases for instruction interception, including three types:
>>> 1. Primary Processor-Based VM-Execution
On 2013-08-15 10:09, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 3:58 PM, Jan Kiszka wrote:
>> On 2013-08-15 09:51, Arthur Chunqi Li wrote:
>>> On Thu, Aug 15, 2013 at 3:40 PM, Jan Kiszka wrote:
>>>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>&g
On 2013-08-15 10:05, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 3:48 PM, Jan Kiszka wrote:
>> On 2013-08-15 09:41, Arthur Chunqi Li wrote:
>>> On Thu, Aug 15, 2013 at 3:17 PM, Jan Kiszka wrote:
>>>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>>
On 2013-08-15 09:59, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 3:47 PM, Jan Kiszka wrote:
>> On 2013-08-15 09:40, Arthur Chunqi Li wrote:
>>> On Thu, Aug 15, 2013 at 3:30 PM, Jan Kiszka wrote:
>>>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>>
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
> Add test cases for instruction interception, including three types:
> 1. Primary Processor-Based VM-Execution Controls (HLT/INVLPG/MWAIT/
> RDPMC/RDTSC/MONITOR/PAUSE)
> 2. Secondary Processor-Based VM-Execution Controls (WBINVD)
> 3. No control flag (C
On 2013-08-15 09:51, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 3:40 PM, Jan Kiszka wrote:
>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>>> Add test cases for I/O bitmaps, including corner cases.
>>
>> Would be good to briefly list the corner cases here.
&g
On 2013-08-15 09:41, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 3:17 PM, Jan Kiszka wrote:
>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>>> Add test cases for ENT_LOAD_PAT, ENT_LOAD_EFER, EXI_LOAD_PAT,
>>> EXI_SAVE_PAT, EXI_LOAD_EFER, EXI_SAVE_PAT flags in en
On 2013-08-15 09:40, Arthur Chunqi Li wrote:
> On Thu, Aug 15, 2013 at 3:30 PM, Jan Kiszka wrote:
>> On 2013-08-13 17:56, Arthur Chunqi Li wrote:
>>> Add testing for CR0/4 shadowing.
>>
>> A few sentences on the test strategy would be good.
>>
>
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
> Add test cases for I/O bitmaps, including corner cases.
Would be good to briefly list the corner cases here.
>
> Signed-off-by: Arthur Chunqi Li
> ---
> x86/vmx.h |6 +-
> x86/vmx_tests.c | 167
> +++
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
> Add testing for CR0/4 shadowing.
A few sentences on the test strategy would be good.
>
> Signed-off-by: Arthur Chunqi Li
> ---
> lib/x86/vm.h|4 +
> x86/vmx_tests.c | 218
> +++
> 2 fil
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
> Add test cases for ENT_LOAD_PAT, ENT_LOAD_EFER, EXI_LOAD_PAT,
> EXI_SAVE_PAT, EXI_LOAD_EFER, EXI_SAVE_PAT flags in enter/exit
> control fields.
>
> Signed-off-by: Arthur Chunqi Li
> ---
> x86/vmx.h |7 +++
> x86/vmx_tests.c | 185
> +
Now that cpu_in/out is just a wrapper around address_space_rw, we can
also call the latter directly. As host endianness == guest endianness,
there is no need for the memory access helpers st*_p/ld*_p as well.
Signed-off-by: Jan Kiszka
---
kvm-all.c | 28 ++--
1 files
On 2013-08-12 17:24, Chris Metcalf wrote:
> This change provides the initial framework support for KVM on tilegx.
> Basic virtual disk and networking is supported.
>
> Signed-off-by: Chris Metcalf
> ---
...
> diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h
> index acccd08..d387
Add decoding for INVEPT and reorder the list according to the reason
numbers.
Signed-off-by: Jan Kiszka
---
Err - yeah...
arch/x86/include/uapi/asm/vmx.h |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/uapi/asm/vmx.h b/arch/x86/include/uapi/asm
On 2013-08-11 10:25, Paolo Bonzini wrote:
> Il 11/08/2013 09:10, Jan Kiszka ha scritto:
>> From: Jan Kiszka
>>
>> Add decoding for INVEPT and reorder the list according to the reason
>> numbers.
>>
>> Signed-off-by: Jan Kiszka
>> ---
>>
>&
From: Jan Kiszka
Allows to parse the result even if the KVM plugin does not yet
understand a specific exit code.
Signed-off-by: Jan Kiszka
---
plugin_kvm.c | 12
1 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/plugin_kvm.c b/plugin_kvm.c
index 8a25cf1..59443e5
From: Jan Kiszka
Aligns us with latest arch/x86/include/uapi/asm/vmx.h.
Signed-off-by: Jan Kiszka
---
plugin_kvm.c |9 -
1 files changed, 8 insertions(+), 1 deletions(-)
diff --git a/plugin_kvm.c b/plugin_kvm.c
index 9b376d8..8a25cf1 100644
--- a/plugin_kvm.c
+++ b/plugin_kvm.c
From: Jan Kiszka
Add decoding for INVEPT and reorder the list according to the reason
numbers.
Signed-off-by: Jan Kiszka
---
Applies on top of queue.
arch/x86/include/uapi/asm/vmx.h |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/uapi/asm/vmx.h
This job is normally performed by the architectural EFER set service
which we cannot use as it prevents transitions that are valid when
switching between L1 and L2. So open-code the update of base_role.nxe
after changing EFER on VM-entry and exit.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX. This will
cause spurious faults for L2.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c | 10
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
state transition that may prevent loading L1's cr0.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
Fiddling with CR3 for L2 is L1's job. It may set its own, different
identity map or simple leave it alone if unrestricted guest mode is
enabled. This also fixes reading back the current CR3 on L2 exits for
reporting it to L1.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c |6
Now that we provide EPT support, there is no reason to torture our
guests by hiding the relieving unrestricted guest mode feature. We just
need to relax CR0 checks for always-on bits as PE and PG can now be
switched off.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c | 18
These patches apply on top of kvm.git queue.
Changes in v3:
- rebased over queue
- added "Do not set identity page map for L2"
- dropped "Fix guest CR3 read-back on VM-exit"
Jan Kiszka (6):
KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0 in
load_vmcs12_host_state
K
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
unconditionally, so we always find the current L2 value in the
architectural state.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm
On 2013-08-07 15:54, Paolo Bonzini wrote:
> On 08/07/2013 03:38 PM, Gleb Natapov wrote:
>> On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 44494ed..60a3644 100644
--- a/arch/x86/kvm/vmx.c
+
On 2013-08-07 14:39, Gleb Natapov wrote:
> On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote:
>> On 2013-08-06 17:53, Gleb Natapov wrote:
>>> On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
>>>> On 2013-08-06 17:04, Zhang, Yang Z wrote:
>>
On 2013-08-06 17:53, Gleb Natapov wrote:
> On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
>> On 2013-08-06 17:04, Zhang, Yang Z wrote:
>>> Gleb Natapov wrote on 2013-08-06:
>>>> On Tue, Aug 06, 2013 at 02:12:51PM +, Zhang, Yang Z wrote:
>>
>>> Gleb Natapov wrote on 2013-08-06:
>>>>>> On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
>>>>>>> From: Jan Kiszka
>>>>>>>
>>>>>>> If nested EPT is enabled, the L2 guest may change CR3 without any
&g
On 2013-08-06 12:41, Arthur Chunqi Li wrote:
> Advertise VM_EXIT_SAVE_IA32_PAT and VM_EXIT_LOAD_IA32_PAT.
>
> Signed-off-by: Arthur Chunqi Li
> ---
> arch/x86/kvm/vmx.c | 13 -
> 1 file changed, 8 insertions(+), 5 deletions(-)
>
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx
On 2013-08-06 12:12, Gleb Natapov wrote:
> On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
>> From: Jan Kiszka
>>
>> If nested EPT is enabled, the L2 guest may change CR3 without any exits.
>> We therefore have to read the current value from the VMCS when
From: Jan Kiszka
Do not report that we can enter the guest in 64-bit mode if the host is
32-bit only. This is not supported by KVM.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c |6 +-
1 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm
From: Jan Kiszka
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
state transition that may prevent loading L1's cr0.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arc
From: Jan Kiszka
At least WB must be possible.
Signed-off-by: Jan Kiszka
Reviewed-by: Gleb Natapov
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 00af1ef..773b54d 100644
--- a/arch/x86/kvm/vmx.c
From: Jan Kiszka
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX. This will
cause spurious faults for L2.
Signed-off-by: Jan Kiszka
---
arch/x86
From: Jan Kiszka
This job is normally performed by the architectural EFER set service
which we cannot use as it prevents transitions that are valid when
switching between L1 and L2. So open-code the update of base_role.nxe
after changing EFER on VM-entry and exit.
Signed-off-by: Jan Kiszka
From: Jan Kiszka
Now that we provide EPT support, there is no reason to torture our
guests by hiding the relieving unrestricted guest mode feature. We just
need to relax CR0 checks for always-on bits as PE and PG can now be
switched off.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c | 18
These patches apply on top of nEPT v7.
Changes in v2:
- rebased over v7
- added patch to fix VM_ENTRY_IA32E_MODE reporting
Jan Kiszka (8):
KVM: nEPT: Advertise WB type EPTP
KVM: nVMX: Fix up VM_ENTRY_IA32E_MODE control feature reporting
KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0 in
From: Jan Kiszka
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
unconditionally, so we always find the current L2 value in the
architectural state.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/vmx.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git
From: Jan Kiszka
If nested EPT is enabled, the L2 guest may change CR3 without any exits.
We therefore have to read the current value from the VMCS when switching
to L1. However, if paging wasn't enabled, L0 tracks L2's CR3, and
GUEST_CR3 rather contains the real-mode identity map. So
On 2013-08-05 10:07, Gleb Natapov wrote:
> From: Nadav Har'El
>
> Advertise the support of EPT to the L1 guest, through the appropriate MSR.
>
> This is the last patch of the basic Nested EPT feature, so as to allow
> bisection through this patch series: The guest will not see EPT support until
On 2013-08-06 10:00, Gleb Natapov wrote:
> On Tue, Aug 06, 2013 at 09:55:09AM +0200, Jan Kiszka wrote:
>> On 2013-08-06 09:51, Gleb Natapov wrote:
>>> On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
>>>> On 2013-08-05 13:40, Gleb Natapov wrote:
>>&g
On 2013-08-05 10:07, Gleb Natapov wrote:
> From: Yang Zhang
>
> Inject nEPT fault to L1 guest. This patch is original from Xinhao.
>
> Reviewed-by: Xiao Guangrong
> Signed-off-by: Jun Nakajima
> Signed-off-by: Xinhao Xu
> Signed-off-by: Yang Zhang
> Signed-off-by: Gleb Natapov
> ---
> arch
On 2013-08-06 09:51, Gleb Natapov wrote:
> On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
>> On 2013-08-05 13:40, Gleb Natapov wrote:
>>> On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
>>>> On Mon, Aug 5, 2013 at 4:07 PM, Gleb Nat
On 2013-08-05 13:40, Gleb Natapov wrote:
> On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
>> On Mon, Aug 5, 2013 at 4:07 PM, Gleb Natapov wrote:
>>> From: Nadav Har'El
>>>
>>> Recent KVM, since
>>> http://kerneltrap.org/mailarchive/linux-kvm/2010/5/2/6261577
>>> switch the EFE
On 2013-08-05 13:00, Arthur Chunqi Li wrote:
> On Mon, Aug 5, 2013 at 6:55 PM, Gleb Natapov wrote:
>> On Mon, Aug 05, 2013 at 12:38:32PM +0200, Jan Kiszka wrote:
>>> On 2013-08-05 11:36, Gmail wrote:
>>>>
>>>>
>>>>> On Mon,
On 2013-08-05 11:36, Gmail wrote:
>
>
>> On Mon, Aug 05, 2013 at 05:10:35PM +0800, Arthur Chunqi Li wrote:
>>> Advertise VM_EXIT_SAVE_IA32_PAT and VM_EXIT_LOAD_IA32_PAT.
>>>
>>> Signed-off-by: Arthur Chunqi Li
>>> ---
>>> arch/x86/kvm/vmx.c |3 ++-
>>> 1 file changed, 2 insertions(+), 1 delet
On 2013-08-05 09:21, Arthur Chunqi Li wrote:
> On Mon, Aug 5, 2013 at 1:49 AM, Jan Kiszka wrote:
>> From: Jan Kiszka
>>
>> Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
>> unconditionally, so we always find the current L2 value in the
>>
On 2013-08-05 04:19, Arthur Chunqi Li wrote:
> On Sun, Aug 4, 2013 at 11:17 PM, Jan Kiszka wrote:
>> From: Jan Kiszka
>>
>> When asking vmx to load the PAT MSR for us while switching from L1 to L2
>> or vice versa, we have to update arch.pat as well as it may later
On 2013-08-04 20:25, Gmail wrote:
> 在 2013-8-5,2:08,Jan Kiszka 写道:
>
>> On 2013-08-04 20:04, Arthur Chunqi Li wrote:
>>> @@ -432,6 +432,22 @@ enum Ctrl1 {
>>> #define HYPERCALL_MASK0xFFF
>>> #define HYPERCALL_VMEXIT0x1
>>>
>&g
On 2013-08-04 20:04, Arthur Chunqi Li wrote:
> @@ -432,6 +432,22 @@ enum Ctrl1 {
> #define HYPERCALL_MASK 0xFFF
> #define HYPERCALL_VMEXIT 0x1
>
> +
> +extern u64 hypercall_field;
> +extern u32 vpid_cnt;
> +extern ulong fix_cr0_set, fix_cr0_clr;
> +extern ulong fix_cr4_set, fi
401 - 500 of 4875 matches
Mail list logo