Re: [PATCH] KVM: svm: virtualize MSR reads from MC4_MISC1

2014-07-10 Thread Matthias Lange
On Wed, Jul 09, 2014 at 06:26:23PM +0200, Paolo Bonzini wrote: > Il 26/06/2014 14:22, Matthias Lange ha scritto: > >Linux' AMD MCE code tries to read from the MC4_MISC1 (0xc408) MSR. > >Because > >this read is not virtualized within KVM, a GPE is injected into the gu

[PATCH] KVM: svm: virtualize MSR reads from MC4_MISC1

2014-06-26 Thread Matthias Lange
When running Linux as a guest with KVM on an AMD CPU, the guest Linux kernel tries to read the MC4_MISC1 MSR from its MCE code. Because this MSR is not virtualized within KVM a GPE is injected into the guest. This patch adds support to virtualize the MC4_MSR. Matthias Lange (1): KVM: svm

[PATCH] KVM: svm: virtualize MSR reads from MC4_MISC1

2014-06-26 Thread Matthias Lange
Linux' AMD MCE code tries to read from the MC4_MISC1 (0xc408) MSR. Because this read is not virtualized within KVM, a GPE is injected into the guest. This patch handles guest reads from MC4_MISC and returns 0 to the guest. Signed-off-by: Matthias Lange --- arch/x86/kvm/x86.c | 3 +++ 1

[PATCH] KVM: svm: writes to MSR_K7_HWCR generates GPE in guest

2014-06-26 Thread Matthias Lange
This patch prevents a Linux guest running on an AMD processor from getting a GPE upon setting bit 18 in MSR_K7_HWCR. Matthias Lange (1): KVM: svm: writes to MSR_K7_HWCR generates GPE in guest arch/x86/kvm/x86.c | 1 + 1 file changed, 1 insertion(+) -- 1.9.1 -- To unsubscribe from this list

[PATCH] KVM: svm: writes to MSR_K7_HWCR generates GPE in guest

2014-06-26 Thread Matthias Lange
the guest. Signed-off-by: Matthias Lange --- arch/x86/kvm/x86.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 57eac30..24d70d4 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -2029,6 +2029,7 @@ int kvm_set_msr_common(struct kvm_vcpu

Re: [PATCH] Support for GUEST_SMBASE vmcs field for nested virtualization

2012-06-08 Thread Matthias Lange
On Wed, Jun 06, 2012 at 03:12:56PM +0300, Avi Kivity wrote: > On 06/06/2012 02:37 PM, Matthias Lange wrote: > > @@ -6536,6 +6538,7 @@ static void prepare_vmcs02(struct kvm_vcpu *vcpu, > > struct vmcs12 *vmcs12) > > vmcs_write32(GUEST_INTERRUPTIBILITY_INFO, &

[PATCH] Support for GUEST_SMBASE vmcs field for nested virtualization

2012-06-06 Thread Matthias Lange
ST_ACTIVITY_STATE); + vmcs12->guest_smbase = vmcs_read32(GUEST_SMBASE); vmcs12->guest_interruptibility_info = vmcs_read32(GUEST_INTERRUPTIBILITY_INFO); vmcs12->guest_pending_dbg_exceptions = -- 1.7.9.5 -- Dipl.-Inf. Matthias Lange Security in Teleco

Re: [RFC][PATCH] Add support for the GUEST_SMBASE VMCS field for Intel VT-x.

2012-06-05 Thread Matthias Lange
On Tue, Jun 05, 2012 at 04:09:30PM +0300, Avi Kivity wrote: > On 06/05/2012 02:59 PM, Matthias Lange wrote: > > Do you mean the ABI defined in the Intel Software Developer's manual 3B? Or > > is > > vmcs12 only an ABI internal to the kvm module? > > The lat

Re: [RFC][PATCH] Add support for the GUEST_SMBASE VMCS field for Intel VT-x.

2012-06-05 Thread Matthias Lange
On Sun, May 20, 2012 at 03:39:30PM +0300, Avi Kivity wrote: > On 05/18/2012 12:34 PM, Matthias Lange wrote: > > The following patch adds support for the GUEST_SMBASE field. This allows > > hypervisors running inside kvm read/write access to this field. I have > > tested this

[RFC][PATCH] Add support for the GUEST_SMBASE VMCS field for Intel VT-x.

2012-05-18 Thread Matthias Lange
a Core i5 machine. Best, Matthias. -- Dipl.-Inf. Matthias Lange Security in Telecommunications TU Berlin / Telekom Innovation Laboratories Ernst-Reuter-Platz 7, 10587 Berlin Phone: +49 - 30 - 8353 58 553 Mobile: +49 - 160 - 587 28 07 Web: http://www.t-labs.tu-berlin.de/sect From 266eaaea392db8ed9b9