On 2013-09-27 08:37, Jan Kiszka wrote:
On 2013-09-26 22:44, Paolo Bonzini wrote:
Il 26/09/2013 19:47, Paolo Bonzini ha scritto:
If I only apply this hunk, which disables the preemption timer while
in L1:
@@ -8396,6 +8375,8 @@ static void nested_vmx_vmexit(struct kvm_vcpu *vcpu
On 2013-09-26 22:44, Paolo Bonzini wrote:
Il 26/09/2013 19:47, Paolo Bonzini ha scritto:
If I only apply this hunk, which disables the preemption timer while
in L1:
@@ -8396,6 +8375,8 @@ static void nested_vmx_vmexit(struct kvm_vcpu *vcpu)
load_vmcs12_host_state(vcpu, vmcs12);
+
On 2013-09-26 17:04, Paolo Bonzini wrote:
Il 16/09/2013 10:11, Arthur Chunqi Li ha scritto:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some reasons not emulated by L1, preemption timer value should
be save in such
On 2013-09-26 16:14, Hu Yaohui wrote:
Hi Jan,
Thanks for your reply.
On Thu, Sep 26, 2013 at 2:08 AM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-09-25 20:08, Hu Yaohui wrote:
Hi All,
I am trying to debug guest OS through qemu with kvm enabled.
Following is what I have done:
1: fire
On 2013-09-26 20:53, Hu Yaohui wrote:
Hi Jan,
I am working on some Nested VM related projects. Some other teammates have
made the modifications to the kvm module.
And these modifications cannot cause the misguided INT3?
Most of my work depends on his.
If I could not use Qemu Debug method.
On 2013-09-22 11:53, Gleb Natapov wrote:
On Sun, Sep 22, 2013 at 10:53:14AM +0200, Paolo Bonzini wrote:
Il 22/09/2013 09:42, Gleb Natapov ha scritto:
On Mon, Sep 16, 2013 at 04:06:10PM +0200, Paolo Bonzini wrote:
Paul Gortmaker reported a BUG on preempt-rt kernels, due to taking the
mmu_lock
On 2013-09-17 04:29, Arthur Chunqi Li wrote:
Add some comments on the framework of nested VMX testing, and guides of
how to write new test cases.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.c | 25 +
x86/vmx_tests.c | 13 +
2
On 2013-09-20 20:18, Paul Gortmaker wrote:
On 13-09-20 02:04 PM, Jan Kiszka wrote:
On 2013-09-20 19:51, Paul Gortmaker wrote:
[Re: [PATCH 0/3] KVM: Make kvm_lock non-raw] On 16/09/2013 (Mon 18:12) Paul
Gortmaker wrote:
On 13-09-16 10:06 AM, Paolo Bonzini wrote:
Paul Gortmaker reported
On 2013-09-20 19:51, Paul Gortmaker wrote:
[Re: [PATCH 0/3] KVM: Make kvm_lock non-raw] On 16/09/2013 (Mon 18:12) Paul
Gortmaker wrote:
On 13-09-16 10:06 AM, Paolo Bonzini wrote:
Paul Gortmaker reported a BUG on preempt-rt kernels, due to taking the
mmu_lock within the raw kvm_lock in
On 2013-09-16 16:06, Paolo Bonzini wrote:
Remove the useless argument, and do not do anything if there are no
VMs running at the time of the hotplug.
kvm_cpu_hotplug already filters !kvm_usage_count. If we need the check
to be under kvm_lock, drop that line as well. If that is not required
On 2013-09-16 07:42, Arthur Chunqi Li wrote:
On Sat, Sep 14, 2013 at 1:15 AM, Paolo Bonzini pbonz...@redhat.com wrote:
Il 06/09/2013 04:04, Arthur Chunqi Li ha scritto:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some
On 2013-09-13 19:15, Paolo Bonzini wrote:
Il 06/09/2013 04:04, Arthur Chunqi Li ha scritto:
+preempt_val_l1 = delta_tsc_l1 preempt_scale;
+if (preempt_val_l2 = preempt_val_l1)
+preempt_val_l2 = 0;
+else
+preempt_val_l2 -= preempt_val_l1;
+
On 2013-09-03 13:50, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:06:23PM +0800, Arthur Chunqi Li wrote:
Hi Gleb, Paolo and Jan,
Jan, have you reviewed it? Any ACKs?
I've only reviewed v1, but I scheduled v2 for tonight now.
Jan
Would you please review this series of codes when you can
On 2013-09-09 06:57, Arthur Chunqi Li wrote:
This series of patches provide the framework of nested EPT and some test
cases for nested EPT features.
Arthur Chunqi Li (2):
kvm-unit-tests: VMX: The framework of EPT for nested VMX testing
kvm-unit-tests: VMX: Test cases for nested EPT
On 2013-09-03 10:39, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:32PM +0200, Jan Kiszka wrote:
This job is normally performed by the architectural EFER set service
which we cannot use as it prevents transitions that are valid when
switching between L1 and L2. So open-code the update
On 2013-09-03 11:04, Gleb Natapov wrote:
On Tue, Sep 03, 2013 at 10:51:31AM +0200, Jan Kiszka wrote:
On 2013-09-03 10:39, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:32PM +0200, Jan Kiszka wrote:
This job is normally performed by the architectural EFER set service
which we cannot use
On 2013-09-03 11:32, Alexey Kardashevskiy wrote:
On 09/03/2013 07:29 PM, Peter Maydell wrote:
On 3 September 2013 09:27, Alexey Kardashevskiy a...@ozlabs.ru wrote:
Signed-off-by: Alexey Kardashevskiy a...@ozlabs.ru
---
I need this update as VFIO on PPC64/pseries got in upstream kernel
and
To avoid misinterpreting INACTIVE after migration as old qemu-kvm's
STANDBY, also clear rom_state_paddr when going back to this state.
CC: qemu-sta...@nongnu.org
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
hw/i386/kvmvapic.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/hw/i386
If not caught early, a zero-length ROM will cause a NULL-pointer access
later on in patch_hypercalls when allocating a zero-length ROM copy and
trying to read from it.
CC: qemu-sta...@nongnu.org
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
hw/i386/kvmvapic.c | 11 +--
1 file
ROM layout may change after reset of devices are hotplugged, so we have
to pick up the physical address again when the ROM is initialized. This
is best achieved by resetting the state to INACTIVE.
CC: qemu-sta...@nongnu.org
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
hw/i386/kvmvapic.c
Addresses the issue Daniel reported in
http://thread.gmane.org/gmane.comp.emulators.qemu/231577
CC: qemu-sta...@nongnu.org
Jan Kiszka (3):
kvmvapic: Catch invalid ROM size
kvmvapic: Enter inactive state on hardware reset
kvmvapic: Clear also physical ROM address when entering INACTIVE
On 2013-09-02 11:36, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 11:06:53AM +0200, Jan Kiszka wrote:
On 2013-09-02 10:21, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
Not a typo
-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 1f1da43..b43d1f8 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -8186,7 +8186,7 @@ static void
On 2013-09-02 10:21, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
Not a typo :) That what Avi asked for do during initial nested VMX
review: http://markmail.org/message/hhidqyhbo2mrgxxc
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX
On 2013-09-02 20:09, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context
On 2013-09-02 20:20, Jan Kiszka wrote:
On 2013-09-02 20:09, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT
On 2013-08-28 16:28, Lluís Vilanova wrote:
Hi,
I want to get the following setup, but don't know how (or if it's even
possible):
* A guest VM with two AHCI controllers, with one device each. One of the AHCI
controllers provides the VM's disk (system), while the other provides
another
On 2013-08-28 20:12, Lluís Vilanova wrote:
Jan Kiszka writes:
[...]
Is it possible to give a nested guest direct access to a device on the
guest?
(more specifically, an AHCI controller).
Nope, we are lacking support for emulating or (securely) forwarding
VT-d/IOMMU features to the first
On 2013-08-27 10:29, 缪天翔 wrote:
Hi all
I am doing a research project similar to Turtles using the nested
vmx feature of kvm. In detail, I launch a guest kvm (donated as L1) on
the underlying kvm (donated as L0) and then set up a nested guest
(donated as L2) upon the L1 guest kvm.
The
On 2013-08-25 17:26, Arthur Chunqi Li wrote:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some reasons not emulated by L1, preemption timer value should
be save in such exits.
2. Add support of Save VMX-preemption timer
On 2013-08-24 20:44, root wrote:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some reasons not emulated by L1, preemption timer value should
be save in such exits.
2. Add support of Save VMX-preemption timer value
On 2013-08-08 16:26, Jan Kiszka wrote:
These patches apply on top of kvm.git queue.
Changes in v3:
- rebased over queue
- added Do not set identity page map for L2
- dropped Fix guest CR3 read-back on VM-exit
Jan Kiszka (6):
KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0
On 2013-08-25 09:24, Arthur Chunqi Li wrote:
On Sun, Aug 25, 2013 at 2:44 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-24 20:44, root wrote:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some reasons not emulated
On 2013-08-25 09:37, Abel Gordon wrote:
From: Jan Kiszka jan.kis...@web.de
To: 李春奇 Arthur Chunqi Li yzt...@gmail.com,
Cc: kvm@vger.kernel.org, g...@redhat.com, pbonz...@redhat.com
Date: 25/08/2013 09:44 AM
Subject: Re: [PATCH] KVM: nVMX: Fully support of nested VMX preemption
timer
On 2013-08-25 09:37, Arthur Chunqi Li wrote:
On Sun, Aug 25, 2013 at 3:28 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-25 09:24, Arthur Chunqi Li wrote:
On Sun, Aug 25, 2013 at 2:44 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-24 20:44, root wrote:
This patch contains
On 2013-08-25 09:50, Abel Gordon wrote:
kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:43:12 AM:
From: Jan Kiszka jan.kis...@web.de
To: Abel Gordon/Haifa/IBM@IBMIL,
Cc: g...@redhat.com, kvm@vger.kernel.org, kvm-ow...@vger.kernel.org,
pbonz...@redhat.com, 李春奇 Arthur Chunqi Li yzt
On 2013-08-25 10:04, Abel Gordon wrote:
kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:55:24 AM:
From: Arthur Chunqi Li yzt...@gmail.com
To: Abel Gordon/Haifa/IBM@IBMIL,
Cc: Jan Kiszka jan.kis...@web.de, Gleb Natapov g...@redhat.com,
kvm kvm@vger.kernel.org, kvm-ow...@vger.kernel.org
On 2013-08-25 10:18, Abel Gordon wrote:
kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM:
From: Jan Kiszka jan.kis...@web.de
To: Abel Gordon/Haifa/IBM@IBMIL,
Cc: g...@redhat.com, kvm kvm@vger.kernel.org, pbonz...@redhat.com,
李春奇 Arthur Chunqi Li yzt...@gmail.com
Date: 25/08
On 2013-08-25 10:25, Jan Kiszka wrote:
On 2013-08-25 10:18, Abel Gordon wrote:
kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM:
From: Jan Kiszka jan.kis...@web.de
To: Abel Gordon/Haifa/IBM@IBMIL,
Cc: g...@redhat.com, kvm kvm@vger.kernel.org, pbonz...@redhat.com,
李春奇 Arthur
On 2013-08-25 10:41, Arthur Chunqi Li wrote:
On Sun, Aug 25, 2013 at 4:18 PM, Abel Gordon ab...@il.ibm.com wrote:
kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM:
From: Jan Kiszka jan.kis...@web.de
To: Abel Gordon/Haifa/IBM@IBMIL,
Cc: g...@redhat.com, kvm kvm@vger.kernel.org
On 2013-08-25 11:07, Arthur Chunqi Li wrote:
On Sun, Aug 25, 2013 at 4:53 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-25 10:41, Arthur Chunqi Li wrote:
On Sun, Aug 25, 2013 at 4:18 PM, Abel Gordon ab...@il.ibm.com wrote:
kvm-ow...@vger.kernel.org wrote on 25/08/2013 10:54:13 AM
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for ENT_LOAD_PAT, ENT_LOAD_EFER, EXI_LOAD_PAT,
EXI_SAVE_PAT, EXI_LOAD_EFER, EXI_SAVE_PAT flags in enter/exit
control fields.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.h |7 +++
x86/vmx_tests.c | 185
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add testing for CR0/4 shadowing.
A few sentences on the test strategy would be good.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
lib/x86/vm.h|4 +
x86/vmx_tests.c | 218
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for I/O bitmaps, including corner cases.
Would be good to briefly list the corner cases here.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.h |6 +-
x86/vmx_tests.c | 167
On 2013-08-15 09:40, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:30 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add testing for CR0/4 shadowing.
A few sentences on the test strategy would be good.
Signed-off-by: Arthur Chunqi Li yzt
On 2013-08-15 09:41, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:17 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for ENT_LOAD_PAT, ENT_LOAD_EFER, EXI_LOAD_PAT,
EXI_SAVE_PAT, EXI_LOAD_EFER, EXI_SAVE_PAT flags in enter/exit
control
On 2013-08-15 09:51, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:40 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for I/O bitmaps, including corner cases.
Would be good to briefly list the corner cases here.
Signed-off-by: Arthur
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for instruction interception, including three types:
1. Primary Processor-Based VM-Execution Controls (HLT/INVLPG/MWAIT/
RDPMC/RDTSC/MONITOR/PAUSE)
2. Secondary Processor-Based VM-Execution Controls (WBINVD)
3. No control flag
On 2013-08-15 09:59, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:47 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 09:40, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:30 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add testing for CR0
On 2013-08-15 10:05, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:48 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 09:41, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:17 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases
On 2013-08-15 10:09, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:58 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 09:51, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:40 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for I
On 2013-08-15 10:16, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 4:06 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases for instruction interception, including three types:
1. Primary Processor-Based VM-Execution Controls (HLT/INVLPG/MWAIT
On 2013-08-15 10:20, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 4:13 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 10:09, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 3:58 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 09:51, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013
On 2013-08-15 10:35, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 4:20 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 10:16, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 4:06 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-13 17:56, Arthur Chunqi Li wrote:
Add test cases
On 2013-08-15 10:48, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 4:40 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 10:35, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013 at 4:20 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-15 10:16, Arthur Chunqi Li wrote:
On Thu, Aug 15, 2013
Now that cpu_in/out is just a wrapper around address_space_rw, we can
also call the latter directly. As host endianness == guest endianness,
there is no need for the memory access helpers st*_p/ld*_p as well.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-all.c | 28
On 2013-08-11 10:25, Paolo Bonzini wrote:
Il 11/08/2013 09:10, Jan Kiszka ha scritto:
From: Jan Kiszka jan.kis...@siemens.com
Add decoding for INVEPT and reorder the list according to the reason
numbers.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Applies on top of queue
Add decoding for INVEPT and reorder the list according to the reason
numbers.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Err - yeah...
arch/x86/include/uapi/asm/vmx.h |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/uapi/asm/vmx.h b/arch
On 2013-08-12 17:24, Chris Metcalf wrote:
This change provides the initial framework support for KVM on tilegx.
Basic virtual disk and networking is supported.
Signed-off-by: Chris Metcalf cmetc...@tilera.com
---
...
diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h
index
From: Jan Kiszka jan.kis...@siemens.com
Add decoding for INVEPT and reorder the list according to the reason
numbers.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Applies on top of queue.
arch/x86/include/uapi/asm/vmx.h |5 +++--
1 files changed, 3 insertions(+), 2 deletions
From: Jan Kiszka jan.kis...@siemens.com
Allows to parse the result even if the KVM plugin does not yet
understand a specific exit code.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
plugin_kvm.c | 12
1 files changed, 8 insertions(+), 4 deletions(-)
diff --git
From: Jan Kiszka jan.kis...@siemens.com
Aligns us with latest arch/x86/include/uapi/asm/vmx.h.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
plugin_kvm.c |9 -
1 files changed, 8 insertions(+), 1 deletions(-)
diff --git a/plugin_kvm.c b/plugin_kvm.c
index 9b376d8..8a25cf1
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
unconditionally, so we always find the current L2 value in the
architectural state.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff
Now that we provide EPT support, there is no reason to torture our
guests by hiding the relieving unrestricted guest mode feature. We just
need to relax CR0 checks for always-on bits as PE and PG can now be
switched off.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c
These patches apply on top of kvm.git queue.
Changes in v3:
- rebased over queue
- added Do not set identity page map for L2
- dropped Fix guest CR3 read-back on VM-exit
Jan Kiszka (6):
KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0 in
load_vmcs12_host_state
KVM: nVMX: Do not set
Fiddling with CR3 for L2 is L1's job. It may set its own, different
identity map or simple leave it alone if unrestricted guest mode is
enabled. This also fixes reading back the current CR3 on L2 exits for
reporting it to L1.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
state transition that may prevent loading L1's cr0.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX. This will
cause spurious faults for L2.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86
This job is normally performed by the architectural EFER set service
which we cannot use as it prevents transitions that are valid when
switching between L1 and L2. So open-code the update of base_role.nxe
after changing EFER on VM-entry and exit.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
On 2013-08-07 14:39, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:53, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:04, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06
On 2013-08-07 15:54, Paolo Bonzini wrote:
On 08/07/2013 03:38 PM, Gleb Natapov wrote:
On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 44494ed..60a3644 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@
On 2013-08-05 13:40, Gleb Natapov wrote:
On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 4:07 PM, Gleb Natapov g...@redhat.com wrote:
From: Nadav Har'El n...@il.ibm.com
Recent KVM, since
http://kerneltrap.org/mailarchive/linux-kvm/2010/5/2/6261577
On 2013-08-06 09:51, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
On 2013-08-05 13:40, Gleb Natapov wrote:
On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 4:07 PM, Gleb Natapov g...@redhat.com wrote:
From: Nadav
On 2013-08-05 10:07, Gleb Natapov wrote:
From: Yang Zhang yang.z.zh...@intel.com
Inject nEPT fault to L1 guest. This patch is original from Xinhao.
Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu
On 2013-08-06 10:00, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 09:55:09AM +0200, Jan Kiszka wrote:
On 2013-08-06 09:51, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
On 2013-08-05 13:40, Gleb Natapov wrote:
On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur
On 2013-08-05 10:07, Gleb Natapov wrote:
From: Nadav Har'El n...@il.ibm.com
Advertise the support of EPT to the L1 guest, through the appropriate MSR.
This is the last patch of the basic Nested EPT feature, so as to allow
bisection through this patch series: The guest will not see EPT
From: Jan Kiszka jan.kis...@siemens.com
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
unconditionally, so we always find the current L2 value in the
architectural state.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |4 +++-
1 files changed
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT is enabled, the L2 guest may change CR3 without any exits.
We therefore have to read the current value from the VMCS when switching
to L1. However, if paging wasn't enabled, L0 tracks L2's CR3, and
GUEST_CR3 rather contains the real-mode
These patches apply on top of nEPT v7.
Changes in v2:
- rebased over v7
- added patch to fix VM_ENTRY_IA32E_MODE reporting
Jan Kiszka (8):
KVM: nEPT: Advertise WB type EPTP
KVM: nVMX: Fix up VM_ENTRY_IA32E_MODE control feature reporting
KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0
From: Jan Kiszka jan.kis...@siemens.com
This job is normally performed by the architectural EFER set service
which we cannot use as it prevents transitions that are valid when
switching between L1 and L2. So open-code the update of base_role.nxe
after changing EFER on VM-entry and exit.
Signed
From: Jan Kiszka jan.kis...@siemens.com
At least WB must be possible.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Reviewed-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm
From: Jan Kiszka jan.kis...@siemens.com
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX. This will
cause spurious faults for L2.
Signed-off-by: Jan
From: Jan Kiszka jan.kis...@siemens.com
Now that we provide EPT support, there is no reason to torture our
guests by hiding the relieving unrestricted guest mode feature. We just
need to relax CR0 checks for always-on bits as PE and PG can now be
switched off.
Signed-off-by: Jan Kiszka jan.kis
From: Jan Kiszka jan.kis...@siemens.com
Do not report that we can enter the guest in 64-bit mode if the host is
32-bit only. This is not supported by KVM.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |6 +-
1 files changed, 5 insertions(+), 1 deletions
From: Jan Kiszka jan.kis...@siemens.com
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
state transition that may prevent loading L1's cr0.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1 deletions
On 2013-08-06 12:12, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT is enabled, the L2 guest may change CR3 without any exits.
We therefore have to read the current value from the VMCS when switching
to L1
On 2013-08-06 12:41, Arthur Chunqi Li wrote:
Advertise VM_EXIT_SAVE_IA32_PAT and VM_EXIT_LOAD_IA32_PAT.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
arch/x86/kvm/vmx.c | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/vmx.c
at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT is enabled, the L2 guest may change CR3 without any
exits. We therefore have to read the current value from the VMCS
when switching to L1. However, if paging wasn't enabled, L0 tracks
L2's CR3
On 2013-08-06 17:53, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:04, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 02:12:51PM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06
On 2013-08-05 04:19, Arthur Chunqi Li wrote:
On Sun, Aug 4, 2013 at 11:17 PM, Jan Kiszka jan.kis...@web.de wrote:
From: Jan Kiszka jan.kis...@siemens.com
When asking vmx to load the PAT MSR for us while switching from L1 to L2
or vice versa, we have to update arch.pat as well as it may later
On 2013-08-05 09:21, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 1:49 AM, Jan Kiszka jan.kis...@web.de wrote:
From: Jan Kiszka jan.kis...@siemens.com
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
unconditionally, so we always find the current L2 value
On 2013-08-05 11:36, Gmail wrote:
On Mon, Aug 05, 2013 at 05:10:35PM +0800, Arthur Chunqi Li wrote:
Advertise VM_EXIT_SAVE_IA32_PAT and VM_EXIT_LOAD_IA32_PAT.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
arch/x86/kvm/vmx.c |3 ++-
1 file changed, 2 insertions(+), 1
On 2013-08-05 13:00, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 6:55 PM, Gleb Natapov g...@redhat.com wrote:
On Mon, Aug 05, 2013 at 12:38:32PM +0200, Jan Kiszka wrote:
On 2013-08-05 11:36, Gmail wrote:
On Mon, Aug 05, 2013 at 05:10:35PM +0800, Arthur Chunqi Li wrote:
Advertise
On 2013-08-01 16:08, Gleb Natapov wrote:
Another day -- another version of the nested EPT patches. In this version
included fix for need_remote_flush() with shadowed ept, set bits 6:8
of exit_qualification during ept_violation, update_permission_bitmask()
made to work with shadowed ept pages
On 2013-08-04 15:44, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 12:53:56PM +0300, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 12:32:06PM +0300, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 11:24:41AM +0200, Jan Kiszka wrote:
On 2013-08-01 16:08, Gleb Natapov wrote:
Another day -- another
From: Jan Kiszka jan.kis...@siemens.com
When asking vmx to load the PAT MSR for us while switching from L1 to L2
or vice versa, we have to update arch.pat as well as it may later be
used again to load or read out the MSR content.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Arthur
On 2013-08-04 18:15, Xiao Guangrong wrote:
On Aug 4, 2013, at 11:14 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-04 15:44, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 12:53:56PM +0300, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 12:32:06PM +0300, Gleb Natapov wrote:
On Sun, Aug 04
On 2013-07-31 11:22, Arthur Chunqi Li wrote:
Reconstruct VMX codes and put all VMX test suites in x86/vmx_tests.c.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
config-x86-common.mak |2 +-
x86/vmx.c | 71
+++--
On 2013-08-04 19:18, Arthur Chunqi Li wrote:
diff --git a/x86/vmx.h b/x86/vmx.h
index d80e000..f82bf5a 100644
--- a/x86/vmx.h
+++ b/x86/vmx.h
@@ -1,5 +1,5 @@
-#ifndef __HYPERVISOR_H
-#define __HYPERVISOR_H
+#ifndef __VMX_H
+#define __VMX_H
#include libcflat.h
@@ -41,7 +41,7 @@ struct
401 - 500 of 4622 matches
Mail list logo