[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200622220442.21998-1-peterx@redhat.com>
Date: Mon, 22 Jun 2020 18:04:40 -0400
From: Peter Xu <peterx@...hat.com>
To: linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Cc: Sean Christopherson <sean.j.christopherson@...el.com>,
Paolo Bonzini <pbonzini@...hat.com>, peterx@...hat.com,
Vitaly Kuznetsov <vkuznets@...hat.com>
Subject: [PATCH 0/2] KVM: X86: A few fixes around ignore_msrs
Currently ignore_msrs and report_ignored_msrs have a few issues:
- Errors could be dumped to dmesg even if the msr access is triggered inside
kvm itself (e.g., kvm_cpuid), while what we really want to trap should be
either guest msr accesses, or KVM_SET_MSRS.
- These two parameters didn't apply to feature msrs.
Each of the patch in this series tries to handle one of the issues.
Here KVM_MSR_RET_INVALID is introduced. Ideally it can be an enum with both
0/1 defined too, but I'll see whether there's any feedback first about this
version.
This originates from a discussion between Paolo and me on an unexpected warning
msr access message that triggered on a RT system, which seemed to have caused
some system jitters.
Please have a look, thanks.
Peter Xu (2):
KVM: X86: Move ignore_msrs handling upper the stack
KVM: X86: Do the same ignore_msrs check for feature msrs
arch/x86/kvm/svm/svm.c | 2 +-
arch/x86/kvm/vmx/vmx.c | 2 +-
arch/x86/kvm/x86.c | 90 +++++++++++++++++++++++++++++-------------
arch/x86/kvm/x86.h | 2 +
4 files changed, 66 insertions(+), 30 deletions(-)
--
2.26.2
Powered by blists - more mailing lists