kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Avi Kivity <avi@redhat.com>
To: kvm@vger.kernel.org
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Subject: [PATCH v2 0/5] Fix EFER.NX=0 with EPT
Date: Sun,  2 May 2010 12:48:49 +0300	[thread overview]
Message-ID: <1272793734-455-1-git-send-email-avi@redhat.com> (raw)

Currently we run with EFER.NX=1 on the guest even if the guest value is 0.
This is fine with shadow, since we check bit 63 when instantiating a page
table, and fault if bit 63 is set while EFER.NX is clear.

This doesn't work with EPT, since we no longer get the change to check guest
ptes.  So we need to run with EFER.NX=0.

This is complicated by the fact that if we switch EFER.NX on the host, we'll
trap immediately, since some host pages are mapped with the NX bit set.  As
a result, we need to switch the MSR atomically during guest entry and exit.

This patchset implements the complications described above.

v2:
    Fix transition from long mode to legacy mode

Avi Kivity (5):
  KVM: Let vcpu structure alignment be determined at runtime
  KVM: VMX: Add definition for msr autoload entry
  KVM: VMX: Add definitions for guest and host EFER autoswitch vmcs
    entries
  KVM: VMX: Add facility to atomically switch MSRs on guest entry/exit
  KVM: VMX: Atomically switch efer if EPT && !EFER.NX

 arch/ia64/kvm/vmm.c        |    2 +-
 arch/powerpc/kvm/44x.c     |    2 +-
 arch/powerpc/kvm/book3s.c  |    3 +-
 arch/powerpc/kvm/e500.c    |    2 +-
 arch/s390/kvm/kvm-s390.c   |    2 +-
 arch/x86/include/asm/vmx.h |   12 +++++++-
 arch/x86/kvm/svm.c         |    2 +-
 arch/x86/kvm/vmx.c         |   64 +++++++++++++++++++++++++++++++++++++++++++-
 include/linux/kvm_host.h   |    2 +-
 virt/kvm/kvm_main.c        |    7 +++--
 10 files changed, 86 insertions(+), 12 deletions(-)


             reply	other threads:[~2010-05-02  9:48 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-05-02  9:48 Avi Kivity [this message]
2010-05-02  9:48 ` [PATCH v2 1/5] KVM: Let vcpu structure alignment be determined at runtime Avi Kivity
2010-05-02  9:48 ` [PATCH v2 2/5] KVM: VMX: Add definition for msr autoload entry Avi Kivity
2010-05-02  9:48 ` [PATCH v2 3/5] KVM: VMX: Add definitions for guest and host EFER autoswitch vmcs entries Avi Kivity
2010-05-02  9:48 ` [PATCH v2 4/5] KVM: VMX: Add facility to atomically switch MSRs on guest entry/exit Avi Kivity
2010-05-02  9:48 ` [PATCH v2 5/5] KVM: VMX: Atomically switch efer if EPT && !EFER.NX Avi Kivity
2010-05-06 19:43 ` [PATCH v2 0/5] Fix EFER.NX=0 with EPT Marcelo Tosatti

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1272793734-455-1-git-send-email-avi@redhat.com \
    --to=avi@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=mtosatti@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).