From mboxrd@z Thu Jan 1 00:00:00 1970 From: Gleb Natapov Subject: Re: [PATCH v4 0/6] KVM: nVMX: Make direct IRQ/NMI injection work Date: Sun, 14 Apr 2013 18:34:19 +0300 Message-ID: <20130414153419.GU17919@redhat.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Marcelo Tosatti , kvm , Paolo Bonzini , "Nadav Har'El" To: Jan Kiszka Return-path: Received: from mx1.redhat.com ([209.132.183.28]:23323 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751877Ab3DNPeY (ORCPT ); Sun, 14 Apr 2013 11:34:24 -0400 Content-Disposition: inline In-Reply-To: Sender: kvm-owner@vger.kernel.org List-ID: On Sun, Apr 14, 2013 at 12:12:44PM +0200, Jan Kiszka wrote: > Changes in this version: > - reworked patch 2, 4 and 5 according to review > - restored clearing of vm_entry_intr_info_field > - no longer read idt_vectoring_info_field from VMCS > - removed check of idt_vectoring_info_field on vmx_nmi_allowed/ > vmx_interrupt_allowed > - added optimization patch 6 > Applied everything except 3 and 5. Thanks. > Jan Kiszka (6): > KVM: nVMX: Fix injection of PENDING_INTERRUPT and NMI_WINDOW exits to > L1 > KVM: nVMX: Rework event injection and recovery > KVM: VMX: Move vmx_nmi_allowed after vmx_set_nmi_mask > KVM: nVMX: Fix conditions for interrupt injection > KVM: nVMX: Fix conditions for NMI injection > KVM: nVMX: Avoid reading VM_EXIT_INTR_ERROR_CODE needlessly on nested > exits > > arch/x86/kvm/vmx.c | 182 ++++++++++++++++++++++++++++++++++----------------- > 1 files changed, 121 insertions(+), 61 deletions(-) > > -- > 1.7.3.4 -- Gleb.