From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Tosatti Subject: Re: [RFC][PATCH] KVM: nVMX: Leave VMX mode on apparent CPU reset Date: Mon, 30 Dec 2013 18:02:17 -0200 Message-ID: <20131230200217.GA6699@amt.cnet> References: <52AEC8B2.7010602@siemens.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Gleb Natapov , Paolo Bonzini , kvm To: Jan Kiszka Return-path: Received: from mx1.redhat.com ([209.132.183.28]:35123 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932104Ab3L3UGJ (ORCPT ); Mon, 30 Dec 2013 15:06:09 -0500 Content-Disposition: inline In-Reply-To: <52AEC8B2.7010602@siemens.com> Sender: kvm-owner@vger.kernel.org List-ID: On Mon, Dec 16, 2013 at 10:32:34AM +0100, Jan Kiszka wrote: > As long as we do not expose all the VMX related states to user space, > there is no way to properly reset a VCPU when VMX is enabled. Emulate > this for now by catching host-side clearings of the feature control MSR. > This allows to reboot a VM while it is running some hypervisor code. > > Signed-off-by: Jan Kiszka > --- > > Better ideas? Or continue to leave it as it is? The hidden backport might be problematic... How about an explicit notification to leave guest mode? Such as a new flag to KVM_SET_REGS (or even a separate ioctl?).