From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9CD5BC43381 for ; Mon, 25 Mar 2019 17:16:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 5EE0320879 for ; Mon, 25 Mar 2019 17:16:52 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=alien8.de header.i=@alien8.de header.b="Mpvxkj1d" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729693AbfCYRQv (ORCPT ); Mon, 25 Mar 2019 13:16:51 -0400 Received: from mail.skyhub.de ([5.9.137.197]:35916 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726024AbfCYRQt (ORCPT ); Mon, 25 Mar 2019 13:16:49 -0400 Received: from zn.tnic (p200300EC2F098000329C23FFFEA6A903.dip0.t-ipconnect.de [IPv6:2003:ec:2f09:8000:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 4BFB71EC0AB1; Mon, 25 Mar 2019 18:16:48 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1553534208; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references; bh=iSerMWostZAc1RefdTw4EsORVEwtNKKczq+lUEXWLCg=; b=Mpvxkj1dQIkNqpJyG9SCTWkW2WZRyOIQcmAtIneANqQc5WpqzvCVj3CETUrDP35iiqkHRP ++z8V/Jofcpn4xcqlLQZ38jcVvNHnp3sfxv7DDFIdT9Szm0RHfCApYriyNWFVSteshMZHs OzURFkYcOGw/8cYkDJHqMoeh93Cm8v4= From: Borislav Petkov To: KVM Cc: Joerg Roedel , Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Tom Lendacky , Tony Luck , Yazen Ghannam , LKML Subject: [PATCH v4 0/2] x86/kvm: Enable MCE injection in the guest Date: Mon, 25 Mar 2019 18:16:47 +0100 Message-Id: <20190325171649.7311-1-bp@alien8.de> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Borislav Petkov Hi, so AFAIR this got applied before the merge window but it is not upstream. Very strange. So let me send it again, might get more lucky this time. Rebased ontop of 5.1-rc1. Please apply, thanks. Changelog: ========== v3: here's a rediff ontop of -rc2. No changes, only added Yazen's Tested-by. v2: here's v2, dropping patch 3 and incorporating hopefully all of Radim's feedback. v1: there's this mce-inject.ko module in the kernel which allows for injecting real MCEs and thus test the MCE handling code. It is doubly useful to be able to inject same MCEs in a guest so that testing of the MCE handling code can happen even easier/faster. In order to be able to do that on an AMD guest, we need to emulate some bits and pieces like the HWCR[McStatusWrEn] bit which allows writes to the MCi_STATUS registers without a #GP. The below does that and with it I'm able to properly inject MCEs in said guest. Borislav Petkov (2): kvm/x86: Move MSR_K7_HWCR to svm.c x86/kvm: Implement MSR_HWCR support arch/x86/kvm/svm.c | 20 ++++++++++++++++++++ arch/x86/kvm/x86.c | 46 +++++++++++++++++++++++++++++++--------------- 2 files changed, 51 insertions(+), 15 deletions(-) -- 2.21.0