From patchwork Tue Sep 4 10:21:55 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Liran Alon X-Patchwork-Id: 10587033 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 50ABA1669 for ; Tue, 4 Sep 2018 10:22:32 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 314F029168 for ; Tue, 4 Sep 2018 10:22:32 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 25A2129170; Tue, 4 Sep 2018 10:22:32 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 8AF6529168 for ; Tue, 4 Sep 2018 10:22:31 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726263AbeIDOq5 (ORCPT ); Tue, 4 Sep 2018 10:46:57 -0400 Received: from aserp2120.oracle.com ([141.146.126.78]:56932 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726066AbeIDOq5 (ORCPT ); Tue, 4 Sep 2018 10:46:57 -0400 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w84AIjk0077702; Tue, 4 Sep 2018 10:22:27 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2018-07-02; bh=y/+On/xsnNNLrYZbnFjyW4iyxioIiiEGwZy9Wub93P4=; b=ErtzSCP1BRRAmOEXGkq8V4mv4g2tCg07XWUoRnFV2JQ3uW99p2dkn3Yt/dzSpp7Wmqvr yMYa9xt5vVkPklCE1nIENQQKhJzRINmXSvsjf3DEtdRuXMg+It3c1MW8TvfMkh0Rbm0p hauCcyAUc2FAVRxW2E6b+FiU/9QC+4PlVBOg0wJVVGtB1DgBs9IOQOEuCAtH+KPOWvbn ov7YlhiwyoKgJIyFKXc+yMUdgXJ1/0wYC64Js1aFub1SyxaPovJqS8i6ZmTDgiM2A2uL b5pDw4Jfgcsnn1pCTcO/QhaKYd/0odARz5VSPQsVEQftO9dRQ9sm3fk1Ws4XnT+Qdgfl LQ== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp2120.oracle.com with ESMTP id 2m7jqpc9j8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 04 Sep 2018 10:22:27 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w84AMLuY005309 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 4 Sep 2018 10:22:21 GMT Received: from abhmp0004.oracle.com (abhmp0004.oracle.com [141.146.116.10]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w84AMLQq024494; Tue, 4 Sep 2018 10:22:21 GMT Received: from spark.ravello.local (/213.57.127.2) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 04 Sep 2018 03:22:21 -0700 From: Liran Alon To: pbonzini@redhat.com, rkrcmar@redhat.com, kvm@vger.kernel.org Cc: idan.brown@oracle.com Subject: [kvm-unit-tests PATCH 0/3]: x86: VMX: Verify blocked vCPU in guest-mode wake when pending interrupt in RVI Date: Tue, 4 Sep 2018 13:21:55 +0300 Message-Id: <20180904102158.120866-1-liran.alon@oracle.com> X-Mailer: git-send-email 2.16.1 X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9005 signatures=668708 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=470 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1809040109 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Hi, This test aims to verify that when entering a guest in HLT activity state but with a pending interrupt in RVI, the guest is in fact not halted and an interrupt is indeed injected. For more information, see commit message of kernel patch "KVM: nVMX: Wake blocked vCPU in guest-mode if pending interrupt in virtual APICv". 1st patch introduce util to disable intercept on x2APIC MSRs. 2nd patch inroduce util to enable virtual interrupt delivery. 3rd patch adds the test itself. Regards, -Liran