mbox series

[0/7] KVM: x86: AVIC/APICv patch queue

Message ID 20220606180829.102503-1-mlevitsk@redhat.com (mailing list archive)
Headers show
Series KVM: x86: AVIC/APICv patch queue | expand

Message

Maxim Levitsky June 6, 2022, 6:08 p.m. UTC
This patch series contains a few fixes that I worked on
recently.

Also included another attempt to add inhibit
when the guest had changed apic id and/or apic base.

I also tested AVIC with full preemption and
found few bugs, which are now hopefully fixed.

Best regards,
	Maxim Levitsky

Maxim Levitsky (7):
  KVM: x86: document AVIC/APICv inhibit reasons
  KVM: x86: inhibit APICv/AVIC when the guest and/or host changes either
    apic id or the apic base from their default values.
  KVM: x86: SVM: remove avic's broken code that updated APIC ID
  KVM: x86: SVM: fix avic_kick_target_vcpus_fast
  KVM: x86: disable preemption while updating apicv inhibition
  KVM: x86: disable preemption around the call to
    kvm_arch_vcpu_{un|}blocking
  KVM: x86: SVM: there is no need for preempt safe wrappers for
    avic_vcpu_load/put

 arch/x86/include/asm/kvm_host.h |  68 ++++++++++++-
 arch/x86/kvm/lapic.c            |  27 ++++-
 arch/x86/kvm/svm/avic.c         | 171 ++++++++++++++------------------
 arch/x86/kvm/svm/svm.c          |   4 +-
 arch/x86/kvm/svm/svm.h          |   4 +-
 arch/x86/kvm/vmx/vmx.c          |   4 +-
 arch/x86/kvm/x86.c              |   2 +
 virt/kvm/kvm_main.c             |   8 +-
 8 files changed, 180 insertions(+), 108 deletions(-)