RE: [PATCH v3] KVM: x86: Implement PCID/INVPCID for guests with EPT

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Terribly sorry for the late reply. I'm out of work for some unexpected issues the last few weeks.

> >> > So i think that checking whether EPT _and_ VPID are supported
> >> > should be a precondition to enable PCID support for guests.
> >> >
> >>
> >> Should this check be carried out on L0 too? If so, this will add one more
> dependency of PCID on VPID, which doesn't exist in the manual.
> >
> > Actually it is not necessary because L0 cannot access data which is
> > EPT-tagged (and you already require EPT).
> >
> > So it is fine to remove the cpu_has_hypervisor check along with
> > vmx_pcid_supported().
> >
> 
> We can hide INVPCID from the nested guest (by not exposing
> IA32_EPT_VPID_CAP) but we can't avoid exposing PCID.  So we have to be
> sure that if a nested guest sets CR4.PCID, it should work fine.
> 

I'll update the patch so that guest hypervisor can also expose PCID to L2 guests if it is supported.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux