Re: [PATCH v3 00/27] Enable FRED with KVM VMX
From: Sean Christopherson
Date: Tue Feb 25 2025 - 10:26:24 EST
On Tue, Feb 18, 2025, Xin Li wrote:
> On 9/30/2024 10:00 PM, Xin Li (Intel) wrote:
> While I'm waiting for the CET patches for native Linux and KVM to be
> upstreamed, do you think if it's worth it for you to take the cleanup
> and some of the preparation patches first?
Yes, definitely. I'll go through the series and see what I can grab now.
Thanks!
> Top of my mind are:
> KVM: x86: Use a dedicated flow for queueing re-injected exceptions
> KVM: VMX: Don't modify guest XFD_ERR if CR0.TS=1
> KVM: VMX: Pass XFD_ERR as pseudo-payload when injecting #NM
> KVM: nVMX: Add a prerequisite to existence of VMCS fields
> KVM: nVMX: Add a prerequisite to SHADOW_FIELD_R[OW] macros
>
> Then specially, the nested exception tracking patch seems a good one as
> Chao Gao suggested to decouple the nested tracking from FRED:
> KVM: VMX: Virtualize nested exception tracking
>
> Lastly the patches to add support for the secondary VM exit controls might
> go in early as well:
> KVM: VMX: Add support for the secondary VM exit controls
> KVM: nVMX: Add support for the secondary VM exit controls
>
> But if you don't like the idea please just let me know.
>
> Thanks!
> Xin