From: Gleb Natapov <gleb@redhat.com>
To: Avi Kivity <avi@redhat.com>
Cc: mtosatti@redhat.com, kvm@vger.kernel.org
Subject: Re: [PATCH 2/2] KVM: VMX: Initialize vm86 TSS only once.
Date: Sun, 27 Feb 2011 18:12:39 +0200 [thread overview]
Message-ID: <20110227161239.GB22252@redhat.com> (raw)
In-Reply-To: <4D6A74BE.6020303@redhat.com>
On Sun, Feb 27, 2011 at 05:58:54PM +0200, Avi Kivity wrote:
> On 02/27/2011 05:52 PM, Gleb Natapov wrote:
> >>
> >> According to my reading of the code, if KVM_SET_TSS_ADDR is not
> >> invoked, the guest would fail both before and after the patch, yes?
> >>
> >Hmmm. Actually no. Before the patch guest that doesn't use KVM_SET_TSS_ADDR
> >will use the top of slot zero. Should I fix that (how?), or should we
> >drop support for those old guests?
>
> I don't think we have a problem with older qemus, but perhaps we do
> with non-qemu users. The API clearly requires the ioctl to be
> called, but I don't think we can blame anyone for forgetting to do
> so, especially if it worked silently.
>
It may have worked as in "no error returned from KVM_RUN", but if
userspace does not call to KVM_SET_TSS_ADDR kvm silently uses part of
a guest memory to store its data which may cause guest to fail long after
it was started. It is true that for that to happen guest needs to enter
protected mode during its lifetime and not many guests do that usually.
The only cases I can think of are during some guests installation and
S3 suspend/resume.
> >The problem with using top of slot
> >zero is that this memory is available for guest use and we do not even
> >put it into e820 map as far as I see. Also there are patches floating
> >around that re-arrange memslots or even put them in a tree. They will
> >break old guests too.
>
> Well, slot 0 still exists even if it is moved somewhere else.
>
> Something we can do is put the tss slot just below the highest slot
> that is still below 4G, and hope there is no mmio there. Once the
> user issues KVM_SET_TSS_ADDR, use that. We'll have to keep juggling
> that slot as the user creates more slots, icky.
>
I have a question about our current placement of tss addr. Qemu-kvm
places it at 4G-16M and comment says that this is just below BIOS ROM,
but BIOS ROM takes only upper 128K.
--
Gleb.
next prev parent reply other threads:[~2011-02-27 16:12 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-02-21 10:07 [PATCH 1/2] KVM: VMX: write new TR selector value into vmcs immediately if it changes during vm86 mode Gleb Natapov
2011-02-21 10:07 ` [PATCH 2/2] KVM: VMX: Initialize vm86 TSS only once Gleb Natapov
2011-02-27 15:43 ` Avi Kivity
2011-02-27 15:52 ` Gleb Natapov
2011-02-27 15:58 ` Avi Kivity
2011-02-27 16:04 ` Avi Kivity
2011-02-27 16:27 ` Gleb Natapov
2011-02-27 16:31 ` Avi Kivity
2011-02-27 16:58 ` Gleb Natapov
2011-02-27 16:12 ` Gleb Natapov [this message]
2011-02-27 16:18 ` Avi Kivity
2011-02-27 15:38 ` [PATCH 1/2] KVM: VMX: write new TR selector value into vmcs immediately if it changes during vm86 mode Avi Kivity
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20110227161239.GB22252@redhat.com \
--to=gleb@redhat.com \
--cc=avi@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox