* MSR virtualization
@ 2007-08-08 9:50 Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A01E45F0A-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
0 siblings, 1 reply; 2+ messages in thread
From: Dong, Eddie @ 2007-08-08 9:50 UTC (permalink / raw)
To: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Avi:
We (Yunfeng) encountered some warning from KVM in certain
situation like:
"kvm: 9612: cpu0 unhandled wrmsr: 0xc1"
Further check find that we are doing MSR write virtualization
per a predefined whitelist and give gp fault for others. On the other
hand, Xen just silently return (no gp fault). We may not implement
policy for all MSRs, but not sure if injecting gp fault for them will
cause problem.
Any comments?
thx,eddie
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: MSR virtualization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A01E45F0A-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
@ 2007-08-08 14:13 ` Avi Kivity
0 siblings, 0 replies; 2+ messages in thread
From: Avi Kivity @ 2007-08-08 14:13 UTC (permalink / raw)
To: Dong, Eddie; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Dong, Eddie wrote:
> Avi:
> We (Yunfeng) encountered some warning from KVM in certain
> situation like:
> "kvm: 9612: cpu0 unhandled wrmsr: 0xc1"
> Further check find that we are doing MSR write virtualization
> per a predefined whitelist and give gp fault for others. On the other
> hand, Xen just silently return (no gp fault). We may not implement
> policy for all MSRs, but not sure if injecting gp fault for them will
> cause problem.
>
Silently returning is IMO problematic. If a guest depends on the
correct behavior of some msr, and we mis-emulate it by ignoring it, then
we get a guest failure with no message in the kernel to point us in the
right direction.
In the case of 0xc1, this is the performance counter, likely used for
the nmi watchdog. If we ignore it, the guest kernel will just report a
soft lockup and hang. So there are only two realistic options left:
- printk() and ignore - that is a mis-emulation of writes to msrs that
are supposed to #gp
- printk() and #gp - that is a mis-emulation of writes to msrs that must
be handled. But there are fewer of these than msrs that need to #gp.
So I think the current behavior is best. Unhandled msrs are rare, we
just need to implement them when they happen.
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2007-08-08 14:13 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-08-08 9:50 MSR virtualization Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A01E45F0A-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-08-08 14:13 ` Avi Kivity
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox