public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Avi Kivity <avi@qumranet.com>
To: Alexander Graf <agraf@suse.de>
Cc: Gerd Hoffmann <kraxel@redhat.com>,
	kvm@vger.kernel.org, joro@8bytes.org, anthony@codemonkey.ws
Subject: Re: [PATCH 2/2] Allow the SVM CPUID bit in a VM
Date: Wed, 03 Sep 2008 12:19:44 +0300	[thread overview]
Message-ID: <48BE56B0.5080001@qumranet.com> (raw)
In-Reply-To: <D49DEEAB-4803-44AC-9649-825614A52196@suse.de>

Alexander Graf wrote:
>
> I guess I didn't express myself correctly, sorry for that :-). I think 
> that kvm kernel module capabilities should be masked out in the kernel 
> module, while "other" stuff, like migration masking or additional 
> CPUIDs (do these work atm?) should of course reside in the userspace.

But then userspace needs to know when capabilities userspace actually sees.

>
> The code I was referring to was the removal of the NX bit and the SVM 
> bit. These are definitely kernel capabilities. If the kernel module 
> doesn't implement these, it should just mask them out instead of 
> having userspace figure out what's there and what isn't.

The flow I have in mind is:

- kernel exports which cpuid bits it supports (global information; not 
tied to a guest; this way it can be used to calculate g-c-d)
- userspace merges this information with its own ideas
- userspace tells the kernel what cpuid bits to present to the guest 
(lying is allowed)

This gives the maximum flexibility and visibility.

NX and SVM are masked for backward compatibility with older userspace; 
we could probably remove this masking now.
>
> I hope I didn't completely confuse everybody now :-). On a sidenote: 
> We really need to switch to the newer cpuid kernel<->userspace 
> interface. The way it currently is, CPUID 4 is severely broken.

There is a new interface in place (quite old by now), unfortunately it 
isn't used by qemu.

-- 
error compiling committee.c: too many arguments to function


  reply	other threads:[~2008-09-03  9:19 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-09-01 11:59 [PATCH 0/2] [RFC] Add support for nested SVM (userspace) Alexander Graf
2008-09-01 11:59 ` [PATCH 1/2] Add SVM CPUID feature define for backwards compatibility Alexander Graf
2008-09-01 11:59   ` [PATCH 2/2] Allow the SVM CPUID bit in a VM Alexander Graf
2008-09-01 14:00     ` Avi Kivity
2008-09-02 17:42       ` Alexander Graf
2008-09-02 17:53         ` Alexander Graf
2008-09-02 19:36           ` Itamar Heim
2008-09-03  7:55           ` Gerd Hoffmann
2008-09-03  8:04             ` Alexander Graf
2008-09-03  9:19               ` Avi Kivity [this message]
2008-09-03  9:13         ` Avi Kivity

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=48BE56B0.5080001@qumranet.com \
    --to=avi@qumranet.com \
    --cc=agraf@suse.de \
    --cc=anthony@codemonkey.ws \
    --cc=joro@8bytes.org \
    --cc=kraxel@redhat.com \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox