From mboxrd@z Thu Jan 1 00:00:00 1970 From: Anthony Liguori Subject: Re: Linux in VirtualPC in KVM fails Date: Fri, 09 Jan 2009 13:04:10 -0600 Message-ID: <49679FAA.3000802@codemonkey.ws> References: <4967708E.2060907@suse.de> <49678E6E.4020306@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: Avi Kivity , Kevin Wolf , kvm@vger.kernel.org To: Alexander Graf Return-path: Received: from mail-ew0-f17.google.com ([209.85.219.17]:58812 "EHLO mail-ew0-f17.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752801AbZAITEX (ORCPT ); Fri, 9 Jan 2009 14:04:23 -0500 Received: by ewy10 with SMTP id 10so10388162ewy.13 for ; Fri, 09 Jan 2009 11:04:20 -0800 (PST) In-Reply-To: Sender: kvm-owner@vger.kernel.org List-ID: Alexander Graf wrote: > > Shouldn't it be ok to push patches to linux-stable to use the CPUID > and MSR information and simply not expose the CPUID identification in > newer KVM versions? That way older guests on newer KVM don't use KVM > paravirt (which should still be ok), but everything else runs as > smoothly as possible. I'd say that VirtualPC is broken and leave it at that. All modern hypervisors use CPUID to expose themselves to the guests. VirtualPC is totally capable of rewriting CPUID instructions. Shame on it for not doing so. I don't think we should change anything. Regards, Anthony Liguori > Alex > >> So I suggest: >> - add a new cpuid bit, for 'paravirt verification' >> - if the new bit is present, the guest verifies that paravirt is >> truly enabled by reading an msr (and checking a signature). >> >> Older guests or newer guests running on older hosts will still be >> broken, but there's a command line parameter for disabling paravirt >> on the guest, and we can add one for the host as well. >> >> -- >> I have a truly marvellous patch that fixes the bug which this >> signature is too narrow to contain. >> > > -- > To unsubscribe from this list: send the line "unsubscribe kvm" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html