From: Avi Kivity <avi@redhat.com>
To: Gleb Natapov <gleb@redhat.com>
Cc: mtosatti@redhat.com, kvm@vger.kernel.org
Subject: Re: [PATCH 2/2] KVM: VMX: Initialize vm86 TSS only once.
Date: Sun, 27 Feb 2011 17:58:54 +0200 [thread overview]
Message-ID: <4D6A74BE.6020303@redhat.com> (raw)
In-Reply-To: <20110227155219.GA22252@redhat.com>
On 02/27/2011 05:52 PM, Gleb Natapov wrote:
> >
> > According to my reading of the code, if KVM_SET_TSS_ADDR is not
> > invoked, the guest would fail both before and after the patch, yes?
> >
> Hmmm. Actually no. Before the patch guest that doesn't use KVM_SET_TSS_ADDR
> will use the top of slot zero. Should I fix that (how?), or should we
> drop support for those old guests?
I don't think we have a problem with older qemus, but perhaps we do with
non-qemu users. The API clearly requires the ioctl to be called, but I
don't think we can blame anyone for forgetting to do so, especially if
it worked silently.
> The problem with using top of slot
> zero is that this memory is available for guest use and we do not even
> put it into e820 map as far as I see. Also there are patches floating
> around that re-arrange memslots or even put them in a tree. They will
> break old guests too.
Well, slot 0 still exists even if it is moved somewhere else.
Something we can do is put the tss slot just below the highest slot that
is still below 4G, and hope there is no mmio there. Once the user
issues KVM_SET_TSS_ADDR, use that. We'll have to keep juggling that
slot as the user creates more slots, icky.
--
error compiling committee.c: too many arguments to function
next prev parent reply other threads:[~2011-02-27 15:58 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-02-21 10:07 [PATCH 1/2] KVM: VMX: write new TR selector value into vmcs immediately if it changes during vm86 mode Gleb Natapov
2011-02-21 10:07 ` [PATCH 2/2] KVM: VMX: Initialize vm86 TSS only once Gleb Natapov
2011-02-27 15:43 ` Avi Kivity
2011-02-27 15:52 ` Gleb Natapov
2011-02-27 15:58 ` Avi Kivity [this message]
2011-02-27 16:04 ` Avi Kivity
2011-02-27 16:27 ` Gleb Natapov
2011-02-27 16:31 ` Avi Kivity
2011-02-27 16:58 ` Gleb Natapov
2011-02-27 16:12 ` Gleb Natapov
2011-02-27 16:18 ` Avi Kivity
2011-02-27 15:38 ` [PATCH 1/2] KVM: VMX: write new TR selector value into vmcs immediately if it changes during vm86 mode Avi Kivity
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4D6A74BE.6020303@redhat.com \
--to=avi@redhat.com \
--cc=gleb@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox