From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1764632AbcIOKHt (ORCPT ); Thu, 15 Sep 2016 06:07:49 -0400 Received: from smtp.citrix.com ([66.165.176.89]:36849 "EHLO SMTP.CITRIX.COM" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754740AbcIOKHr (ORCPT ); Thu, 15 Sep 2016 06:07:47 -0400 X-IronPort-AV: E=Sophos;i="5.30,338,1470700800"; d="scan'208";a="378479605" Subject: Re: [PATCH v2 2/3] x86 Test and expose CPUID faulting capabilities in /proc/cpuinfo To: Dave Hansen , Kyle Huey , "Robert O'Callahan" References: <1473886902-17902-1-git-send-email-khuey@kylehuey.com> <1473886902-17902-3-git-send-email-khuey@kylehuey.com> <57D9C2AC.8050905@linux.intel.com> CC: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , Boris Ostrovsky , Juergen Gross , Borislav Petkov , "Andy Lutomirski" , Peter Zijlstra , "Huang Rui" , "Rafael J. Wysocki" , Len Brown , Srinivas Pandruvada , Aravind Gopalakrishnan , Alexander Shishkin , Vladimir Zapolskiy , Kristen Carlson Accardi , "open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "moderated list:XEN HYPERVISOR INTERFACE" , Andrew Cooper From: David Vrabel Message-ID: <57DA72E2.2070408@citrix.com> Date: Thu, 15 Sep 2016 11:07:30 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Icedove/38.5.0 MIME-Version: 1.0 In-Reply-To: <57D9C2AC.8050905@linux.intel.com> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-DLP: MIA1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 14/09/16 22:35, Dave Hansen wrote: > On 09/14/2016 02:01 PM, Kyle Huey wrote: >> Xen advertises the underlying support for CPUID faulting but not does pass >> through writes to the relevant MSR, nor does it virtualize it, so it does >> not actually work. For now mask off the relevant bit on MSR_PLATFORM_INFO. > > That needs to make it into a comment, please. > > That *is* a Xen bug, right? This is probably fixed in the latest version of Xen. Andrew Cooper would know for sure. >> --- a/arch/x86/xen/enlighten.c >> +++ b/arch/x86/xen/enlighten.c >> @@ -1050,6 +1050,9 @@ static u64 xen_read_msr_safe(unsigned int msr, int *err) >> #endif >> val &= ~X2APIC_ENABLE; >> break; >> + case MSR_PLATFORM_INFO: >> + val &= ~CPUID_FAULTING_SUPPORT; >> + break; >> } >> return val; >> } > > Does this mean that Xen guests effectively can't take advantage of this > feature? PV guests only. David