From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from [140.186.70.92] (port=58918 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PZnlE-0007fl-Ua for qemu-devel@nongnu.org; Mon, 03 Jan 2011 11:59:58 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1PZnlC-0006Q4-DU for qemu-devel@nongnu.org; Mon, 03 Jan 2011 11:59:55 -0500 Received: from mx1.redhat.com ([209.132.183.28]:47141) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1PZnlC-0006Pl-60 for qemu-devel@nongnu.org; Mon, 03 Jan 2011 11:59:54 -0500 Message-ID: <4D220085.3040200@redhat.com> Date: Mon, 03 Jan 2011 18:59:49 +0200 From: Avi Kivity MIME-Version: 1.0 References: <4D21F416.9090300@redhat.com> <4D21FECD.9000103@web.de> In-Reply-To: <4D21FECD.9000103@web.de> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: [Qemu-devel] Re: [PATCH v2 16/17] kvm: x86: Rework identity map and TSS setup for larger BIOS sizes List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Jan Kiszka Cc: Jan Kiszka , Marcelo Tosatti , qemu-devel@nongnu.org, kvm@vger.kernel.org On 01/03/2011 06:52 PM, Jan Kiszka wrote: > Am 03.01.2011 17:06, Avi Kivity wrote: > > On 01/03/2011 10:33 AM, Jan Kiszka wrote: > >> From: Jan Kiszka > >> > >> First of all, we only need this EPT identity and TSS reservation on > >> Intel CPUs. > > > > kvm-amd will ignore it just fine. I'd like to keep arch differences > > away from userspace. > > And I would prefer to avoid needlessly cluttering the physical guest > address space where not needed. Long term, we could even give user space > a hint (unless it can test it directly) that this workaround is no > longer needed as the host Intel CPU supports true real mode. Having different physical address spaces based on the host cpu is bad, even disregarding live migration. If there's a real need, we can do it as an option. I don't see such a need though. We can definitely add a new KVM_CAP for "tss/ept identity supported but not needed". If emulate_invalid_guest_state is eventually fully implemented and becomes the default, it will even be true across the board. > > > >> Then, in order to support loading BIOSes> 256K, reorder the > >> code, adjusting the base if the kernel supports moving the identity map. > >> We can drop the check for KVM_CAP_SET_TSS_ADDR as we already depend on > >> much newer features. > > > > There is no ordering on kvm features. Each can come and go as it pleases. > > > > Well, at least this is not how kvm upstream works so far. Let's change it then. -- error compiling committee.c: too many arguments to function