RE: [PATCH] KVM: PPC: Not optimizing MSR_CE and MSR_DE with paravirt.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: kvm-ppc-owner@xxxxxxxxxxxxxxx [mailto:kvm-ppc-
> owner@xxxxxxxxxxxxxxx] On Behalf Of Alexander Graf
> Sent: Wednesday, May 16, 2012 6:18 PM
> To: Sethi Varun-B16395
> Cc: Bhushan Bharat-R65777; kvm-ppc@xxxxxxxxxxxxxxx
> Subject: Re: [PATCH] KVM: PPC: Not optimizing MSR_CE and MSR_DE with
> paravirt.
> 
> On 05/16/2012 02:27 PM, Sethi Varun-B16395 wrote:
> >
> >> -----Original Message-----
> >> From: kvm-ppc-owner@xxxxxxxxxxxxxxx [mailto:kvm-ppc-
> >> owner@xxxxxxxxxxxxxxx] On Behalf Of Alexander Graf
> >> Sent: Wednesday, May 16, 2012 2:42 PM
> >> To: Bhushan Bharat-R65777
> >> Cc: kvm-ppc@xxxxxxxxxxxxxxx
> >> Subject: Re: [PATCH] KVM: PPC: Not optimizing MSR_CE and MSR_DE with
> >> paravirt.
> >>
> >> On 05/16/2012 10:42 AM, Bhushan Bharat-R65777 wrote:
> >>>> -----Original Message-----
> >>>> From: kvm-ppc-owner@xxxxxxxxxxxxxxx
> >>>> [mailto:kvm-ppc-owner@xxxxxxxxxxxxxxx] On Behalf Of Alexander Graf
> >>>> Sent: Tuesday, May 15, 2012 8:01 PM
> >>>> To: Bhushan Bharat-R65777
> >>>> Cc: kvm-ppc@xxxxxxxxxxxxxxx; Bhushan Bharat-R65777
> >>>> Subject: Re: [PATCH] KVM: PPC: Not optimizing MSR_CE and MSR_DE
> >>>> with
> >> paravirt.
> >>>> On 05/15/2012 09:37 AM, Bharat Bhushan wrote:
> >>>>> From: Bhushan Bharat-R65777<R65777@xxxxxxxxxxxxx>
> >>>>>
> >>>>> If there is pending critical or machine check interrupt then guest
> >>>>> would like to capture it when guest enable MSR.CE and MSR_ME
> >> respectively.
> >>>>> Also as mostly MSR_CE and MSR_ME are updated with rfi/rfci/rfmii
> >>>>> which anyway traps so removing the the paravirt optimization for
> >>>>> MSR.CE and MSR.ME.
> >>>> It's only not safe for e500mc and above, right?
> >>> For e500mc and above the paravirt emulation code will not come into
> >> picture, And critical and machine check interrupt will happen only if
> >> MSR have corresponding bits set. So they are already safe. Is not it?
> >>
> >> Yup, though it might be worth documenting the fact with a few
> >> #ifdef's, in case anyone wants to run PR KVM on e500mc ever.
> >>
> > Synchronous error report machine checks don't depend on MSR[ME] in case
> of e500mc.
> >
> >>>> E500v2 and book3s should be
> >>>> fine.
> >>> And with this patch e500v2 will be fine? Not sure of book3s :).
> >> Well, e500v2 has edge triggered MCs, no? MSR.CE is unsafe however, as
> >> criticals are basically the same as externals.
> >>
> > In case of e500v2 machine check would be reported if MSR[ME], but if
> > MSR[ME] is not set the core would enter a check stop state. Yes,
> machine checks on e500v2 are edge triggered.
> > Why is MSR[CE] unsafe?
> 
> MSR=0
> * critical interrupt comes in *
> mtmsr(MSR_CE)
> --> MSR == MSR_CE
> * interrupt should be delivered, but host doesn't get notified that
> MSR_CE is changing *
> 
> However, we completely ignore critical interrupts in KVM these days, no?
> 
Well, it's least likely that MSR_CE/MSR_ME would get changed directly. They would
mostly get changed via rfci/rfmci, which would trap.

-Varun

--
To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM Development]     [KVM ARM]     [KVM ia64]     [Linux Virtualization]     [Linux USB Devel]     [Linux Video]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Big List of Linux Books]

  Powered by Linux