Re: [PATCH] KVM: PPC: Not optimizing MSR_CE and MSR_DE with paravirt.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 05/16/2012 10:13 AM, Sethi Varun-B16395 wrote:
>>> Why is MSR[CE] unsafe?
>>
>> MSR=0
>> * critical interrupt comes in *
>> mtmsr(MSR_CE)
>> --> MSR == MSR_CE
>> * interrupt should be delivered, but host doesn't get notified that
>> MSR_CE is changing *
>>
>> However, we completely ignore critical interrupts in KVM these days, no?

Watchdog will use them.

> Well, it's least likely that MSR_CE/MSR_ME would get changed directly. They would
> mostly get changed via rfci/rfmci, which would trap.

It being unlikely means that there's little performance downside to this
patch -- it doesn't mean that this patch is unnecessary.

FWIW, Topaz directly manipulates MSR[CE] extensively, since it uses
critical interrupts as its main interrupts (to distinguish from EE
interrupts which are delivered directly to the guest).

-Scott

--
To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM Development]     [KVM ARM]     [KVM ia64]     [Linux Virtualization]     [Linux USB Devel]     [Linux Video]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Big List of Linux Books]

  Powered by Linux