[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2 10/13] x86/PMU: Add support for PMU registes handling on PV guests



On 09/25/2013 10:23 AM, Jan Beulich wrote:
On 20.09.13 at 11:42, Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> wrote:
Intercept accesses to PMU MSRs and LVTPC APIC vector (only
APIC_LVT_MASKED bit is processed) and process them in VPMU
module.
Having scrolled through this more than once, I still can't see where
any APIC interception is happening here.

It's not. This commit message is a a leftover from pre-v1 implementation. LVTPC
is now updated via an explicit hypercall.

@@ -2574,6 +2587,24 @@ static int emulate_privileged_op(struct cpu_user_regs 
*regs)
              regs->eax = (uint32_t)msr_content;
              regs->edx = (uint32_t)(msr_content >> 32);
              break;
+        case MSR_IA32_PERF_CAPABILITIES:
+            if ( rdmsr_safe(regs->ecx, msr_content) )
+                goto fail;
+            /* Full-Width Writes not supported */
+            regs->eax = (uint32_t)msr_content & ~(1 << 13);
+            regs->edx = (uint32_t)(msr_content >> 32);
Rather than black listing, please white list know good features
here.

This 'case' is gone after I rebased to latest sources (we implement full-width writes now).

-boris

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.