[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC 3/9] xen: Force-enable relevant MSR events; optimize the number of sent MSR events
>>> On 02.07.14 at 17:35, <andrew.cooper3@xxxxxxxxxx> wrote: > On 02/07/14 14:33, Razvan Cojocaru wrote: >> @@ -700,6 +700,25 @@ void vmx_disable_intercept_for_msr(struct vcpu *v, u32 >> msr, int type) >> if ( msr_bitmap == NULL ) >> return; >> >> + /* Filter out MSR-s needed by the memory introspection engine */ >> + switch ( msr ) >> + { >> + case MSR_IA32_SYSENTER_EIP: >> + case MSR_IA32_SYSENTER_ESP: >> + case MSR_IA32_SYSENTER_CS: >> + case MSR_IA32_MC0_CTL: >> + case MSR_STAR: >> + case MSR_LSTAR: >> + > > Given the performance implications of forcing interception of these > MSRs, it would be gated on mem_access being active for the domain. Absolutely. >> + printk("Warning: cannot disable the interception of MSR " >> + "0x%08x because it is needed by the memory introspection " >> + "engine\n", msr); >> + return; > > gdprintk() please, and a rather shorter message. Not sure about gdprintk() - we neither need the file/line to be printed here, nor am I sure that v == current (or else the dom/vcpu printed would be wrong), but this should clearly be XENLOG_DEBUG and abbreviated as much as possible without making it meaningless. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |