[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v2 1/4] xl: Add support for ignore_msrs option
- To: Julien Grall <julien@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Date: Fri, 22 Jan 2021 13:28:38 -0500
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8p6jx3tEiOYxXxj0F+2LPY38wrFx35eLXL6ZT/xY0TE=; b=hRsZeM9UR6TquLGLvXM4pbklIK9H8Yau6dw+8FrVJEKL+xjrATwm1eNNDY0MAcWWk/Cjh9QgatvUsjsLg/k1kF1TQdrqDGB+Ua3bkol8piLvR12Pl7iffvd1W27zQRb7HzTC5SZ+mV/QK1c/M4Vho2B0wC+b9OzFIjovP7+2UCfqmwA2CeSIam5GOh5Eez9N1anAJHj9bm7ZWduOL6V5mzos96wXp6MzGGgkuE2oy21coTSrw7oWE8pngoppR+yd8VwF4K/OuyK1kyFDiaySVgQfyvo8MVJR7Fyl5POXbQNxrEI3PWM+Uuga04iGh8Q5L0v1OzrjEKKenVqUXprqPw==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AGkwXs6bpleyITky9cQ2aNTac/y+t6FAek9NBVVYcLF+1ixoAOihZr0+8fwboW+kn2DPlNNxBplYQUCs+9BAbTTO9iqnfYg/YtZcmnR9T1w9fihT44Am5ej48DrrfA1+W3BO9BJ3IiOc1AhBJa7UDmE9Eyk1JjL9LbwhNQwxRCn8tksSWD1y32sEnjRG8obotszXxlx37UCzbPehFGwcwUtGP72IrJtzIp4bYNAi2UFn2CVqadN6EFYoTNckMP6yNwLiCiRm5WDArokj8jI3cNsUnGfCTgqPJNvYmUST2/hCn62YtJYW6t/snpJDkBi6tUKJOasLBmgOcLsmDaqzEg==
- Authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=oracle.com;
- Cc: iwj@xxxxxxxxxxxxxx, wl@xxxxxxx, anthony.perard@xxxxxxxxxx, jbeulich@xxxxxxxx, andrew.cooper3@xxxxxxxxxx, roger.pau@xxxxxxxxxx, jun.nakajima@xxxxxxxxx, kevin.tian@xxxxxxxxx
- Delivery-date: Fri, 22 Jan 2021 18:31:10 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 1/22/21 4:52 AM, Julien Grall wrote:
> Hi Boris,
>
> On 20/01/2021 22:49, Boris Ostrovsky wrote:
>> This option allows guest administrator specify what should happen when
>> guest accesses an MSR which is not explicitly emulated by the hypervisor.
>>
>> Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
>> ---
>> docs/man/xl.cfg.5.pod.in | 20 +++++++++++++++++++-
>> tools/libs/light/libxl_types.idl | 7 +++++++
>> tools/xl/xl_parse.c | 7 +++++++
>> 3 files changed, 33 insertions(+), 1 deletion(-)
>>
>> diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
>> index c8e017f950de..96ce97c42cab 100644
>> --- a/docs/man/xl.cfg.5.pod.in
>> +++ b/docs/man/xl.cfg.5.pod.in
>> @@ -2044,7 +2044,25 @@ Do not provide a VM generation ID.
>> See also "Virtual Machine Generation ID" by Microsoft:
>>
>> L<https://docs.microsoft.com/en-us/windows/win32/hyperv_v2/virtual-machine-generation-identifier>
>> -=back
>> +=over
>> +
>> +=item B<ignore_msrs="STRING">
>> +
>> +Determine hypervisor behavior on accesses to MSRs that are not emulated by
>> the hypervisor.
>
> The description of the feature looks very x86 focus. Yet, it seems to be
> defined as a generic one.
>
> Could you clarify whether this is intended to be re-usable by other
> architectures?
x86 only. I'll add appropriate note.
-boris
|