diff options
author | Liu, Jinsong <jinsong.liu@intel.com> | 2012-09-26 12:04:00 +0200 |
---|---|---|
committer | Liu, Jinsong <jinsong.liu@intel.com> | 2012-09-26 12:04:00 +0200 |
commit | 975b5bdf27031adef6587bb5c92b7a5800e051f1 (patch) | |
tree | e69cf436778fc15c19764cca89c0e164f228fc43 /xen/arch/x86/domain.c | |
parent | 8e804aec451a072022eece0980481ab545b5cd75 (diff) | |
download | xen-975b5bdf27031adef6587bb5c92b7a5800e051f1.tar.gz xen-975b5bdf27031adef6587bb5c92b7a5800e051f1.tar.bz2 xen-975b5bdf27031adef6587bb5c92b7a5800e051f1.zip |
x86: vMCE emulation
This patch provides virtual MCE support to guest. It emulates a simple
and clean MCE MSRs interface to guest by faking caps to guest if needed
and masking caps if unnecessary:
1. Providing a well-defined MCG_CAP to guest, filter out un-necessary
caps and provide only guest needed caps;
2. Disabling MCG_CTL to avoid model specific;
3. Sticking all 1's to MCi_CTL to guest to avoid model specific;
4. Enabling CMCI cap but never really inject to guest to prevent
polling periodically;
5. Masking MSCOD field of MCi_STATUS to avoid model specific;
6. Keeping natural semantics by per-vcpu instead of per-domain
variables;
7. Using bank1 and reserving bank0 to work around 'bank0 quirk' of some
very old processors;
8. Cleaning some vMCE# injection logic which shared by Intel and AMD
but useless under new vMCE implement;
9. Keeping compatilbe w/ old xen version which has been backported to
SLES11 SP2, so that old vMCE would not blocked when migrate to new
vMCE;
Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
- make printing consistent (and non-exploitable)
- fix return values of intel_mce_{rd,wr}msr() for out of range banks
- miscellaneous cleanup
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Committed-by: Jan Beulich <jbeulich@suse.com>
Diffstat (limited to 'xen/arch/x86/domain.c')
-rw-r--r-- | xen/arch/x86/domain.c | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c index ec0d06f79f..d0c516a3ee 100644 --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @@ -577,9 +577,6 @@ int arch_domain_create(struct domain *d, unsigned int domcr_flags) if ( (rc = iommu_domain_init(d)) != 0 ) goto fail; - - /* For Guest vMCE MSRs virtualization */ - vmce_init_msr(d); } if ( is_hvm_domain(d) ) @@ -606,7 +603,6 @@ int arch_domain_create(struct domain *d, unsigned int domcr_flags) fail: d->is_dying = DOMDYING_dead; - vmce_destroy_msr(d); cleanup_domain_irq_mapping(d); free_xenheap_page(d->shared_info); if ( paging_initialised ) @@ -629,7 +625,6 @@ void arch_domain_destroy(struct domain *d) else xfree(d->arch.pv_domain.e820); - vmce_destroy_msr(d); free_domain_pirqs(d); if ( !is_idle_domain(d) ) iommu_domain_destroy(d); |