On Tue, 2007-09-18 at 16:25 -0500, Ryan Harper wrote:
> * Nakajima, Jun <[EMAIL PROTECTED]> [2007-09-18 16:22]:
> > Anthony Liguori wrote:
> > > Ryan Harper wrote:
> > > > Playing around with running VMware-server within a KVM guest and
> > noticed
> > > > that whenever we launch a VM within the guest, KVM reports a GP
> > fault in
> > > > set_cr3.  Removing the fault injection (raised for attempting to set
> > > > reserved bits) for the non-pae case allows memtest to boot and run
> > > > within VMWare Server, running in a KVM Linux guest.
> > > > 
> > > > This same test (Linux, VMware-server, booting/running memtest iso)
> > works
> > > > fine on bare-metal.  Thoughts?
> > > > 
> > > 
> > > Setting reserved bits is different from setting MBZ bits since the
> > > behaviors undefined.  If something as common as VMware is depending on
> > > being able to set a reserved bit then perhaps the right thing to do
> > from
> > > KVM's perspective is to let it.
> > > 
> > > I'm curious if Zach or Jun have any comments about the right thing to
> > do
> > > here.
> > > 
> > 
> > As long as the guest is protected mode (unlike the long mode), the Intel
> > spec does _not_ say that reserved bits checking is enforced for CR3. As
> > far as I looked at the AMD spec, looks like #GP is caused even in
> > protected mode... Does the test work for AMD systems?
> 
> I ran my test on an AMD host.

We have a test which verifies #GP is not caused by setting the bits on
either AMD or Intel chips.  "Stray" bits can get turned on in some cases
when switching between 64-bit, PAE and non-PAE address modes.

Were you testing on a 64-bit host kernel?

Zach


-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to