>>> On 22.02.17 at 16:02, <boris.ostrov...@oracle.com> wrote:
> On 02/22/2017 09:38 AM, Jan Beulich wrote:
>>>>> On 22.02.17 at 15:15, <boris.ostrov...@oracle.com> wrote:
>>> On 02/22/2017 04:55 AM, Jan Beulich wrote:
>>>>>>> On 17.02.17 at 18:40, <boris.ostrov...@oracle.com> wrote:
>>>>> --- a/xen/arch/x86/cpu/vpmu_intel.c
>>>>> +++ b/xen/arch/x86/cpu/vpmu_intel.c
>>>>> @@ -884,6 +884,10 @@ int vmx_vpmu_initialise(struct vcpu *v)
>>>>>      if ( vpmu_mode == XENPMU_MODE_OFF )
>>>>>          return 0;
>>>>>  
>>>>> +    if ( MASK_EXTR(v->domain->arch.cpuid->basic.raw[0xa].a, 
>>>>> +                   PMU_VERSION_MASK) == 0 )
>>>>> +        return -EINVAL;
>>>> How about other unsupported (too large) values?
>>> Yes, we can check here for version >=5 as well.
>>>
>>> (I don't think we should make this additional test in
>>> update_domain_cpuid_info())
>> ... because of ... ? After all it's the purpose of this patch to not
>> expose the vPMU in such cases, which imo ought to be done
>> consistently in both places.
> 
> Because I felt that having zero as a version is an indication of
> explicit admin's desire to disable VPMU. Too high a version is more
> likely misconfiguration and can be taken care of during VPMU initialization.

Well, okay then.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to