On 26.11.2012, at 22:33, Paul Mackerras wrote:

> On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
>> 
>> On 23.11.2012, at 22:42, Paul Mackerras wrote:
>> 
>>> On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
>>>> 
>>>> On 22.11.2012, at 10:25, Paul Mackerras wrote:
>>>> 
>>>>> + /* Do they have an SLB shadow buffer registered? */
>>>>> + slb = vcpu->arch.slb_shadow.pinned_addr;
>>>>> + if (!slb)
>>>>> +         return;
>>>> 
>>>> Mind to explain this case? What happens here? Do we leave the guest with 
>>>> an empty SLB? Why would this ever happen? What happens next as soon as we 
>>>> go back into the guest?
>>> 
>>> Yes, we leave the guest with an empty SLB, the access gets retried and
>>> this time the guest gets an SLB miss interrupt, which it can hopefully
>>> handle using an SLB miss handler that runs entirely in real mode.
>>> This could happen for instance while the guest is in SLOF or yaboot or
>>> some other code that runs basically in real mode but occasionally
>>> turns the MMU on for some accesses, and happens to have a bug where it
>>> creates a duplicate SLB entry.
>> 
>> Is this what pHyp does? Also, is this what we want? Why don't we populate an 
>> #MC into the guest so it knows it did something wrong?
> 
> Yes, yes and we do.  Anytime we get a machine check while in the guest
> we give the guest a machine check interrupt.
> 
> Ultimately we want to implement the "FWNMI" (Firmware-assisted NMI)
> thing defined in PAPR which makes the handling of system reset and
> machine check slightly nicer for the guest, but that's for later.  It
> will build on top of the stuff in this patch.

So why would the function return 1 then which means "MC is handled, forget 
about it" rather than 0, which means "inject MC into the guest"?


Alex

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to