WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] sse, mmx support for hvm guests

To: Ashish Bijlani <ashish.bijlani@xxxxxxxxx>
Subject: Re: [Xen-devel] sse, mmx support for hvm guests
From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Date: Sun, 26 Oct 2008 08:36:27 +0000
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Sun, 26 Oct 2008 01:36:45 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <ec55b17e0810251630k36cccaa4i9da5cb154b585354@xxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Ack3Re+qLf7F86M5Ed2swwAWy6hiGQ==
Thread-topic: [Xen-devel] sse, mmx support for hvm guests
User-agent: Microsoft-Entourage/11.4.0.080122
Masking from CPUID should work. I'm surprised it would cause a guest to fail
to boot.

 K.

On 25/10/08 23:30, "Ashish Bijlani" <ashish.bijlani@xxxxxxxxx> wrote:

> it's just masking the sse/mmx features from cpuid return value or
> something more to it? because i tried masking sse/mmx features from
> cpuid and now the hvm domain doesn't boot!! any idea if sse/mmx
> support can be disabled using bios?
> 
> Thanks,
> Ashish
> 
> On Sat, Oct 25, 2008 at 7:13 PM, Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
> wrote:
>> On 25/10/08 20:34, "Ashish Bijlani" <ashish.bijlani@xxxxxxxxx> wrote:
>> 
>>> I've a quad-core x86_64 machine (Intel Xeon), with sse/mmx support.
>>> However, I want to disable sse/mmx support from HVM guests. How can I
>>> do this? Also, is it reasonable to expect illegal instruction fault in
>>> non-root VMX mode if a guest VM runs an application with sse/mmx
>>> instructions?
>> 
>> You can hide SSE/MMX in CPUID info, so the guest should not attempt to use
>> the instructions. This is obviously true since CPUID causes vmexit and then
>> the instruction is always emulated. But I don't think you can make the
>> sse/mmx instructions fault if the guest does actually try to use them
>> anyway.
>> 
>>  -- Keir
>> 
>> 
>> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel