[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20081128083415.GA1131@elte.hu>
Date: Fri, 28 Nov 2008 09:34:15 +0100
From: Ingo Molnar <mingo@...e.hu>
To: Arjan van de Ven <arjan@...ux.intel.com>
Cc: Yinghai Lu <yinghai@...nel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
NetDev <netdev@...r.kernel.org>, x86@...nel.org,
Andrew Morton <akpm@...ux-foundation.org>,
Theodore Ts'o <tytso@....edu>,
Alan Cox <alan@...rguk.ukuu.org.uk>,
jesse Barnes <jbarnes@...tuousgeek.org>,
"H. Peter Anvin" <hpa@...or.com>
Subject: Re: oops/warning report for the week of November 26, 2008
* Arjan van de Ven <arjan@...ux.intel.com> wrote:
> On Thu, 27 Nov 2008 21:47:14 +0100
> Ingo Molnar <mingo@...e.hu> wrote:
>
> > IIRC the problem is that vmware _does_ claim that it supports MTRRs.
>
> it might.
> but even if they would fix that, we would still WARN (
> at least we should do our side correctly...
As pointed out in other parts of the thread, that is not the case.
Anyway, as i said it in the onset, if you think we should remove the
warning altogether, or tweak it, we can do that - it is important to
have relevant warnings show up in kerneloops.org.
To sum it up: the only remaining MTRR warnings we know of are either:
1) apparently genuine BIOS bugs that do cause problems if the (new)
kernel does not fix them up.
The MTRR warning is relevant and correct in those cases.
or:
2) sucky virtualization solutions that cheat the guest OS by faking
"MTRR support" in the CPUID info, but not actually showing any
MTRRs. These virtualization solutions do not even properly
identify themselves to the kernel.
The MTRR warning is unnecessary in this case.
So what we did in the x86 tree was remove the warning in the second
case - is to properly identify vmware (and in general, virtualization)
guests.
It was not a simple oneliner:
earth4:~/tip> gll linus..x86/detect-hyper
4e42ebd: x86: hypervisor - fix sparse warnings
c450d78: x86: vmware - fix sparse warnings
fd8cd7e: x86: vmware: look for DMI string in the product serial key
6bdbfe9: x86: VMware: Fix vmware_get_tsc code
395628e: x86: Skip verification by the watchdog for TSC clocksource.
eca0cd0: x86: Add a synthetic TSC_RELIABLE feature bit.
88b094f: x86: Hypervisor detection and get tsc_freq from hypervisor
49ab56a: x86: add X86_FEATURE_HYPERVISOR feature bit
b2bcc7b: x86: add a synthetic TSC_RELIABLE feature bit
and it will benefit vmware guests in many more areas than just a
sharper MTRR warning message. That code is queued up for v2.6.29.
Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists