From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:37497) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ZpWkQ-0001tq-7g for qemu-devel@nongnu.org; Fri, 23 Oct 2015 03:26:47 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ZpWkM-0007Cj-89 for qemu-devel@nongnu.org; Fri, 23 Oct 2015 03:26:46 -0400 Received: from mail-wi0-x22b.google.com ([2a00:1450:400c:c05::22b]:37044) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ZpWkM-0007Cf-1Q for qemu-devel@nongnu.org; Fri, 23 Oct 2015 03:26:42 -0400 Received: by wicfv8 with SMTP id fv8so19266856wic.0 for ; Fri, 23 Oct 2015 00:26:41 -0700 (PDT) Sender: Paolo Bonzini References: <1445364840-7056-1-git-send-email-lersek@redhat.com> <20151021183625.26940.67906@jljusten-ivb> <5628A0E8.8050705@redhat.com> <20151022180407.GA9969@morn.lan> <56293D30.3080507@redhat.com> <20151023044115.30810.77352@jljusten-ivb> From: Paolo Bonzini Message-ID: <5629E12E.4090409@redhat.com> Date: Fri, 23 Oct 2015 09:26:38 +0200 MIME-Version: 1.0 In-Reply-To: <20151023044115.30810.77352@jljusten-ivb> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH] hw/isa/lpc_ich9: inject the SMI on the VCPU that is writing to APM_CNT List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Jordan Justen , Kevin O'Connor Cc: Michael Kinney , Gerd Hoffmann , Laszlo Ersek , qemu-devel@nongnu.org, "Michael S. Tsirkin" On 23/10/2015 06:41, Jordan Justen wrote: > On 2015-10-22 12:46:56, Paolo Bonzini wrote: >> >> On 22/10/2015 20:04, Kevin O'Connor wrote: >>> On Thu, Oct 22, 2015 at 10:40:08AM +0200, Paolo Bonzini wrote: >>>> On 21/10/2015 20:36, Jordan Justen wrote: >>>>> On 2015-10-20 11:14:00, Laszlo Ersek wrote: >>>>>> Commit 4d00636e97b7 ("ich9: Add the lpc chip", Nov 14 2012) added the >>>>>> ich9_apm_ctrl_changed() ioport write callback function such that it would >>>>>> inject the SMI, in response to a write to the APM_CNT register, on the >>>>>> first CPU, invariably. >>>>>> >>>>>> Since this register is used by guest code to trigger an SMI synchronously, >>>>>> the interrupt should be injected on the VCPU that is performing the write. >>>>> >>>>> Why not send an SMI to *all* processors, like the real chipsets do? >>>> >>>> That's much less scalable, and more important I would have to check that >>>> SeaBIOS can handle that correctly. It probably doesn't, as it doesn't >>>> relocate SMBASEs. >>> >>> SeaBIOS is only expecting its SMI handler to be called once in >>> response to a synchronous SMI. We can change SeaBIOS to fix that. >>> >>> SeaBIOS does relocate the smbase from 0x30000 to 0xa0000 during its >>> init phase (by creating a synchronous SMI on the BSP and then setting >>> the smbase register to 0xa0000 in the smi handler). >> >> Right; however it would also have to relocate the SMBASE on the APs (in >> case they were halted with cli;hlt and not INITed). It's really not >> worth the hassle, > > It's not worth the hassle to relocate the SMBASE of the APs? > So, basically, write to 0x30000-0x38000, then send an SMI IPI to the > AP and now you have the AP running in SMI and it has extra privileges? Extra privileges compared to what? Legacy BIOS does not really put anything privileged in SMRAM, while OVMF does and _hence_ relocates the SMBASE of the AP. It would have been nice to get it right from the beginning, but right now it's not worth forcing a lockstep QEMU-SeaBIOS update. Paolo