From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: keir@xen.org, Ian.Campbell@citrix.com,
stefano.stabellini@eu.citrix.com, George.Dunlap@eu.citrix.com,
andrew.cooper3@citrix.com, Ian.Jackson@eu.citrix.com,
xen-devel@lists.xen.org, Chao Peng <chao.p.peng@linux.intel.com>,
dgdegra@tycho.nsa.gov
Subject: Re: [PATCH v16 08/10] x86: add CMT related MSRs in allowed list
Date: Fri, 26 Sep 2014 09:14:20 -0400 [thread overview]
Message-ID: <20140926131420.GE30097@laptop.dumpdata.com> (raw)
In-Reply-To: <5425422B0200007800039799@mail.emea.novell.com>
On Fri, Sep 26, 2014 at 09:38:35AM +0100, Jan Beulich wrote:
> >>> On 25.09.14 at 22:58, <konrad.wilk@oracle.com> wrote:
> > On Thu, Sep 25, 2014 at 06:19:08PM +0800, Chao Peng wrote:
> >> Tool stack will try to access the two MSRs to perform CMT
> >> related operations, thus added them in the allowed list.
> >>
> >> Signed-off-by: Dongxiao Xu <dongxiao.xu@intel.com>
> >> Signed-off-by: Chao Peng <chao.p.peng@linux.intel.com>
> >> ---
> >> xen/arch/x86/platform_hypercall.c | 7 +++++++
> >> xen/include/asm-x86/msr-index.h | 2 ++
> >> 2 files changed, 9 insertions(+)
> >>
> >> diff --git a/xen/arch/x86/platform_hypercall.c
> > b/xen/arch/x86/platform_hypercall.c
> >> index 081d9f5..be06f3a 100644
> >> --- a/xen/arch/x86/platform_hypercall.c
> >> +++ b/xen/arch/x86/platform_hypercall.c
> >> @@ -69,6 +69,13 @@ struct xen_resource_access {
> >>
> >> static bool_t allow_access_msr(unsigned int msr)
> >> {
> >> + switch ( msr )
> >> + {
> >> + case MSR_IA32_QOSEVTSEL:
> >> + case MSR_IA32_QMC:
> >> + return 1;
> >> + }
> >> +
> >> return 0;
> >> }
> >>
> >> diff --git a/xen/include/asm-x86/msr-index.h b/xen/include/asm-x86/msr-index.h
> >> index dcb2b87..ae089fb 100644
> >> --- a/xen/include/asm-x86/msr-index.h
> >> +++ b/xen/include/asm-x86/msr-index.h
> >> @@ -324,6 +324,8 @@
> >> #define MSR_IA32_ENERGY_PERF_BIAS 0x000001b0
> >>
> >> /* Platform Shared Resource MSRs */
> >> +#define MSR_IA32_QOSEVTSEL 0x00000c8d
> >> +#define MSR_IA32_QMC 0x00000c8e
> >
> > Could you mention where they are in the SDM ?
>
> In the MSR related appendix of course. Let's not go overboard with
> adding all kinds of information here that was never added for other
> MSRs: The header's purpose is just giving names to numbers.
They are of course there, but the explanation of how to use it or what
they are good for in usually in other chapters in the SDM. I was hoping
an chapter to just that. But if the header is not the right location
perhaps then in 'allow_access_msr' function?
Anyhow not going to argue strongly for it - as it is a minor part
of the patches - so either way I am comfortable with it.
>
> Jan
>
next prev parent reply other threads:[~2014-09-26 13:14 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-25 10:19 [PATCH v16 00/10] enable Cache Monitoring Technology (CMT) feature Chao Peng
2014-09-25 10:19 ` [PATCH v16 01/10] x86: add generic resource (e.g. MSR) access hypercall Chao Peng
2014-09-25 19:57 ` Andrew Cooper
2014-09-25 20:12 ` Konrad Rzeszutek Wilk
2014-09-25 20:17 ` Konrad Rzeszutek Wilk
2014-09-26 1:34 ` Chao Peng
2014-09-26 1:19 ` Chao Peng
2014-09-26 8:28 ` Jan Beulich
2014-09-26 8:58 ` Chao Peng
2014-09-26 15:40 ` Jan Beulich
2014-09-28 2:47 ` Chao Peng
2014-09-25 10:19 ` [PATCH v16 02/10] xsm: add resource operation related xsm policy Chao Peng
2014-09-25 10:19 ` [PATCH v16 03/10] tools: provide interface for generic resource access Chao Peng
2014-09-25 20:06 ` Konrad Rzeszutek Wilk
2014-09-25 10:19 ` [PATCH v16 04/10] x86: detect and initialize Cache Monitoring Technology feature Chao Peng
2014-09-25 20:33 ` Konrad Rzeszutek Wilk
2014-09-25 21:14 ` Andrew Cooper
2014-09-26 1:54 ` Chao Peng
2014-09-26 15:45 ` Jan Beulich
2014-09-25 10:19 ` [PATCH v16 05/10] x86: dynamically attach/detach CMT service for a guest Chao Peng
2014-09-25 20:41 ` Konrad Rzeszutek Wilk
2014-09-25 10:19 ` [PATCH v16 06/10] x86: collect global CMT information Chao Peng
2014-09-25 20:53 ` Konrad Rzeszutek Wilk
2014-09-26 9:21 ` Chao Peng
2014-09-26 13:23 ` Konrad Rzeszutek Wilk
2014-09-25 10:19 ` [PATCH v16 07/10] x86: enable CMT for each domain RMID Chao Peng
2014-09-25 21:23 ` Andrew Cooper
2014-09-25 10:19 ` [PATCH v16 08/10] x86: add CMT related MSRs in allowed list Chao Peng
2014-09-25 20:58 ` Konrad Rzeszutek Wilk
2014-09-26 8:38 ` Jan Beulich
2014-09-26 13:14 ` Konrad Rzeszutek Wilk [this message]
2014-09-25 10:19 ` [PATCH v16 09/10] xsm: add CMT related xsm policies Chao Peng
2014-09-25 10:19 ` [PATCH v16 10/10] tools: CMDs and APIs for Cache Monitoring Technology Chao Peng
2014-09-25 21:14 ` Konrad Rzeszutek Wilk
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140926131420.GE30097@laptop.dumpdata.com \
--to=konrad.wilk@oracle.com \
--cc=George.Dunlap@eu.citrix.com \
--cc=Ian.Campbell@citrix.com \
--cc=Ian.Jackson@eu.citrix.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=chao.p.peng@linux.intel.com \
--cc=dgdegra@tycho.nsa.gov \
--cc=keir@xen.org \
--cc=stefano.stabellini@eu.citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.