All of lore.kernel.org
 help / color / mirror / Atom feed
From: Wei Huang <wei.huang2@amd.com>
To: Jan Beulich <JBeulich@novell.com>
Cc: Keir,
	"xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	Fraser <keir@xen.org>
Subject: Re: [PATCH] FPU LWP 5/8: add a mask option to xsave() and	 xrstor()
Date: Wed, 4 May 2011 11:03:27 -0500	[thread overview]
Message-ID: <4DC178CF.2070307@amd.com> (raw)
In-Reply-To: <4DC1162D020000780003F9BA@vpn.id2.novell.com>

Hi Jan,

That is a good point. So far there isn't a way to decide which bits are 
guarded by CR0.TS. I will bring it up to our design team. I guess LWP 
will the only exception for a long while. Is the first approach 
sufficient/acceptable to you for now?

#define XSTATE_LAZY (XSTATE_ALL & ~XSTATE_NONLAZY)

Thanks,
-Wei


On 05/04/2011 02:02 AM, Jan Beulich wrote:
>>>> On 03.05.11 at 22:17, Wei Huang<wei.huang2@amd.com>  wrote:
>> +#define XSTATE_LAZY    (XSTATE_FP | XSTATE_SSE | XSTATE_YMM)
>> +#define XSTATE_NONLAZY (XSTATE_LWP)
>> +#define XSTATE_ALL     (~0)
> As said before, this isn't forward compatible. New bits added in
> future hardware should explicitly *not* require changes to the OS
> (or hypervisor in our case). If you're certain LWP will remain the
> only piece not controlled via CR0.TS, then you'll want
>
> #define XSTATE_LAZY    (XSTATE_ALL&  ~XSTATE_NONLAZY)
>
> If you aren't (and I'm afraid you can't), then you'll have to ask
> your hardware guys to provide a means to detect which of the
> bits cover state not controlled by CR0.TS, and set these masks
> dynamically.
>
> Jan
>
>

  reply	other threads:[~2011-05-04 16:03 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-05-03 20:17 [PATCH] FPU LWP 5/8: add a mask option to xsave() and xrstor() Wei Huang
2011-05-04  7:02 ` Jan Beulich
2011-05-04 16:03   ` Wei Huang [this message]
2011-05-05  7:09     ` Jan Beulich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4DC178CF.2070307@amd.com \
    --to=wei.huang2@amd.com \
    --cc=JBeulich@novell.com \
    --cc=keir@xen.org \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.