From: Boris Ostrovsky <boris.ostrovsky@amd.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Christoph.Egger@amd.com, xen-devel@lists.xensource.com, keir@xen.org
Subject: Re: [PATCH v4] x86/AMD: Add support for AMD's OSVW feature in guests
Date: Fri, 3 Feb 2012 11:13:18 -0500 [thread overview]
Message-ID: <4F2C079E.6070404@amd.com> (raw)
In-Reply-To: <4F2BA08C0200007800070AC9@nat28.tlf.novell.com>
On 02/03/12 02:53, Jan Beulich wrote:
>>>> On 02.02.12 at 21:29, Boris Ostrovsky<boris.ostrovsky@amd.com> wrote:
>> On 02/02/12 08:22, Jan Beulich wrote:
>>> As I was about to apply this to my local tree to give it a try, I had
>>> to realize that the microcode integration is still not correct: There
>>> is (at least from an abstract perspective) no guarantee for
>>> cpu_request_microcode() to be called on all CPUs, yet you want
>>> svm_host_osvw_init() to be re-run on all of them. If you choose
>>> to not deal with this in a formally correct way, it should be stated
>>> so in a code comment (to lower the risk of surprises when someone
>>> touches that code) that this is not possible in practice because
>>> collect_cpu_info() won't currently fail for CPUs of interest.
>>
>> What if svm_host_osvw_init() is called from collect_cpu_info()? There
>> may be cases when svm_host_osvw_init() is called multiple times for the
>> same cpu but that should be harmless (and the routine will be renamed to
>> svm_host_osvw_update()).
>
> Wouldn't that result in workaround bits that might get cleared with
> the pending microcode update to get (and remain) set, as they're
> being or-ed together over all invocations of the function after any
> svm_host_osvw_reset()?
I think that would be an OK but not optimal situation: more bits will
end up being set than necessary, meaning that workarounds will need to
be applied where they may not be required. But that should not affect
correctness. I am not sure it's worth optimizing for this case since I
think onlining a core while doing a microcode update is a rather
uncommon occurrence.
What could have been a problem is the case when a core that's coming up
has more bits set than other cores and doesn't get to go into
cpu_request_microcode(). Since collect_cpu_info() is always invoked on
the onlining path we will not miss a call into svm_host_osvw_init().
-boris
next prev parent reply other threads:[~2012-02-03 16:13 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-02-01 16:30 [PATCH v4] x86/AMD: Add support for AMD's OSVW feature in guests Boris Ostrovsky
2012-02-02 13:22 ` Jan Beulich
2012-02-02 20:29 ` Boris Ostrovsky
2012-02-03 7:53 ` Jan Beulich
2012-02-03 16:13 ` Boris Ostrovsky [this message]
2012-02-03 16:25 ` Jan Beulich
2012-02-03 16:48 ` Boris Ostrovsky
2012-02-03 16:59 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4F2C079E.6070404@amd.com \
--to=boris.ostrovsky@amd.com \
--cc=Christoph.Egger@amd.com \
--cc=JBeulich@suse.com \
--cc=keir@xen.org \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.