All of lore.kernel.org
 help / color / mirror / Atom feed
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: kevin.tian@intel.com, suravee.suthikulpanit@amd.com,
	andrew.cooper3@citrix.com, tim@xen.org,
	dietmar.hahn@ts.fujitsu.com, xen-devel@lists.xen.org,
	Aravind.Gopalakrishnan@amd.com, jun.nakajima@intel.com,
	dgdegra@tycho.nsa.gov
Subject: Re: [PATCH v22 02/14] x86/VPMU: Add public xenpmu.h
Date: Wed, 27 May 2015 09:44:58 -0400	[thread overview]
Message-ID: <5565CA5A.6080406@oracle.com> (raw)
In-Reply-To: <5565D47F020000780007E30F@mail.emea.novell.com>

On 05/27/2015 08:28 AM, Jan Beulich wrote:
>>>> On 26.05.15 at 19:50, <boris.ostrovsky@oracle.com> wrote:
>> On 05/26/2015 12:13 PM, Jan Beulich wrote:
>>>>>> On 21.05.15 at 19:57, <boris.ostrovsky@oracle.com> wrote:
>>>> + * guest when PMU_CACHED bit in pmu_flags is set (which is done by the
>>>> + * hypervisor during PMU interrupt). Hypervisor will read updated data in
>>>> + * XENPMU_flush hypercall and clear PMU_CACHED bit.
>>>> + */
>>>> +struct xen_pmu_arch {
>>>> +    union {
>>>> +        /*
>>>> +         * Processor's registers at the time of interrupt.
>>>> +         * WO for hypervisor, RO for guests.
>>>> +         */
>>>> +        struct xen_pmu_regs regs;
>>>> +        /* Padding for adding new registers to xen_pmu_regs in the future
>> */
>>>> +#define XENPMU_REGS_PAD_SZ  64
>>>> +        uint8_t pad[XENPMU_REGS_PAD_SZ];
>>>> +    } r;
>>>> +
>>>> +    /* WO for hypervisor, RO for guest */
>>>> +    uint64_t pmu_flags;
>>>> +
>>>> +    /*
>>>> +     * APIC LVTPC register.
>>>> +     * RW for both hypervisor and guest.
>>>> +     * Only APIC_LVT_MASKED bit is loaded by the hypervisor into hardware
>>>> +     * during XENPMU_flush or XENPMU_lvtpc_set.
>>>> +     */
>>>> +    union {
>>>> +        uint32_t lapic_lvtpc;
>>> Considering this isn't being used in this patch, could I ask you to
>>> move it where it is being used (keeping only the pad member and
>>> perhaps a placeholder comment here), so verifying that the
>>> read-once requirement for the hypervisor side is met becomes
>>> more obvious?
>> I can certainly delay defining this field until later patch but how is
>> this filed different from xen_pmu_arch (not seen here) which is also
>> read-once? Wouldn't you then want to have that definition deferred as well?
> I'm confused - the only xen_pmu_arch I see in this patch is
> "struct xen_pmu_arch" (and its uses), which the field above is
> actually part of, and which is also visible in the context above. So
> I doubt that's what you're referring to. But yes, fields with read-
> once requirements would better be defined in the patch(es) using
> them, so reviewers don't need to hunt them down.

Sorry, I meant amd/intel members of the union below (I forgot we were 
already in the arch header file):

+    /*
+     * Vendor-specific PMU registers.
+     * RW for both hypervisor and guest.
+     * Guest's updates to this field are verified and then loaded by the
+     * hypervisor into hardware during XENPMU_flush
+     */
+    union {
+        struct xen_pmu_amd_ctxt amd;
+        struct xen_pmu_intel_ctxt intel;
+
+        /*
+         * Padding for contexts (fixed parts only, does not include MSR 
banks
+         * that are specified by offsets)
+         */
+#define XENPMU_CTXT_PAD_SZ  128
+        uint8_t pad[XENPMU_CTXT_PAD_SZ];
+    } c;
+};

I think they are first used in patch 11 so I assume you also want me to 
just keep the pad here (with a comment explaining why it is here) until 
that patch.

-boris

  reply	other threads:[~2015-05-27 13:44 UTC|newest]

Thread overview: 28+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-05-21 17:57 [PATCH v22 00/14] x86/PMU: Xen PMU PV(H) support Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 01/14] common/symbols: Export hypervisor symbols to privileged guest Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 02/14] x86/VPMU: Add public xenpmu.h Boris Ostrovsky
2015-05-26 16:13   ` Jan Beulich
2015-05-26 17:50     ` Boris Ostrovsky
2015-05-27 12:28       ` Jan Beulich
2015-05-27 13:44         ` Boris Ostrovsky [this message]
2015-05-27 14:26           ` Jan Beulich
2015-05-27 15:18             ` Boris Ostrovsky
2015-05-27 16:04               ` Jan Beulich
2015-05-21 17:57 ` [PATCH v22 03/14] x86/VPMU: Make vpmu not HVM-specific Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 04/14] x86/VPMU: Interface for setting PMU mode and flags Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 05/14] x86/VPMU: Initialize VPMUs with __initcall Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 06/14] x86/VPMU: Initialize PMU for PV(H) guests Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 07/14] x86/VPMU: Save VPMU state for PV guests during context switch Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 08/14] x86/VPMU: When handling MSR accesses, leave fault injection to callers Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 09/14] x86/VPMU: Add support for PMU register handling on PV guests Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 10/14] x86/VPMU: Use pre-computed masks when checking validity of MSRs Boris Ostrovsky
2015-05-26 16:16   ` Jan Beulich
2015-05-21 17:57 ` [PATCH v22 11/14] x86/VPMU: Handle PMU interrupts for PV(H) guests Boris Ostrovsky
2015-05-26 16:24   ` Jan Beulich
2015-05-26 18:09     ` Boris Ostrovsky
2015-05-27 12:29       ` Jan Beulich
2015-05-28 15:05       ` Aravind Gopalakrishnan
2015-05-28 15:24         ` Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 12/14] x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 13/14] x86/VPMU: Add privileged PMU mode Boris Ostrovsky
2015-05-21 17:57 ` [PATCH v22 14/14] x86/VPMU: Move VPMU files up from hvm/ directory Boris Ostrovsky

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5565CA5A.6080406@oracle.com \
    --to=boris.ostrovsky@oracle.com \
    --cc=Aravind.Gopalakrishnan@amd.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=dgdegra@tycho.nsa.gov \
    --cc=dietmar.hahn@ts.fujitsu.com \
    --cc=jun.nakajima@intel.com \
    --cc=kevin.tian@intel.com \
    --cc=suravee.suthikulpanit@amd.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.