From: Chao Gao <chao.gao@intel.com>
To: Jan Beulich <JBeulich@suse.com>,
Andrew Cooper <andrew.cooper3@citrix.com>
Cc: Kevin Tian <kevin.tian@intel.com>,
Ashok Raj <ashok.raj@intel.com>,
xen-devel@lists.xen.org, Jun Nakajima <jun.nakajima@intel.com>,
tglx@linutronix.de, Borislav Petkov <bp@suse.de>
Subject: Re: [Patch v3 2/2] x86/microcode: Synchronize late microcode loading
Date: Tue, 22 May 2018 16:59:47 +0800 [thread overview]
Message-ID: <20180522085945.GA137528@skl-4s-chao.sh.intel.com> (raw)
In-Reply-To: <20180518072113.GA65239@skl-4s-chao.sh.intel.com>
On Fri, May 18, 2018 at 03:21:14PM +0800, Chao Gao wrote:
>On Wed, May 16, 2018 at 07:46:48AM -0600, Jan Beulich wrote:
>>>>> On 16.05.18 at 15:25, <andrew.cooper3@citrix.com> wrote:
>>> On 16/05/18 14:10, Jan Beulich wrote:
>>>>> +static int do_microcode_update(void *_info)
>>>>> +{
>>>>> + struct microcode_info *info = _info;
>>>>> + unsigned int cpu = smp_processor_id();
>>>>> + int ret;
>>>>> +
>>>>> + ret = wait_for_cpus(&info->cpu_in, MICROCODE_DEFAULT_TIMEOUT);
>>>>> + if ( ret )
>>>>> + return ret;
>>>>> +
>>>>> + /*
>>>>> + * Logical threads which set the first bit in cpu_sibling_mask can do
>>>>> + * the update. Other sibling threads just await the completion of
>>>>> + * microcode update.
>>>>> + */
>>>>> + if ( !cpumask_test_and_set_cpu(
>>>>> + cpumask_first(per_cpu(cpu_sibling_mask, cpu)), &info->cpus) )
>>>>> + ret = microcode_update_cpu(info->buffer, info->buffer_size);
>>>>> + /*
>>>>> + * Increase the wait timeout to a safe value here since we're serializing
>>>>> + * the microcode update and that could take a while on a large number of
>>>>> + * CPUs. And that is fine as the *actual* timeout will be determined by
>>>>> + * the last CPU finished updating and thus cut short
>>>>> + */
>>>>> + if ( wait_for_cpus(&info->cpu_out, MICROCODE_DEFAULT_TIMEOUT *
>>>>> + nr_phys_cpus) )
>>>> I remain unconvinced that this is a safe thing to do on a huge system with
>>>> guests running (even Dom0 alone would seem risky enough). I continue to
>
>I think there are other operations may also endanger the security, stability
>of the whole system. We offer them with caveats. Same here, three
>different methods can be used to update microcode; the late update isn't
>perfect at this moment. At least, we provide a more reliable method to update
>microcode at runtime on systems with no so many cores. And for a huge
>system, admins can assess the risk and choose the most suitable method.
>They can completely avoid doing live updates and mandate a reboot and do
>it early since that's the most dependable method.
>
>>>> hope for comments from others, in particular Andrew, here. At the very
>>>> least I think you should taint the hypervisor when making it here.
>>>
>>> I see nothing in this patch which prevents a deadlock against the time
>>> calibration rendezvous. It think its fine to pause the time calibration
>>> rendezvous while performing this update.
>>
>>If there's a problem here, wouldn't that be a general one with
>>stop_machine()?
>
>I agree with Jan. It shouldn't be specific to the stop_machine() here.
>Anyhow, I will look into the potential deadlock you mentioned.
>
>>
>>> Also, what is the purpose of serialising the updates while all pcpus are
>>> in rendezvous?
>
>microcode_mutex which prevents doing the updates in parallel is not
>introduced by this patch. At present, We want to keep this patch and the
>update process simple. Could we just make it work first and try to work
>out some optimizations later?
Hi Jan & Andrew,
Do you think it is acceptable that we just follow linux kernel at present
and work out optimizations later?
Thanks
Chao
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-05-22 8:59 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-08 22:01 [Patch v3 1/2] x86/smp: count the number of online physical processor in the system Chao Gao
2018-05-08 22:01 ` [Patch v3 2/2] x86/microcode: Synchronize late microcode loading Chao Gao
2018-05-16 13:10 ` Jan Beulich
2018-05-16 13:25 ` Andrew Cooper
2018-05-16 13:46 ` Jan Beulich
2018-05-18 7:21 ` Chao Gao
2018-05-22 8:59 ` Chao Gao [this message]
2018-05-22 9:26 ` Jan Beulich
2018-05-22 20:14 ` Raj, Ashok
2018-11-13 9:08 ` Chao Gao
2018-11-13 9:09 ` Andrew Cooper
2018-05-16 12:54 ` [Patch v3 1/2] x86/smp: count the number of online physical processor in the system Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180522085945.GA137528@skl-4s-chao.sh.intel.com \
--to=chao.gao@intel.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=ashok.raj@intel.com \
--cc=bp@suse.de \
--cc=jun.nakajima@intel.com \
--cc=kevin.tian@intel.com \
--cc=tglx@linutronix.de \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).