[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] RE: [PATCH] X86: cpuid faulting feature enable



> From: Keir Fraser [mailto:keir.xen@xxxxxxxxx] On Behalf Of Keir Fraser
> Sent: Saturday, July 02, 2011 5:31 AM
> 
> On 01/07/2011 15:32, "Liu, Jinsong" <jinsong.liu@xxxxxxxxx> wrote:
> 
> > X86: cpuid faulting feature enable
> >
> > Latest Intel processor add cpuid faulting feature. This patch is used to
> > support cpuid faulting in Xen.
> > Like cpuid spoofing, cpuid faulting mainly used to support live migration.
> > When cpl>0, cpuid instruction will produce GP, vmm then emulate execution
> of
> > the cpuid instruction. Hence will appear to guest software the value chosen
> by
> > the vmm.
> 
> I fixed this up quite a bit and applied as c/s 23653. Please take a look and
> give it a test. In particular note the changes I made in intel_init(), to
> make sure that APs are at least as featureful as the BSP w.r.t. cpuid
> faulting.
> 

        2.42    +       } else if (boot_cpu_has(X86_FEATURE_CPUID_FAULTING)) {
    2.43 +              BUG_ON(!probe_intel_cpuid_faulting());
    2.44 +              set_bit(X86_FEATURE_CPUID_FAULTING, c->x86_capability);
    2.45 +      }
    2.46 +
    2.47 +      if (!cpu_has_cpuid_faulting)
    2.48 +              set_cpuidmask(c);
    2.49 +
    2.50 +      BUG_ON(cpu_has(c, X86_FEATURE_CPUID_FAULTING) !=
    2.51 +             boot_cpu_has(X86_FEATURE_CPUID_FAULTING));

the latter BUG_ON is useless since if AP is inconsistent with BSP we already
get bug triggered in earlier BUG_ON.

Thanks
Kevin

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.