[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: [PATCH] X86: cpuid faulting feature enable



On 04/07/2011 02:06, "Shan, Haitao" <haitao.shan@xxxxxxxxx> wrote:

> diff -r 177ddb2f4ebf -r 71b58748cfee xen/arch/x86/cpu/cpu.h
> --- a/xen/arch/x86/cpu/cpu.h    Fri Jul 01 20:48:00 2011 +0100
> +++ b/xen/arch/x86/cpu/cpu.h    Fri Jul 01 22:28:53 2011 +0100
> @@ -30,4 +30,4 @@ extern void display_cacheinfo(struct cpu
>  extern void generic_identify(struct cpuinfo_x86 * c);
> 
>  extern void early_intel_workaround(struct cpuinfo_x86 *c);
> -
> +extern void intel_cpuid_faulting_flip(unsigned int enable);
> 
> Should we remove this part at all? Seems it is not used now.

Done. Thanks.

> Shan Haitao
> 
> -----Original Message-----
> From: Keir Fraser [mailto:keir.xen@xxxxxxxxx]
> Sent: Saturday, July 02, 2011 3:50 PM
> To: Tian, Kevin; Liu, Jinsong; xen-devel@xxxxxxxxxxxxxxxxxxx
> Cc: Shan, Haitao; Li, Xin
> Subject: Re: [PATCH] X86: cpuid faulting feature enable
> 
> On 02/07/2011 04:15, "Tian, Kevin" <kevin.tian@xxxxxxxxx> wrote:
> 
>>> From: Keir Fraser [mailto:keir.xen@xxxxxxxxx] On Behalf Of Keir
>>> Fraser
>>> Sent: Saturday, July 02, 2011 5:31 AM
>>> 
>>> On 01/07/2011 15:32, "Liu, Jinsong" <jinsong.liu@xxxxxxxxx> wrote:
>>> 
>>>> X86: cpuid faulting feature enable
>>>> 
>>>> Latest Intel processor add cpuid faulting feature. This patch is
>>>> used to support cpuid faulting in Xen.
>>>> Like cpuid spoofing, cpuid faulting mainly used to support live migration.
>>>> When cpl>0, cpuid instruction will produce GP, vmm then emulate
>>>> execution
>>> of
>>>> the cpuid instruction. Hence will appear to guest software the value
>>>> chosen
>>> by
>>>> the vmm.
>>> 
>>> I fixed this up quite a bit and applied as c/s 23653. Please take a
>>> look and give it a test. In particular note the changes I made in
>>> intel_init(), to make sure that APs are at least as featureful as the
>>> BSP w.r.t. cpuid faulting.
>>> 
>> 
>> 2.42 + } else if (boot_cpu_has(X86_FEATURE_CPUID_FAULTING)) {
>>     2.43 +  BUG_ON(!probe_intel_cpuid_faulting());
>>     2.44 +  set_bit(X86_FEATURE_CPUID_FAULTING, c->x86_capability);
>>     2.45 + }
>>     2.46 +
>>     2.47 + if (!cpu_has_cpuid_faulting)
>>     2.48 +  set_cpuidmask(c);
>>     2.49 +
>>     2.50 + BUG_ON(cpu_has(c, X86_FEATURE_CPUID_FAULTING) !=
>>     2.51 +        boot_cpu_has(X86_FEATURE_CPUID_FAULTING));
>> 
>> the latter BUG_ON is useless since if AP is inconsistent with BSP we
>> already get bug triggered in earlier BUG_ON.
> 
> Oops, I forgot to remove the redundant second BUG_ON. I'll do that now.
> Thanks!
> 
>  -- Keir
> 
>> Thanks
>> Kevin
> 
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.