[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 3/3] xen/arm: Add sb instruction support


  • To: Julien Grall <julien@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Mon, 9 May 2022 10:08:36 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NMD+1rX2smqdWe5glCzpCqzZ041JJCDEaklYaBOfhsM=; b=UT8Dazjp8r5Y8PdtG/bgPb/4KHWugfD+4EHJmQg+GDUqZiyZdlno5wDaUXX3JO1NXjKL0/GODf6Ah0nX+qHg+tlfAx6mBHwViZWEhkusVoihvo2UYZAh7xDHFHd+7v31ABz4YEZaRtnEzi6sAaklrMEHBxL/Z7aLEv53ebsShkPKInK2l3gpq3iR/vMCnybJukegEaUAXu4GxdIzVXZjBCom5pu34d4fUaGyJXDr3Sl8XnFecya86RsGyJMDX9AloGp6NXR5zU8wsuPb4ysvy5wbxj1DQ+nSb3gezojV0WGQWDUBX5gb3yAz8xWbXOUt/Y287BRB2xF0eKXsenAPiQ==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NMD+1rX2smqdWe5glCzpCqzZ041JJCDEaklYaBOfhsM=; b=EMms+gqD+nD9BM9RQruzJ+OBvANTHvkNamIlMgeoq6tF0BC8R/RIQpUMBk3X2OpWD4hzbB/v57oDTYsteuCDurBb9ZGEeWxLGxIXoHRvAlYFPscAeyYS3aMUDqev+70o5WHwbbG8xpU/GCHhMAjlRYtbdqUzkQA+RDjSwq6QxPX7clklkR0Yu+KKPlztztYNTT+8nTeufLs4W4WfpUzdX7aW+of6QUB2bamwFpX4AxH3HYUy1LaFnFv7Kt+n2mdDyMkUtoS31Jopmk9CxIk1xC5gruJE8CnwUr0QeH6g65CWQG+GfwP4+mLCqKMZeb0+CrMXkP1xdOa9L2AgnME+HA==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=WrSKzBJTanAkqMLP45F3XWtKC+2oGaZ27lDjW1mYwIZQvf0N0vhoIvBkg3o7VXQ3VqYj7tXNkHvA1ja8UUPjtoHYwSBOCtjKOoNQ3MnQmtH4SE95/9BBiMYzg1EKSjN18SIr4UYoTEySD+VDJ1Leem0rSzYzBx5o6JBLR4W7rQDG6Siji24hkJW/GQzaai9GAOob2+LlV0BaqFdlTktIfFcysfKM6trDUxKVPmFSFloysaAUkOESWFoRpMbMoOX6fK3MYlLXuGvVykjJndlIq9oATJAwJSKtg5Cw1DV+02uxDBIRtVlS3xhlDSo2HNK+SmgHTh47hzJ78Z6h0rNfOA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Z46g1YaqoAcsJtJYfsqPk/oFn90NPJxtJauA1iQH2YAwrtEcdyAZJnWRVaIdh3QwJz66I9I0kvIH3UqCf4QUfefCj/qTgLsrFDyuGsstDrzTxNYN0QjLY0N4JMPAyMVRCzp8TZRsB+HjaTrZqO9KFG1T0yaigo+Cvq1GWFNoZfnjf64ifgDIbbx5RUZDF52ODUq9SfB7QqjHH2YZJOv601cD7e9ZDmxnz3gI90Jr63zdicTFtunTjFjopEZj0lB1yEpAkjZg7tuBB2bN/09OOQBu6MzGgALSbLFEy2IwM56UCu0YZCql9ds4CbBwnlt/gAYFaZhQFiYpch9hpKbPHg==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Mon, 09 May 2022 10:08:56 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYXtGbLw8lUArxPEOQFl634Avmjq0NftKAgADToQCAAAuUAIAH/dMA
  • Thread-topic: [PATCH 3/3] xen/arm: Add sb instruction support

Hi Julien,

> On 4 May 2022, at 09:06, Julien Grall <julien@xxxxxxx> wrote:
> 
> 
> 
> On 04/05/2022 08:24, Bertrand Marquis wrote:
>> Hi Julien,
> 
> Hi Bertrand,
> 
>>> On 3 May 2022, at 19:47, Julien Grall <julien@xxxxxxx> wrote:
>>>> A new cpuerrata capability is introduced to enable the alternative
>>> 
>>> 'sb' is definitely not an erratum. Errata are for stuff that are meant to 
>>> be specific to one (or multiple) CPU and they are not part of the 
>>> architecture.
>>> 
>>> This is the first time we introduce a feature in Xen. So we need to add a 
>>> new array in cpufeature.c that will cover 'SB' for now. In future we could 
>>> add feature like pointer auth, LSE atomics...
>> I am not quite sure why you would want to do that.
>> Using the sb instruction is definitely something to do to solve erratas, if 
>> a CPU is not impacted by those erratas, why would you want to use this ?
> 
> I agree that SB is used to solve errata but the instruction itself is not a 
> workaround (it may be part of it though). Instead, this is a more efficient 
> way to prevent speculation and will replace dsb/isb.
> 
> Speculation is never going to disappear from processor. So, in the future, 
> there might be valid reason for us to say "We don't want the processor to 
> speculate". This would mean using SB.

If the need arise then we will check depending on that how we can support it 
but in the current status as there is no use case I don’t think we need that.

Cheers
Bertrand


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.