[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] x86/ucode: Refresh raw CPU policy after microcode load
- To: Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Date: Thu, 4 May 2023 10:28:32 +0100
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3SjYCgeiKRFBUkUBBZDSAPkT9FgNhZv7QMCfPzQlePU=; b=TgZU8yiUIjlX21UkprydHslXERHz794xIeVWQmB0sEOMNYzwm13cx5SR1ESUV0EAyS+VVEi2WPBzuPSGflL2Qebxnm+SZqUuRJx9A5kasADsdYH8AtiDE7uL0nPpwNyydCYjFi0af8vBY0Ctrx7F/R49lH3S/Ct2Ww5w7MWNUOsLDJ0FbLGY5tgUY683iWnmU434R+aV/NLRAjOYxFTJrMv+cvhFmqH0U57mQt5xUIVIi5DMzvOvWC/9Y9I7XUfmQngHJ6a8RXF6Tm7azRSNadlCpKG5ALXpFpsVhFyyC2Kui4Plo95Z9UBtUQ6yFi6z337jCM1cS7FJKcL1DET1PQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aU8cJwsCVGaNz4grwnsgSMsATAvip8qDZxxOl9rN700sWG5GoGd7eUzt93eQgCrRbAgM2OEe2xQ0dzXve1sDrthvkHxQVWi+7nv64O8IyM1MwBP2QB+jzTYZ7kUAzFu8goWaW+AGLLAizniEYZsG45ZhWtiRdErtTcutbHvhutJ/2CC+HwxJWHGmj2cikUs2xlIu0o7n0WCs/QhJIkX63NJkukwe5FkMHgRKJowb592egqazi8XOg9ii6PeQ8dPq7et5eNuT3zebM/Ma+n7lYOpuGDra1CXcRzO2Xi7NV5TtrKEL9S2C0aJfsGNLUf8p2HUcJvLsFq+F1L4syk79Pg==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
- Cc: Wei Liu <wl@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- Delivery-date: Thu, 04 May 2023 09:29:15 +0000
- Ironport-data: A9a23:8/+nHamy59lAXDffA2U24Gjo5gysJ0RdPkR7XQ2eYbSJt1+Wr1Gzt xIYXmCOO62MNmH8f4t/b4u3pksEsZeHzodjQFRrriBmHiMWpZLJC+rCIxarNUt+DCFhoGFPt JxCN4aafKjYaleG+39B55C49SEUOZmgH+a6U6icfHgqH2eIcQ954Tp7gek1n4V0ttawBgKJq LvartbWfVSowFaYCEpNg064gE4p7aWaVA8w5ARkPqgW5AOGzhH5MbpETU2PByqgKmVrNrbSq 9brlNmR4m7f9hExPdKp+p6TnpoiG+O60aCm0xK6aoD66vRwjnVaPpUTbZLwXXx/mTSR9+2d/ f0W3XCGpaXFCYWX8AgVe0Ew/yiTpsSq8pefSZS0mZT7I0Er7xIAahihZa07FdRwxwp5PY1B3 fYWcD41byyEvOirmfGWb/dcj98bFsa+aevzulk4pd3YJdAPZMmaBo7tvJpf1jp2gd1SF/HDY cZfcSBocBnLfxxIPBEQFY46m+CrwHL4dlW0qnrM/fZxvzeVkVI3iee2WDbWUoXiqcF9t0CUv G/ZuU/+BQkXLoe3wjuZ6HO8wOTImEsXXapLTOPlp6Iy3AH7Kmo7DzE6WlKFi8mAtXWRHPB7e 3FE9zQwsv1nnKCsZpynN/Gim1aGtBMBX9tbE8Uh9RqAjKHT5m6xGWwsXjNHLts8u6ceVTEsk 1OEgd7tLThuq6GOD2KQ8K+OqjG/MjRTKnUNDRLoViMA6tjn5Yo01xTGS486FLbv14KuXzbt3 zqNsS4ywa0JitIG3Lm6+laBhC+wop/OTUg+4QC/sn+Z0z6VrbWNP+SAgWU3J94ZRGpFZjFtZ EQ5pvU=
- Ironport-hdrordr: A9a23:4AJsOKEyLLSAaDbipLqE+ceALOsnbusQ8zAXPiFKJCC9F/by/f xG885rtiMc9wxhOk3I9ervBEDiex/hHPxOgbX5VI3KNDUO01HGEGgN1+rfKjTbakjDytI=
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 04/05/2023 10:07 am, Jan Beulich wrote:
> On 04.05.2023 10:22, Roger Pau Monné wrote:
>> On Thu, May 04, 2023 at 09:08:02AM +0100, Andrew Cooper wrote:
>>> On 04/05/2023 8:08 am, Jan Beulich wrote:
>>>> On 03.05.2023 20:58, Andrew Cooper wrote:
>>>>> Loading microcode can cause new features to appear.
>>>> Or disappear (LWP)? While I don't think we want to panic() in this
>>>> case (we do on the S3 resume path when recheck_cpu_features() fails
>>>> on the BSP), it would seem to me that we want to go a step further
>>>> than you do and at least warn when a feature went amiss. Or is that
>>>> too much of a scope-creeping request right here?
>>> You're correct that I ought to discuss the disappear case. But like
>>> livepatching, it's firmly in the realm of "the end user takes
>>> responsibility for trying this in their test system before running it in
>>> production".
>>>
>>> For LWP specifically, we ought to explicitly permit its disappearance in
>>> recheck_cpu_features(), because this specific example is known to exist,
>>> and known safe as Xen never used or virtualised LWP functionality.
>>> Crashing on S3
>> Printing disappearing features might be a nice bonus, but could be
>> done from the tool that loads the microcode itself, no need to do such
>> work in the hypervisor IMO.
Xen is really the only entity in a position to judge when stuff has gone
away, so this can't really be deferred to another tool.
We have the X86_FEATURE_* names during boot for parsing the
{dom0-}cpuid= command line options, but we don't keep this beyond init
> Except that the system may not last long enough for the (or any) tool
> to actually make it to producing such output, let alone any human
> actually observing it (when that output isn't necessarily going to
> some remote system).
Yeah, `xl dmesg`/serial/whatever is the one place liable for anything
like this to get noticed.
~Andrew
|