|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/6] libx86: Split x86_cpuid_policy_fill_native() out of calculate_raw_policy()
>>> On 09.11.18 at 17:24, <andrew.cooper3@xxxxxxxxxx> wrote:
> On 06/11/18 13:44, Jan Beulich wrote:
>>>>> On 05.11.18 at 12:21, <andrew.cooper3@xxxxxxxxxx> wrote:
>>> --- a/xen/include/xen/lib/x86/cpuid.h
>>> +++ b/xen/include/xen/lib/x86/cpuid.h
>>> @@ -20,6 +20,21 @@ struct cpuid_leaf
>>> uint32_t a, b, c, d;
>>> };
>>>
>>> +static inline void cpuid_leaf(uint32_t leaf, struct cpuid_leaf *l)
>>> +{
>>> + asm volatile ( "cpuid"
>>> + : "=a" (l->a), "=b" (l->b), "=c" (l->c), "=d" (l->d)
>>> + : "a" (leaf) );
>>> +}
>>> +
>>> +static inline void cpuid_count_leaf(
>>> + uint32_t leaf, uint32_t subleaf, struct cpuid_leaf *l)
>>> +{
>>> + asm volatile ( "cpuid"
>>> + : "=a" (l->a), "=b" (l->b), "=c" (l->c), "=d" (l->d)
>>> + : "a" (leaf), "c" (subleaf) );
>>> +}
>> Especially with this now being library code (i.e. side effects like
>> serialization not being supposed to be of interest): Why
>> volatile?
>
> Force of habit, I think. I'll drop volatile here.
>
> We should probably do the same for Xen, although there is one place in
> the Intel ucode handler which would need adjusting to cope.
And that construct would probably better get a name which
expresses the need for / purpose of the barrier.
>>> --- a/xen/lib/x86/cpuid.c
>>> +++ b/xen/lib/x86/cpuid.c
>>> @@ -2,6 +2,114 @@
>>>
>>> #include <xen/lib/x86/cpuid.h>
>>>
>>> +void x86_cpuid_policy_fill_native(struct cpuid_policy *p)
>>> +{
>>> + unsigned int i;
>>> +
>>> + cpuid_leaf(0, &p->basic.raw[0]);
>>> + for ( i = 1; i < min(ARRAY_SIZE(p->basic.raw),
>>> + p->basic.max_leaf + 1ul); ++i )
>>> + {
>>> + switch ( i )
>>> + {
>>> + case 0x4: case 0x7: case 0xb: case 0xd:
>>> + /* Multi-invocation leaves. Deferred. */
>>> + continue;
>>> + }
>>> +
>>> + cpuid_leaf(i, &p->basic.raw[i]);
>>> + }
>>> +
>>> + if ( p->basic.max_leaf >= 4 )
>>> + {
>>> + for ( i = 0; i < ARRAY_SIZE(p->cache.raw); ++i )
>>> + {
>>> + union {
>>> + struct cpuid_leaf l;
>>> + struct cpuid_cache_leaf c;
>>> + } u;
>>> +
>>> + cpuid_count_leaf(4, i, &u.l);
>>> +
>>> + if ( u.c.type == 0 )
>>> + break;
>>> +
>>> + p->cache.subleaf[i] = u.c;
>>> + }
>>> +
>>> + /*
>>> + * The choice of CPUID_GUEST_NR_CACHE is arbitrary. It is expected
>>> + * that it will eventually need increasing for future hardware.
>>> + */
>>> +#ifdef __XEN__
>>> + if ( i == ARRAY_SIZE(p->cache.raw) )
>>> + printk(XENLOG_WARNING
>>> + "CPUID: Insufficient Leaf 4 space for this hardware\n");
>>> +#endif
>> There being another similar instance further down, and possibly
>> new ones to appear later, plus such a warning potentially also
>> being of interest in the harness - would you mind abstracting
>> (could be as simple as making printk() and XENLOG_* available
>> where needed, provided there's no consumer which would
>> rather not want such logging) this so it can go without #ifdef-ary?
>
> Well - it was this consideration which caused me to omit it.
>
> Realistically, the first situation to hit this message will be someone
> booting Xen on a brand new piece of hardware, so I expect changes to the
> structure size to come from vendors.
>
> One user is the AFL fuzzer, and that definitely doesn't want to be
> spitting out a warning on every fork().
It could still use a construct to spit out a warning exactly once.
Arguably this might be a little difficult to arrange for.
> The other current user is the
> x86 instruction emulator, where this functionality isn't the interesting
> part.
But such a warning might be a helpful explanation of why some
test failed.
> Furthermore, I don't expect the toolstack to be making use of
> this itself, so it won't be useful to attempt to plumb the message
> through there.
Sure. Overall I'm not going to insist on extending the logging as
suggested (albeit Roger iirc had asked for it too), so with the
volatile-s above dropped and with the expectation that you
wouldn't object to extending the logging down the road, should
it turn out useful to have outside of the hypervisor
Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |