[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen backports


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Jan Beulich <JBeulich@xxxxxxxx>
  • Date: Fri, 19 Jul 2019 13:53:19 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=suse.com;dmarc=pass action=none header.from=suse.com;dkim=pass header.d=suse.com;arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+7dY0iwJbNTbJyaNNiWotRfnIz1gPooYon8sfa3Pt2M=; b=VrWBlqos8AvfS+4Djqvrb9IcYj/IlgW0+joxUvORxCJcf3aV8Cl9EmguDppVmOt/qvXl84X+FH2X+BaFBQW1ARG39mIyDXZEgZ6zxdNpuvF4RdYZcIhRbMRVz2qKCSos6sCyEsG8ili6u0M4Fa0bJ+gPww3wzCL+s96646ovJwVmt2TK519ChAzTfRSfnOF2aIzTkNWBni9/E82yYIY3vF0r1x3OJwCbSssY2Pgi5Y2cBRp4rIkhxl1McFzygcA7rGlijxRIHL1jF1cVemIIbcI6iDf6DZPons+iBkcvX4VdWrkQQmsoz3JBDFS2PnvOCBKQ7VK0LP8s6I4uhUZHUw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PSEiM6T1hic/JfyAtECfyEBlUkOs+gERJ04POrgQrFHGgw2pH43Du2aoLfdYV8xD/1QeHJjThsUi0f6W/5mXGNSrStXrIUj9mDRUS4Xz7iTjQWeZbDRJcF4ZslYevoCGEopRFEKS4nBs2U8G7GJF/+oUoPRwnqjG5rKYK5G0uzmbkGj5jr6dYovqQXfV5uvcD0SN+8xv6RWE2pOQ7bt0COUtRPCWXLYxjG+jEzxOipWvoCWcApYS/tspckxnnWWxNjZkzSTNAOaM4JHTVEJgittIBeGQ7pjn/WGQXeF0NXRBisrOBWTFloAowXgfrL3d4ILo9WyNf99bNKymjUlNJA==
  • Authentication-results: spf=none (sender IP is ) smtp.mailfrom=JBeulich@xxxxxxxx;
  • Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Fri, 19 Jul 2019 13:53:45 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHVO9HjbKERKAK8KESn0Dh8RZ+rnabR+vwA
  • Thread-topic: Xen backports

On 16.07.2019 14:27, Andrew Cooper wrote:
> Bugfixes:
> 
> 65c165d6595f - x86/xstate: Don't special case feature collection
> 013896cb8b2f - x86/msr: Fix handling of
> MSR_AMD_PATCHLEVEL/MSR_IA32_UCODE_REV
> 7d161f653755 - x86/svm: Fix svm_vmcb_dump() when used in current context
> 9b757bdc1794 - x86/boot: Don't leak the module_map allocation in
> __start_xen()
> 
> The backport for the microcode MSR is rather tricky to rebase over the
> x86_vendor bitmap changes.  I've already got it locally.

Not overly tricky I would say, but requiring attention. While doing
this I've run into two questions:

1) Was it really a good idea to remove the write to the MSR and the
CPUID invocation from the read path? The comment says 'A guest might
itself perform the "write 0, CPUID, read" sequence', but that won't
help at all if the specific vCPU gets re-scheduled in the middle. And
there may not have been any ucode load we've done, which we could
then guarantee was followed by a CPUID invocation.

2) We still haven't got confirmation that Hygon behaves the same ucode-
wise, have we?

> Enhancements:
> 
> 787619a0640e - tools: re-sync CPUID leaf 7 tables (perhaps only the
> xen-cpuid bits.)
> 260acc521db4 - x86/clear_page: Update clear_page_sse2() after dropping
> 32bit Xen
> 564d261687c0 - x86/ctxt-switch: Document and improve GDT handling

The last one doesn't even come close to applying, due to its dependency
on 12dce7ea5a. While I think that's a little too much, I've still
decided to pull in both (but for now I'll perhaps do this only for 4.12)
in anticipation of us wanting to at least consider a backport of the
core scheduling series (assuming it won't take too long to get fully
ready).

> Altp2m: While altp2m isn't supported yet, it would be very helpful to
> two downstreams to take these fixes while we work on getting it fully
> supported.
> 
> 44f3c3cdd315 - x86/altp2m: treat view 0 as the hostp2m in
> p2m_get_mem_access()
> 8228577ad1ba - x86/hvm: Fix altp2m_op hypercall continuations
> 9abcac7ff145 - x86/altp2m: cleanup p2m_altp2m_lazy_copy
> df4e4cafd28d - x86/altp2m: Fix style errors introduced with c/s 9abcac7ff

I'll apply all of these soon.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.