WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH] x86: don't write_tsc() non-zero values on CPUs u

To: "Keir Fraser" <keir.xen@xxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] x86: don't write_tsc() non-zero values on CPUs updating only the lower 32 bits
From: "Jan Beulich" <JBeulich@xxxxxxxxxx>
Date: Thu, 14 Apr 2011 09:06:45 +0100
Cc: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, "winston.l.wang" <winston.l.wang@xxxxxxxxx>
Delivery-date: Thu, 14 Apr 2011 01:06:37 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <C9CC65DD.1654D%keir.xen@xxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <4DA6C16F020000780003B899@xxxxxxxxxxxxxxxxxx> <C9CC65DD.1654D%keir.xen@xxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
>>> On 14.04.11 at 09:50, Keir Fraser <keir.xen@xxxxxxxxx> wrote:
> On 14/04/2011 08:42, "Jan Beulich" <JBeulich@xxxxxxxxxx> wrote:
> 
>>>>> On 14.04.11 at 09:25, Keir Fraser <keir.xen@xxxxxxxxx> wrote:
>>> On 14/04/2011 08:18, "Jan Beulich" <JBeulich@xxxxxxxxxx> wrote:
>>> 
>>>> This means suppressing the uses in time_calibration_tsc_rendezvous(),
>>>> cstate_restore_tsc(), and synchronize_tsc_slave(), and fixes a boot
>>>> hang of Linux Dom0 when loading processor.ko on such systems that
>>>> have support for C states above C1.
>>> 
>>> Should your new test be gated on !X86_FEATURE_TSC_RELIABLE? We already
>> 
>> Which test? The write-TSC-probe itself?
>> 
>>> *never* write the TSC when boot_cpu_has(TSC_RELIABLE) -- Dan Magenheimer
>>> made that change on the assumption that TSCs were globally synced by
>>> firmware in this case, and us writing one or more TSCs could only ever make
>>> things worse.
>> 
>> That's not true - we only avoid the writing for TSC sync during boot.
>> Post-boot bringup of CPUs will write the TSC no matter what, and
> 
> For physically-added CPUs only. Kind of unavoidable, that one: we can only
> try to do our best in that case. And let's face it, that probably affects
> exactly zero production users of Xen/x86 right now.

That latter part I agree to.

But what are you afraid of? Probing the TSC write shouldn't do any
harm. Additionally, did you read the comment immediately preceding
the probing code? AMD doesn't guarantee the TSC to be writable at
all.

>> cstate_restore_tsc() also has no such gating afaics.
> 
> It is gated on NONSTOP_TSC which is implied by TSC_RELIABLE.

Ah, yes. But (I think) not architecturally, only by virtue of how
code is currently structured. If that changes, we'd be back at a
latent (and quite non-obvious) bug.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>