WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [Patch] x86: enforce strict memory order for x2apic

To: "Tian, Kevin" <kevin.tian@xxxxxxxxx>, 'Jan Beulich' <jbeulich@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [Patch] x86: enforce strict memory order for x2apic
From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Date: Thu, 25 Sep 2008 10:04:21 +0100
Cc:
Delivery-date: Thu, 25 Sep 2008 02:05:17 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <D8078B8B3B09934AA9F8F2D5FB3F28CE08873AF31D@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acke6BxdawHaFq+URY+zIa4qA4I70QAABTqAAABltNkAAAIm0AAAEePQAADmmvI=
Thread-topic: [Xen-devel] [Patch] x86: enforce strict memory order for x2apic
User-agent: Microsoft-Entourage/11.4.0.080122
Yes. Now applied as c/s 18541 including explanation of why mb() inside
send_IPI_mask_x2apic() is sufficient (it's subtle!).

 -- Keir

On 25/9/08 09:40, "Tian, Kevin" <kevin.tian@xxxxxxxxx> wrote:

> Please forget this one. I made mistake since we'll assume
> send_IPI_mask as a barrier now. :-)
> 
> Thanks,
> Kevin
> 
>> From: Tian, Kevin
>> Sent: 2008年9月25日 16:39
>> 
>>> From: Keir Fraser [mailto:keir.fraser@xxxxxxxxxxxxx]
>>> Sent: 2008年9月25日 16:36
>>> 
>>> On 25/9/08 09:29, "Tian, Kevin" <kevin.tian@xxxxxxxxx> wrote:
>>> 
>>>>> On the other hand you're penalizing LAPIC systems with
>>> this, too. I'm
>>>>> not certain that's better than fixing the (incorrect)
>>>>> assumptions just in
>>>>> the x2APIC case.
>>>> 
>>>> I agree. I'll revise the patch to add a 'mb()' in x2APIC instead,
>>>> though that may bring a bit overhead to cases when fencing
>>>> is not required, like event check IPI.
>>> 
>>> To be precise, mb() at top of send_IPI_mask_x2apic(), and
>>> wmb() may as well
>>> go from on_selected_cpus() as we can assume send_IPI_mask() is
>>> a barrier.
>>> 
>>> I'll do the patch for this myself.
>>> 
>> 
>> Yes, and thanks. Also please add a wmb() in flush_area_mask,
>> though it's a nop but semanticly desired like for on_selected_cpus.
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel