WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] [PATCH] pvcpuid: mask TSC invariant bit for various circ

To: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>, "Xen-Devel (E-mail)" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: RE: [Xen-devel] [PATCH] pvcpuid: mask TSC invariant bit for various circumstances
From: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
Date: Tue, 27 Oct 2009 13:40:06 -0700 (PDT)
Cc:
Delivery-date: Tue, 27 Oct 2009 13:41:07 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <C70CDB88.18933%keir.fraser@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
> > Frankly, I'm  not very thrilled with the hack-y pvcpuid
> > requirement anyway.  It seemed a nice architected interface
> > if cpuid would work, but would be too easy for a well-intentioned
> > app developer to use cpuid instead of pvcpuid and make
> > incorrect assumptions that would result in app breakage.
> 
> What's hacky about it? It'll probably get used in any 
> 'solution' in some
> way, e.g., to probe for wacky new userland hypercall 
> interfaces. It's our
> standard interface to probe for features and information 
> direct from the
> hypervisor.

No offense intended.  The hacky part is my attempt for
the same cpuid bit (Invariant TSC) to have slightly
different interpretations depending on whether it is
physical (cpuid) or virtualized (pvcpuid); trying to
overload the definition of a single cpuid bit this way seemed
on closer thought fraught with potential confusion, especially
since it isn't a complete solution (for testing rdtsc
"safeness") anyway.

On the other hand, short of exposing a larger set
of "userland hypercalls" (whatever their underlying
implementation), I'm not seeing any better
way to provide this information to an app.

So are you suggesting that the best mechanism for
"userland hypercalls" is special reserved cpuid leaves?

Also, any comments on the meat of my last reply?

Thanks,
Dan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>