[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 09/12] x86: Derive XEN_MSR_PAT from its individual entries


  • To: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 15 Dec 2022 18:04:24 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=joACZuB7eayAGdWkq5p/H+gFVogyIlOu+gwzFJI+zIY=; b=RKK08PVj0jbYyZcqZ366UARIgQnuGVNyWIJ5OVY+XUyA3R+w86VPW2+88oGlp4iidKkhZZbpnEx4m6bySMbCJUJtJ/tFbOmJ9w8wbv9G1Urvl5Dki3k0Qi5fP6aqpCi7qThwMuUaNBBWyCaqo2EbjxMLIEmhONWxlsn0E9rfFFVeZpHd8JuSymL3tzzS7o5nsXOW3B9UXHGnoGwhix2HVcSStV8iF4pWs6471RUqyL3w/qZRlBXJmqWwnj3kxIUG+7//M/eBxzOibniZUeYyScCtYlesPM4r5yV4U01Oyh9zYcF/vYHVBAj2jOsjBq106+g4STL2mWMDIoAUf6npjw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EkNtTsFQvqDgiPah29Zi4i7Y/g+RHgT20xd6L6V/l+FebuZdeTRM20z2lFDt4fcMHqHvKTBPotRjRIB4Ql4BbJnFhAyJ02ToDT2AyZ5tIuZRiNDLRPlJ0keZvGfrbrhaqjyMbAAwLF85YmllOoh/QbX6bNz8IN5pjaXVgAS0aNxwMWbfiOdGMxgsPqgvaTkjacH5u3NDaZ6WQG+POR1OJAPrVBe/EHteNGoLr7mdbEhx7cxA/iQP7uXENfIslH4L4o7unS1Qi+fSNAOJS2VDyqtHK7EsSk3s6XzMfswS4XRd/GyVjt/UxacQ2fxExzNvB6h8PmFTq0eKuR7rHg9oPw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Tim Deegan <tim@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 15 Dec 2022 17:04:42 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 15.12.2022 00:11, Demi Marie Obenour wrote:
> --- a/xen/arch/x86/include/asm/processor.h
> +++ b/xen/arch/x86/include/asm/processor.h
> @@ -96,7 +96,15 @@
>   * Host IA32_CR_PAT value to cover all memory types.  This is not the default
>   * MSR_PAT value, and is an ABI with PV guests.
>   */
> -#define XEN_MSR_PAT _AC(0x050100070406, ULL)
> +#define XEN_MSR_PAT (X86_MT_WB  << 0x00 | \
> +                     X86_MT_WT  << 0x08 | \
> +                     X86_MT_UCM << 0x10 | \
> +                     X86_MT_UC  << 0x18 | \
> +                     X86_MT_WC  << 0x20 | \
> +                     X86_MT_WP  << 0x28 | \
> +                     X86_MT_UC  << 0x30 | \
> +                     X86_MT_UC  << 0x38 | \

This wants properly parenthesizing (the shifts against the ors), and
at least the last four constants also look to need casting to uint64_t;
in fact I'm surprised that ...

> +                     0)

(interposed: I don't think this really does any good.)

> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -6355,6 +6355,12 @@ unsigned long get_upper_mfn_bound(void)
>      return min(max_mfn, 1UL << (paddr_bits - PAGE_SHIFT)) - 1;
>  }
>  
> +static void __init __maybe_unused build_assertions(void)
> +{
> +    BUILD_BUG_ON(XEN_MSR_PAT != 0x050100070406ULL &&
> +                 "wrong XEN_MSR_PAT breaks PV guests");

... this didn't trigger for you. (We also don't normally add such
constructs with a string literal to BUILD_BUG_ON() expressions, not
the least because compilers may take issue with such. I'd like to
suggest to convert this to a comment instead.)

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.