[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v3 09/12] x86: Derive XEN_MSR_PAT from its individual entries
- To: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Date: Thu, 15 Dec 2022 18:04:24 +0100
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=joACZuB7eayAGdWkq5p/H+gFVogyIlOu+gwzFJI+zIY=; b=RKK08PVj0jbYyZcqZ366UARIgQnuGVNyWIJ5OVY+XUyA3R+w86VPW2+88oGlp4iidKkhZZbpnEx4m6bySMbCJUJtJ/tFbOmJ9w8wbv9G1Urvl5Dki3k0Qi5fP6aqpCi7qThwMuUaNBBWyCaqo2EbjxMLIEmhONWxlsn0E9rfFFVeZpHd8JuSymL3tzzS7o5nsXOW3B9UXHGnoGwhix2HVcSStV8iF4pWs6471RUqyL3w/qZRlBXJmqWwnj3kxIUG+7//M/eBxzOibniZUeYyScCtYlesPM4r5yV4U01Oyh9zYcF/vYHVBAj2jOsjBq106+g4STL2mWMDIoAUf6npjw==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EkNtTsFQvqDgiPah29Zi4i7Y/g+RHgT20xd6L6V/l+FebuZdeTRM20z2lFDt4fcMHqHvKTBPotRjRIB4Ql4BbJnFhAyJ02ToDT2AyZ5tIuZRiNDLRPlJ0keZvGfrbrhaqjyMbAAwLF85YmllOoh/QbX6bNz8IN5pjaXVgAS0aNxwMWbfiOdGMxgsPqgvaTkjacH5u3NDaZ6WQG+POR1OJAPrVBe/EHteNGoLr7mdbEhx7cxA/iQP7uXENfIslH4L4o7unS1Qi+fSNAOJS2VDyqtHK7EsSk3s6XzMfswS4XRd/GyVjt/UxacQ2fxExzNvB6h8PmFTq0eKuR7rHg9oPw==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
- Cc: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Tim Deegan <tim@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
- Delivery-date: Thu, 15 Dec 2022 17:04:42 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 15.12.2022 00:11, Demi Marie Obenour wrote:
> --- a/xen/arch/x86/include/asm/processor.h
> +++ b/xen/arch/x86/include/asm/processor.h
> @@ -96,7 +96,15 @@
> * Host IA32_CR_PAT value to cover all memory types. This is not the default
> * MSR_PAT value, and is an ABI with PV guests.
> */
> -#define XEN_MSR_PAT _AC(0x050100070406, ULL)
> +#define XEN_MSR_PAT (X86_MT_WB << 0x00 | \
> + X86_MT_WT << 0x08 | \
> + X86_MT_UCM << 0x10 | \
> + X86_MT_UC << 0x18 | \
> + X86_MT_WC << 0x20 | \
> + X86_MT_WP << 0x28 | \
> + X86_MT_UC << 0x30 | \
> + X86_MT_UC << 0x38 | \
This wants properly parenthesizing (the shifts against the ors), and
at least the last four constants also look to need casting to uint64_t;
in fact I'm surprised that ...
> + 0)
(interposed: I don't think this really does any good.)
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -6355,6 +6355,12 @@ unsigned long get_upper_mfn_bound(void)
> return min(max_mfn, 1UL << (paddr_bits - PAGE_SHIFT)) - 1;
> }
>
> +static void __init __maybe_unused build_assertions(void)
> +{
> + BUILD_BUG_ON(XEN_MSR_PAT != 0x050100070406ULL &&
> + "wrong XEN_MSR_PAT breaks PV guests");
... this didn't trigger for you. (We also don't normally add such
constructs with a string literal to BUILD_BUG_ON() expressions, not
the least because compilers may take issue with such. I'd like to
suggest to convert this to a comment instead.)
Jan
|