[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2] x86/msr: fix X2APIC_LAST


  • To: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 26 Jul 2022 17:47:38 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YJVgy2h8KL58ca9SLkpUIZ7kl9xylz5GmOf1zkLhxng=; b=TQaGxR0HC7O4SHFdaVJEcTLmLZgZwnpOpTQE385h3bq8BBTB7/xeRXrJQM4BIsRFcZV2UsQb2+lFNPc7FPtZq/0BY58rIVgsYdO9sDnJTK73h566DReSJi4jAUdT37EhSq0TDLolmBnBDFnVQNN6gaPuPU6VzZE8Yyf6krCnY9DajJxqKNF5kuoKr+fS5fHTqmrIJb5oOUKrJ8GlGPKHS8VRCikBD6axjhVwz2tduKYltx7N/3QFnkHzothv80IEszeJNiAf1/bD7acz03vMpehTl/UcEkn4magjlXV3+y00PyjzObIB9ARPzkfNUtYELe5i1PBnQ5x8majc/W+MNg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kaAiUXt3ZTicNT2tobxphGDg72mOeMm97rMzysEVy0moRa9spkS1fYE5Xmd2XM0z9LoN+Vn12DljJiWWc1gKpVGVB84dyzHavzk+QZ9fWlEy7xQ6jqsDBeH6UG9xxA9mQ/PAIhFnopkedF8MyeBD/r1NMAdw6du2eERWm5/LpCOnIzWFgV1HRjeX20QZGD6vBvXe5WSfu+Z0eMbdTiJ3VeDhfLdCtLYrsaZ4zBI4x/NMfCz5mECvsvzwkAUzs/o61mxTkM0eRj156VdORQI0UPB5A7BjrXgnrGruKc0CI8lSx50+6Y60tf+4Xs779tklhott1VhyE82M5dw54k8PUg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Edwin Torok <edvin.torok@xxxxxxxxxx>
  • Delivery-date: Tue, 26 Jul 2022 15:47:45 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 26.07.2022 17:42, Andrew Cooper wrote:
> On 26/07/2022 16:33, Jan Beulich wrote:
>> On 26.07.2022 17:28, Edwin Török wrote:
>>> The latest Intel manual now says the X2APIC reserved range is only
>>> 0x800 to 0x8ff (NOT 0xbff).
>>> This changed between SDM 68 (Nov 2018) and SDM 69 (Jan 2019).
>>> The AMD manual documents 0x800-0x8ff too.
>>>
>>> There are non-X2APIC MSRs in the 0x900-0xbff range now:
>>> e.g. 0x981 is IA32_TME_CAPABILITY, an architectural MSR.
>>>
>>> The new MSR in this range appears to have been introduced in Icelake,
>>> so this commit should be backported to Xen versions supporting Icelake.
>>>
>>> Backport: 4.13+
>> FAOD nevertheless it'll be applied only back to 4.15.
> 
> It shouldn't go back before 4.16, because otherwise we start exposing a
> bunch of MSRs (including undocumented ones on Haswell/Broadwell) which
> were previously disallowed.

Hmm, I'm confused - how would the limiting of this range cause more
MSRs to be exposed in 4.15?

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.