[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v6 1/7] x86: suppress ERMS for internal use when MISC_ENABLE.FAST_STRING is clear
- To: Jan Beulich <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Date: Mon, 23 Jun 2025 18:17:14 -0400
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=suse.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rt0UPu+S261Zn1+GKpqfNJa+/PTYivDgXJFkd0z5YsQ=; b=XBR1lsyh6qQnw5cgje+UVhYy7eSRB+8ezjtnPdvNw4SFpZQuW9YEF/43y2s7LW1tkhVIQnV5Cpb2pJOshQDfTGwNcLS9Xh/rnjXeXOG81PS/nmhjYhTmbF5gie+9fyUyGNaJ/4ztOnPZcQTwQZmzn7FiV8wstrpN0P91dLIG1uT59y3JvavHKAByzPSPI0JtYH5RQ78qY/vOZlG5rmryn0q/j8lL6xamXtUxnHR3dpXje9LLseywoFyaPnxa+HMMxYveUX5zw0+5poFWvdtW+N3fzPGOUSdcXDw6alV0dzqFwGYQ7wtva2pImnzorSidTbw0uqPKbpBuTYoL6u5Qwg==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cl6fjI8TSVNOZ9D7zcLCyX0VV7/tb64jJKdwFlmy74tkX+QJqlhkq7/v13IpyvuK7x+teb55tABU/jKEnOvKWAf0Mj9sG5GH6Y5EATCsvZrVQQstfoHUQt2iPkkBqDMFn8uGS97oBpMnqJUYQ9qmbUWFhjfUtIAkWX7KueTTxVRRKn43HbrPa40T0Sc/Zb9oiEldLy8ZIXRdOYmzr45MGwQ3YtL9l7F7Bz4q9iKJBLBj1G2E8tmPKEF53WBEz2tu4u+SYUcbpF/+hvVxmPReoqISMUajb9WXfV0D6HLqsaPV4yBRFYUmD1II9UnXwo68hwt5J3A3wzV0xRY2Z5FHBg==
- Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
- Delivery-date: Mon, 23 Jun 2025 22:20:05 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 2025-06-16 08:59, Jan Beulich wrote:
Before we start actually adjusting behavior when ERMS is available,
follow Linux commit 161ec53c702c ("x86, mem, intel: Initialize Enhanced
REP MOVSB/STOSB") and zap the CPUID-derived feature flag when the MSR
bit is clear. Don't extend the artificial clearing to guest view,
though: Guests can take their own decision in this regard, as they can
read (most of) MISC_ENABLE.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Reviewed-by: Jason Andryuk <jason.andryuk@xxxxxxx>
|