[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/CPUID: add further "fast repeated string ops" feature flags


  • To: Jan Beulich <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Fri, 16 Apr 2021 14:38:42 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nbO0UYxMPN49lUgfPa/AOG9MNqxUbjVd/4U7g9nz5T8=; b=mT+v7Kw/ldIEgYjjC7tgkFwY4zdj33WZR2YGmCS0flSaVJRkTVsnNEmQZLhR4YId5oEAOQSIAj3XuvxVUA+7XX0jZ6QlfWQstia+Z6j6vU0SZpoCJgK6LHFtr/Y5DEX0sY9ZKL2V28imwMrGe2jAejH8btP+aKpWw7W6GbE+RDMlNMaJLPfuiVED7uV0Nx+/kY/xz0z+pKlH9cZ0algTud8kuszlN43yuJ7i/fQVi2OOFQwZzuSC15Prg8gHCHs3pePzlCXaRtmqPKlq1Mr01eroFwfk2uGRuB5ilsC+HaVFwH+lxBO4RitQafZT6SGGW2HF7P7pdits+8ORV4/SLQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XTlekXfP1436M76orI2OHfkRSwR2iKkjwFzoJyTu/BqrWnl2CkPZIm6yBR8gBw+UQMd3bqke0BzAYB7fvOPYrQjDz7/LnrqNT9uOC0CB9sH9i9KPQVKiO+r8Kn5aq9DZ00Mn6y59KtsUD2ler0lU2WVMAgH+UIWUUc3CduBeqQvyQk/E6yHNUGKNBFjQtfJr8+gCURuPq45+O4IdsbhISfwCwpNbL4drWQzCI/pHGyAHUgORs7YjXY5joRfDhbnbu+2AWcbDaSDXf0stppj/Sb9/7FCKvR4aZOiztdnDwlbkcIwiio4Bt0DduHnRuy6grr8ILjK6TurNlMwbcoQs1w==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>
  • Delivery-date: Fri, 16 Apr 2021 13:39:09 +0000
  • Ironport-hdrordr: A9a23:ycGq16M2Y3p1FsBcT1Dw55DYdL4zR+YMi2QD/3taDTRIb82VkN 2vlvwH1RnyzA0cQm0khMroAsS9aFvm39pQ7ZMKNbmvGDPntmyhMZ144eLZqQHIMxbVstRQ3a IIScNDIfX7B1RikILe6A63D94vzLC8gdiVrM3ZyGpgShwvTqlm4RtwBArzKDwMeCBtA50lGJ 2AovdWvjbIQwVdUu2XJFkgG9LCqdrCiY78bXc9ayIPxQGSgVqTmdrHOjeC2BN2aVJy6JcktV PIignoopik2svLsyP080/2w9BolMD6yt1Fbfb8wPQ9Djn3kA6naMBAdtS5zVcIidqi4lorj9 XAyi1IV6sc11rrcm64uhfr0QX7uQxejUPK80OSgnfovKXCNVEHIvdBno5Qf1/47EctrbhHoc d29l+ZrJZeAFf8mj387bHzJnNXv3ezyEBDrccjy1hkFacOYr5YqoISuGlPFo0bIS784Ic7VM FzEcD1/p9tAB+nRkGcmlMq7M2nX3w1EBvDaFMFoNap3z9fm20851cExfYYgmwL+PsGOtZ5zt WBFp4tuKBFT8cQY644LvwGW9GLBmvERg+JF26OP1L9FuUiN2jWo5D6pJU5jdvaNqAg/d8Xot DsQVlYvWk9dwbFEsuVxqBG9RjLXSGzRjLoxsZC54Vou7H1SbbxWBfzCGwGoo+FmbEyE8fbU/ G8NNZ9GPn4N1bjHo5Pwkn/VvBpWDojefxQnux+d0OFo8rNJIGvnPfcauzvKL3kFithXmv+B3 AETSXiPcko1DHoZlbIxDzqH1/9cE32+px9VILA+fII9YQLPopQ9g4PiVq44cmPISZYsrM/eV Z/JL+PqNL7mUCGuULzq0l5MBtUCUhYpJ/6VWlRmAMMO0ToNaoYt86HYmBU1nufLhp5R8fbeT Qv4mhfyOaSFdi91CoiA9WoPiamlHMVvmuNVIpZsLaE/93ZdpQxCYsGVKR9GR7QLQF8nR9npQ 54GUs5b36aMgmrqK2+yLQIGenUdrBH8X2WCP8RjUiaiGKxioUEQGABUzunTMiN6DxeOgZ8tx lW6K8QgL2JhDC1D3Aw6d5IfWFkYHiLAb5AEQSObJhVnLeuYw1rUWKWn1Wh+m0OU3uv+EMIim P7KyqIPfnNH1pGo3hdlr3n6VVuawymDjRNQ2E/tY12DmLdvHlvleeNe6qoymOUA2Fytt01IX XAYTEIJBlpyM3y3BmJmCyaHXFjwpk1JOTSAPAidL7Us0ndX7GghOUDH/VO+oxiO82ruugXUf iHcwvQNSjmEYoSqn+oj2dgPDMxpGgvkPvu1hGg5G+k3GQnCf6XJFh9XbkUL9yV8mCMfYfA7L xpydYu+eegOGT4bdCLjbvaaDNOMRvfq2+7ReNAk+EggYsi8L9oW5XLWzrB039KmAgkJMDvjU UEXeB15qvCNoIHRb1bRwtJul4y0NKBI0sgvlaoXqswfVQxg2TaON3M6bzSsrYrClCAogy1OV T3yVwtw97VGy+YkbgdAOYsJG4Tbk424nFr5vmDeI3dEx/CTZAwwHOqdnumNKZAQ62EE6gKph l049uUj/aaHhCIpjz4rH9+OOZS6G6pTsO5HRKUFeNJ+9K8P06QgqHC2r/CsB7nDT2ha0oZgo VZdUsfKsRb4wNS87EK7g==
  • Ironport-sdr: xaoYQ3NZf8djGSwE4DiGWqbA00/SqpNknjX/uu7kaUVxmh0o33oK4ZND2Sq4aWB3bk3FQcDHPh C7eatzJbasog+DrkNSmdZ0X7ujo0ozLgyaMkLNaTkMeM7K1rfV0ctfck6PG2Rs6IhOT9NqwugR ESevpuxpvENwx+OJHpiTKfHQJ8HN+MAbQ495HSM+h29zahcmVbvJ0DtHZ16B5U6M6RWVyCCMMo YgPnydw4DbvCQPJTjvuK7gU224QQDOI8ereIL57DFo1464rUzPeYwx8ip6oiDw3BZsoOUhwiDJ FRw=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 16/04/2021 14:22, Jan Beulich wrote:
> Like ERMS this can always be exposed to guests, but I guess once we
> introduce full validation we want to make sure we don't reject incoming
> policies with any of these set when in the raw/host policies they're
> clear.
>
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Like *everything* right now, there's no safety checking and rejection of
bad incoming policy data.  Xen will still zero out the bits it doesn't
like, and fixing this something which Roger and I are working on.  Its
basically the last piece of the "move to a new, better interface"
toolstack work.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.