[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen
On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote: > Re-using pat_disabled like you do in your suggestion below won't > work, because mtrr_bp_init() calls pat_disable() when MTRRs > appear to be disabled (from the kernel's view). The goal is to > honor "nopat" without honoring any other calls to pat_disable(). Actually, the current goal is to adjust Xen dom0 because: 1. it uses the PAT code 2. but then it does something special and hides the MTRRs which is not something real hardware does. So this one-off thing should be prominent, visible and not get in the way. As to mtrr_bp_init(), can you use X86_FEATURE_XENPV there to detect this special case when the kernel is running as dom0 and set stuff there accordingly so that it doesn't disable PAT? Then you don't have to touch pat_disabled() either but intergrate the Xen variant properly... > I can probably fiddle with pat_enabled() instead of with > init_cache_modes(), but when making the change I had the feeling > this might be less liked (as looking more hacky, at least to me). Why would that be more hacky? I'd much rather check upfront what the kernel is running on and act accordingly instead of hooking into random functions and then years later wonder why was it done in the first place. > But besides the "where" the other question is: Do you really want > me to limit this to Xen/PV, rather than - as I have it now - > extending it to any hypervisor, which may behave in similar ways? Well, do you know of some other HV which hides MTRRs from the guest? I haven't heard of any... -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |