|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 01/10] x86/spec_ctrl: Read MSR_ARCH_CAPABILITIES only once
On Fri, May 11, 2018 at 11:38:05AM +0100, Andrew Cooper wrote:
> Make it available from the beginning of init_speculation_mitigations(), and
> pass it into appropriate functions. Fix an RSBA typo while moving the
> affected comment.
>
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Thank you!
> ---
> CC: Jan Beulich <JBeulich@xxxxxxxx>
> CC: Wei Liu <wei.liu2@xxxxxxxxxx>
> CC: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> CC: Juergen Gross <jgross@xxxxxxxx>
> ---
> xen/arch/x86/spec_ctrl.c | 34 ++++++++++++++--------------------
> 1 file changed, 14 insertions(+), 20 deletions(-)
>
> diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
> index 037e84d..4ab0f50 100644
> --- a/xen/arch/x86/spec_ctrl.c
> +++ b/xen/arch/x86/spec_ctrl.c
> @@ -97,18 +97,15 @@ static int __init parse_bti(const char *s)
> }
> custom_param("bti", parse_bti);
>
> -static void __init print_details(enum ind_thunk thunk)
> +static void __init print_details(enum ind_thunk thunk, uint64_t caps)
> {
> unsigned int _7d0 = 0, e8b = 0, tmp;
> - uint64_t caps = 0;
>
> /* Collect diagnostics about available mitigations. */
> if ( boot_cpu_data.cpuid_level >= 7 )
> cpuid_count(7, 0, &tmp, &tmp, &tmp, &_7d0);
> if ( boot_cpu_data.extended_cpuid_level >= 0x80000008 )
> cpuid(0x80000008, &tmp, &e8b, &tmp, &tmp);
> - if ( _7d0 & cpufeat_mask(X86_FEATURE_ARCH_CAPS) )
> - rdmsrl(MSR_ARCH_CAPABILITIES, caps);
>
> printk(XENLOG_DEBUG "Speculative mitigation facilities:\n");
>
> @@ -142,7 +139,7 @@ static void __init print_details(enum ind_thunk thunk)
> }
>
> /* Calculate whether Retpoline is known-safe on this CPU. */
> -static bool __init retpoline_safe(void)
> +static bool __init retpoline_safe(uint64_t caps)
> {
> unsigned int ucode_rev = this_cpu(ucode_cpu_info).cpu_sig.rev;
>
> @@ -153,19 +150,12 @@ static bool __init retpoline_safe(void)
> boot_cpu_data.x86 != 6 )
> return false;
>
> - if ( boot_cpu_has(X86_FEATURE_ARCH_CAPS) )
> - {
> - uint64_t caps;
> -
> - rdmsrl(MSR_ARCH_CAPABILITIES, caps);
> -
> - /*
> - * RBSA may be set by a hypervisor to indicate that we may move to a
> - * processor which isn't retpoline-safe.
> - */
> - if ( caps & ARCH_CAPS_RSBA )
> - return false;
> - }
> + /*
> + * RSBA may be set by a hypervisor to indicate that we may move to a
> + * processor which isn't retpoline-safe.
> + */
> + if ( caps & ARCH_CAPS_RSBA )
> + return false;
>
> switch ( boot_cpu_data.x86_model )
> {
> @@ -299,6 +289,10 @@ void __init init_speculation_mitigations(void)
> {
> enum ind_thunk thunk = THUNK_DEFAULT;
> bool ibrs = false;
> + uint64_t caps = 0;
> +
> + if ( boot_cpu_has(X86_FEATURE_ARCH_CAPS) )
> + rdmsrl(MSR_ARCH_CAPABILITIES, caps);
>
> /*
> * Has the user specified any custom BTI mitigations? If so, follow
> their
> @@ -327,7 +321,7 @@ void __init init_speculation_mitigations(void)
> * On Intel hardware, we'd like to use retpoline in preference to
> * IBRS, but only if it is safe on this hardware.
> */
> - else if ( retpoline_safe() )
> + else if ( retpoline_safe(caps) )
> thunk = THUNK_RETPOLINE;
> else if ( boot_cpu_has(X86_FEATURE_IBRSB) )
> ibrs = true;
> @@ -418,7 +412,7 @@ void __init init_speculation_mitigations(void)
> else
> setup_clear_cpu_cap(X86_FEATURE_NO_XPTI);
>
> - print_details(thunk);
> + print_details(thunk, caps);
> }
>
> static void __init __maybe_unused build_assertions(void)
> --
> 2.1.4
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxx
> https://lists.xenproject.org/mailman/listinfo/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |