[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 09/16] x86/intel: Always check MSR_MISC_ENABLE on all CPUs
- To: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Date: Tue, 27 Jan 2026 14:45:59 +0000
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Yu8zaKn5GuS/3bthpExxlER8nFf8r8KahI6boM1p2CM=; b=w527hRSZZffJ3gsD5iWKizH6U/e1t84VcirTZ0sefTRCEso+DtiKhok5Sb/MfwhND2u5cOe2mhd4hGoJnq9GCKAqzMT4Z+eKU/0IoWOtlJp26gwSEAegbxvri1l+G1NmTrdj9+V4pZnv+Vu1djOTJ/D9KBOaQbJljhdCUDqh/QJBm5tj5NZwntauxVC7cOxc15ggSlqX01ZRfQ99WmY2tBxoIxvrAFVko3IcehEcWIXgp4B0qKM0bLFG7AOLgW2WQeDbQrsdzo4TzuOTBzI1dNcDDLO6qBmZQ8E44iSUIluafEuWmkFhL0q2BMtiNpJp87HENTNyvszFZKlWOCZ6EQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=nat0+8dlE8BEic7qToUg9+wYCPSPtwq26tZ/iJsx7kaGUBpaGcWyH8XQywazrH05UbiEJVWCw6Icyqnk5GKDImTE6t4JA8n3QQ6U5KTPioUXv0ame2xSWEBTNuEUyg86oIjETj4Gp/NBfnvG206heu/ikxZS6B9sruFUHIOGnlAASGkowIm9Gt0kLErEkEDD+S5s3uj7xaIJnjgOdSK8NFOsiIUBEIb4sbKzZOfQBZLXtqed7yEiHTUmDcJdGAMWgMP3RleQAGxK1kmpULw17joBEkPrJLs59hUJubr18xtRTMqFK92jYfyfuDIJ8sVDmqdxkt2Z+TesNFfcGb3a1A==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
- Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Julian Vetter <julian.vetter@xxxxxxxxxx>, Teddy Astie <teddy.astie@xxxxxxxxxx>
- Delivery-date: Tue, 27 Jan 2026 14:46:13 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 26/01/2026 5:53 pm, Andrew Cooper wrote:
> Currently, the BSP only leaves instructions for the APs to adjust
> MSR_MISC_ENABLE if the BSP is found to need adjustments. Particularly if
> XD_DISABLE is needed on an AP but not the BSP, the system will triple fault
> with no information provided to the user.
>
> Rework the BSP and trampoline logic to always read MISC_ENABLE, and clear
> CPUID_LIMIT and XD_DISABLE if either are set.
>
> Repurpose intel_unlock_cpuid_leaves() to be intel_check_misc_enable() and make
> it static in common.c. Replace trampoline_misc_enable_off with the smaller
> trampoline_check_misc_enable.
>
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> ---
> CC: Jan Beulich <JBeulich@xxxxxxxx>
> CC: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> CC: Julian Vetter <julian.vetter@xxxxxxxxxx>
> CC: Teddy Astie <teddy.astie@xxxxxxxxxx>
>
> This temporarily removes the printk() noting the reactivation of XD because
> the earlier BSP code has already done it, but that logic is about to be
> removed.
Actually, I'd forgotten that this is still reachable, via xen.efi, and
is the bug that kicked off all this work originally.
Julien has requested that I try to integrate the two series together,
which I'll do for v2.
~Andrew
|