[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 09/16] x86/intel: Always check MSR_MISC_ENABLE on all CPUs


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Tue, 27 Jan 2026 15:21:10 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KA25xpM37iGByW9ODy+xmsSdDAuqUKFkBJE4w3MW0Ns=; b=CFRiFg3kl5/mGWfb/yXNxgf078RnfO/2Q8PUYKYBA1hSlfvM2KlcvdLYeVRmiKDJozMs4QgTJc+hgJrGylQNVmjBWPvno2qhXx2J2kFeye8PmDX2PPK4tRk6uFAfhrGHxDqSErCHfEVCds1Dx8LiTHKokhqE2dERYttG2+gJK+TCksxePV1Ty0pOD+RlMmN7VoTZJkKPtHA5Ht3D/cakerh/4eRkAMg3EDnEzGQWhpEqsaKdNuSDQ3xyMg6or7wQU+aa7ZD2ryeO8eIx/jpk2rzXYbTTYQ+XaybAAEjtA35kh0s3RNqqBTvJ40agvAFIi+7Nr22ELO8yS6kuxkRlTw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=rWDvmlk2nhCd49yUH4QnlaEIyNDtWXYJqrhawT5zb82Hejq70sAYGbz/UskoWHfVX0aQhG8rFe2VQHUNo7fPSYRm7vWm0E1gz3BCVnb+gGc5buW5NgsIeWNiZo4gizH8Kp7bxFKwqIIc9KeUJ2wSDYhS09eWIKkJ5RIkeH6JlXDDtkDTUQUIxW6O8MMBMqPTKdrM56pahk/dt9SFCE1mn5GLOUrIhaOnabzKzKrgQiUn/1HQBjFRtSrgW3Ue95w4/RkKSWUYrJmj8FiedWbrOFfIRJo6N390Db9HVWF4o3m8S4dE7ip7aCjCfLPvY0rdBzNpkpNeDFpV6yBlVMgloA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Julian Vetter <julian.vetter@xxxxxxxxxx>, Teddy Astie <teddy.astie@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 27 Jan 2026 15:21:23 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 27/01/2026 3:18 pm, Jan Beulich wrote:
> On 26.01.2026 18:53, Andrew Cooper wrote:
>> Currently, the BSP only leaves instructions for the APs to adjust
>> MSR_MISC_ENABLE if the BSP is found to need adjustments.  Particularly if
>> XD_DISABLE is needed on an AP but not the BSP, the system will triple fault
>> with no information provided to the user.
>>
>> Rework the BSP and trampoline logic to always read MISC_ENABLE, and clear
>> CPUID_LIMIT and XD_DISABLE if either are set.
>>
>> Repurpose intel_unlock_cpuid_leaves() to be intel_check_misc_enable() and 
>> make
>> it static in common.c.
> Being able to make it static is of course nice. But moving Intel-only code
> out of intel.c isn't. Personally I'd favor it staying in intel.c.

Alejandro's DCE work will cause this to be eliminated in !INTEL builds.

It's slightly ugly, but it's less ugly than having 3 separate hooks.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.