[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] x86: enable support for {rd, wr}{fs, gs}base instructions



# HG changeset patch
# User Keir Fraser <keir@xxxxxxx>
# Date 1287922627 -3600
# Node ID 07472842a840098a4604bf0606b1fe18fcea8b1e
# Parent  2f87a77dc7b997b0dde5d4a8ad5e913934bf0ce0
x86: enable support for {rd,wr}{fs,gs}base instructions

... so that once in a while Xen knows of a new CPU feature before
Linux starts making use of it.

While (obviously) I wasn't able to test this, it seemed strait forward
enough to enable anyway.

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
---
 xen/arch/x86/cpu/common.c        |    5 +++++
 xen/arch/x86/domain.c            |    6 ++++--
 xen/arch/x86/traps.c             |    2 +-
 xen/include/asm-x86/cpufeature.h |    7 ++++++-
 xen/include/asm-x86/domain.h     |    2 +-
 xen/include/asm-x86/processor.h  |    1 +
 6 files changed, 18 insertions(+), 5 deletions(-)

diff -r 2f87a77dc7b9 -r 07472842a840 xen/arch/x86/cpu/common.c
--- a/xen/arch/x86/cpu/common.c Sun Oct 24 13:15:48 2010 +0100
+++ b/xen/arch/x86/cpu/common.c Sun Oct 24 13:17:07 2010 +0100
@@ -311,6 +311,11 @@ void __cpuinit generic_identify(struct c
                        if ( xlvl >= 0x80000004 )
                                get_model_name(c); /* Default name */
                }
+
+               /* Intel-defined flags: level 0x00000007 */
+               if ( c->cpuid_level >= 0x00000007 )
+                       c->x86_capability[X86_FEATURE_FSGSBASE / 32]
+                               = cpuid_ebx(0x00000007);
        }
 
        early_intel_workaround(c);
diff -r 2f87a77dc7b9 -r 07472842a840 xen/arch/x86/domain.c
--- a/xen/arch/x86/domain.c     Sun Oct 24 13:15:48 2010 +0100
+++ b/xen/arch/x86/domain.c     Sun Oct 24 13:17:07 2010 +0100
@@ -583,13 +583,15 @@ void arch_domain_destroy(struct domain *
     xfree(d->arch.irq_pirq);
 }
 
-unsigned long pv_guest_cr4_fixup(unsigned long guest_cr4)
+unsigned long pv_guest_cr4_fixup(const struct vcpu *v, unsigned long guest_cr4)
 {
     unsigned long hv_cr4_mask, hv_cr4 = real_cr4_to_pv_guest_cr4(read_cr4());
 
     hv_cr4_mask = ~X86_CR4_TSD;
     if ( cpu_has_de )
         hv_cr4_mask &= ~X86_CR4_DE;
+    if ( cpu_has_fsgsbase && !is_pv_32bit_domain(v->domain) )
+        hv_cr4_mask &= ~X86_CR4_FSGSBASE;
 
     if ( (guest_cr4 & hv_cr4_mask) != (hv_cr4 & hv_cr4_mask) )
         gdprintk(XENLOG_WARNING,
@@ -700,7 +702,7 @@ int arch_set_info_guest(
     v->arch.guest_context.user_regs.eflags |= X86_EFLAGS_IF;
 
     cr4 = v->arch.guest_context.ctrlreg[4];
-    v->arch.guest_context.ctrlreg[4] = cr4 ? pv_guest_cr4_fixup(cr4) :
+    v->arch.guest_context.ctrlreg[4] = cr4 ? pv_guest_cr4_fixup(v, cr4) :
         real_cr4_to_pv_guest_cr4(mmu_cr4_features);
 
     memset(v->arch.guest_context.debugreg, 0,
diff -r 2f87a77dc7b9 -r 07472842a840 xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c      Sun Oct 24 13:15:48 2010 +0100
+++ b/xen/arch/x86/traps.c      Sun Oct 24 13:17:07 2010 +0100
@@ -2176,7 +2176,7 @@ static int emulate_privileged_op(struct 
             break;
 
         case 4: /* Write CR4 */
-            v->arch.guest_context.ctrlreg[4] = pv_guest_cr4_fixup(*reg);
+            v->arch.guest_context.ctrlreg[4] = pv_guest_cr4_fixup(v, *reg);
             write_cr4(pv_guest_cr4_to_real_cr4(v));
             break;
 
diff -r 2f87a77dc7b9 -r 07472842a840 xen/include/asm-x86/cpufeature.h
--- a/xen/include/asm-x86/cpufeature.h  Sun Oct 24 13:15:48 2010 +0100
+++ b/xen/include/asm-x86/cpufeature.h  Sun Oct 24 13:17:07 2010 +0100
@@ -9,7 +9,7 @@
 
 #include <xen/bitops.h>
 
-#define NCAPINTS       7       /* N 32-bit words worth of info */
+#define NCAPINTS       8       /* N 32-bit words worth of info */
 
 /* Intel-defined CPU features, CPUID level 0x00000001 (edx), word 0 */
 #define X86_FEATURE_FPU                (0*32+ 0) /* Onboard FPU */
@@ -131,6 +131,9 @@
 #define X86_FEATURE_SKINIT     (6*32+ 12) /* SKINIT, STGI/CLGI, DEV */
 #define X86_FEATURE_WDT                (6*32+ 13) /* Watchdog Timer */
 
+/* Intel-defined CPU features, CPUID level 0x00000007:0 (ebx), word 9 */
+#define X86_FEATURE_FSGSBASE   (7*32+ 0) /* {RD,WR}{FS,GS}BASE instructions */
+
 #define cpu_has(c, bit)                test_bit(bit, (c)->x86_capability)
 #define boot_cpu_has(bit)      test_bit(bit, boot_cpu_data.x86_capability)
 
@@ -159,6 +162,7 @@
 #define cpu_has_clflush                boot_cpu_has(X86_FEATURE_CLFLSH)
 #define cpu_has_page1gb                0
 #define cpu_has_efer           (boot_cpu_data.x86_capability[1] & 0x20100800)
+#define cpu_has_fsgsbase       0
 #else /* __x86_64__ */
 #define cpu_has_vme            0
 #define cpu_has_de             1
@@ -184,6 +188,7 @@
 #define cpu_has_clflush                boot_cpu_has(X86_FEATURE_CLFLSH)
 #define cpu_has_page1gb                boot_cpu_has(X86_FEATURE_PAGE1GB)
 #define cpu_has_efer           1
+#define cpu_has_fsgsbase       boot_cpu_has(X86_FEATURE_FSGSBASE)
 #endif
 
 #define cpu_has_ffxsr           ((boot_cpu_data.x86_vendor == X86_VENDOR_AMD) \
diff -r 2f87a77dc7b9 -r 07472842a840 xen/include/asm-x86/domain.h
--- a/xen/include/asm-x86/domain.h      Sun Oct 24 13:15:48 2010 +0100
+++ b/xen/include/asm-x86/domain.h      Sun Oct 24 13:17:07 2010 +0100
@@ -429,7 +429,7 @@ void vcpu_show_registers(const struct vc
 void vcpu_show_registers(const struct vcpu *);
 
 /* Clean up CR4 bits that are not under guest control. */
-unsigned long pv_guest_cr4_fixup(unsigned long guest_cr4);
+unsigned long pv_guest_cr4_fixup(const struct vcpu *, unsigned long guest_cr4);
 
 /* Convert between guest-visible and real CR4 values. */
 #define pv_guest_cr4_to_real_cr4(v)                         \
diff -r 2f87a77dc7b9 -r 07472842a840 xen/include/asm-x86/processor.h
--- a/xen/include/asm-x86/processor.h   Sun Oct 24 13:15:48 2010 +0100
+++ b/xen/include/asm-x86/processor.h   Sun Oct 24 13:17:07 2010 +0100
@@ -83,6 +83,7 @@
 #define X86_CR4_OSXMMEXCPT     0x0400  /* enable unmasked SSE exceptions */
 #define X86_CR4_VMXE           0x2000  /* enable VMX */
 #define X86_CR4_SMXE           0x4000  /* enable SMX */
+#define X86_CR4_FSGSBASE       0x10000 /* enable {rd,wr}{fs,gs}base */
 #define X86_CR4_OSXSAVE        0x40000 /* enable XSAVE/XRSTOR */
 
 /*

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.