[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging-4.10] x86/spec_ctrl: Express Xen's choice of MSR_SPEC_CTRL value as a variable
commit 840d6833fc8a701eb849c9654ac93eeb37ed6589 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Tue May 29 09:18:16 2018 +0200 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Tue May 29 09:18:16 2018 +0200 x86/spec_ctrl: Express Xen's choice of MSR_SPEC_CTRL value as a variable At the moment, we have two different encodings of Xen's MSR_SPEC_CTRL value, which is a side effect of how the Spectre series developed. One encoding is via an alias with the bottom bit of bti_ist_info, and can encode IBRS or not, but not other configurations such as STIBP. Break Xen's value out into a separate variable (in the top of stack block for XPTI reasons) and use this instead of bti_ist_info in the IST path. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: 66dfae0f32bfbc899c2f3446d5ee57068cb7f957 master date: 2018-05-16 12:19:10 +0100 --- xen/arch/x86/spec_ctrl.c | 8 +++++--- xen/arch/x86/x86_64/asm-offsets.c | 1 + xen/include/asm-x86/current.h | 1 + xen/include/asm-x86/spec_ctrl.h | 2 ++ xen/include/asm-x86/spec_ctrl_asm.h | 8 ++------ 5 files changed, 11 insertions(+), 9 deletions(-) diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c index dc90743514..114352115a 100644 --- a/xen/arch/x86/spec_ctrl.c +++ b/xen/arch/x86/spec_ctrl.c @@ -38,6 +38,7 @@ static int8_t __initdata opt_ibrs = -1; static bool __initdata opt_rsb_native = true; static bool __initdata opt_rsb_vmexit = true; bool __read_mostly opt_ibpb = true; +uint8_t __read_mostly default_xen_spec_ctrl; uint8_t __read_mostly default_bti_ist_info; static int __init parse_bti(const char *s) @@ -285,11 +286,14 @@ void __init init_speculation_mitigations(void) * guests. */ if ( ibrs ) + { + default_xen_spec_ctrl |= SPEC_CTRL_IBRS; setup_force_cpu_cap(X86_FEATURE_XEN_IBRS_SET); + } else setup_force_cpu_cap(X86_FEATURE_XEN_IBRS_CLEAR); - default_bti_ist_info |= BTI_IST_WRMSR | ibrs; + default_bti_ist_info |= BTI_IST_WRMSR; } /* @@ -330,8 +334,6 @@ void __init init_speculation_mitigations(void) static void __init __maybe_unused build_assertions(void) { - /* The optimised assembly relies on this alias. */ - BUILD_BUG_ON(BTI_IST_IBRS != SPEC_CTRL_IBRS); } /* diff --git a/xen/arch/x86/x86_64/asm-offsets.c b/xen/arch/x86/x86_64/asm-offsets.c index 13478d4fc1..0726147853 100644 --- a/xen/arch/x86/x86_64/asm-offsets.c +++ b/xen/arch/x86/x86_64/asm-offsets.c @@ -142,6 +142,7 @@ void __dummy__(void) OFFSET(CPUINFO_xen_cr3, struct cpu_info, xen_cr3); OFFSET(CPUINFO_pv_cr3, struct cpu_info, pv_cr3); OFFSET(CPUINFO_shadow_spec_ctrl, struct cpu_info, shadow_spec_ctrl); + OFFSET(CPUINFO_xen_spec_ctrl, struct cpu_info, xen_spec_ctrl); OFFSET(CPUINFO_use_shadow_spec_ctrl, struct cpu_info, use_shadow_spec_ctrl); OFFSET(CPUINFO_bti_ist_info, struct cpu_info, bti_ist_info); DEFINE(CPUINFO_sizeof, sizeof(struct cpu_info)); diff --git a/xen/include/asm-x86/current.h b/xen/include/asm-x86/current.h index 4678a0fcf5..d10b13cd34 100644 --- a/xen/include/asm-x86/current.h +++ b/xen/include/asm-x86/current.h @@ -56,6 +56,7 @@ struct cpu_info { /* See asm-x86/spec_ctrl_asm.h for usage. */ unsigned int shadow_spec_ctrl; + uint8_t xen_spec_ctrl; bool use_shadow_spec_ctrl; uint8_t bti_ist_info; diff --git a/xen/include/asm-x86/spec_ctrl.h b/xen/include/asm-x86/spec_ctrl.h index 5ab4ff3f68..5e4fc84aec 100644 --- a/xen/include/asm-x86/spec_ctrl.h +++ b/xen/include/asm-x86/spec_ctrl.h @@ -27,6 +27,7 @@ void init_speculation_mitigations(void); extern bool opt_ibpb; +extern uint8_t default_xen_spec_ctrl; extern uint8_t default_bti_ist_info; static inline void init_shadow_spec_ctrl_state(void) @@ -34,6 +35,7 @@ static inline void init_shadow_spec_ctrl_state(void) struct cpu_info *info = get_cpu_info(); info->shadow_spec_ctrl = info->use_shadow_spec_ctrl = 0; + info->xen_spec_ctrl = default_xen_spec_ctrl; info->bti_ist_info = default_bti_ist_info; } diff --git a/xen/include/asm-x86/spec_ctrl_asm.h b/xen/include/asm-x86/spec_ctrl_asm.h index 1f2b6f3552..697da13923 100644 --- a/xen/include/asm-x86/spec_ctrl_asm.h +++ b/xen/include/asm-x86/spec_ctrl_asm.h @@ -21,7 +21,6 @@ #define __X86_SPEC_CTRL_ASM_H__ /* Encoding of the bottom bits in cpuinfo.bti_ist_info */ -#define BTI_IST_IBRS (1 << 0) #define BTI_IST_WRMSR (1 << 1) #define BTI_IST_RSB (1 << 2) @@ -286,12 +285,9 @@ setz %dl and %dl, STACK_CPUINFO_FIELD(use_shadow_spec_ctrl)(%r14) - /* - * Load Xen's intended value. SPEC_CTRL_IBRS vs 0 is encoded in the - * bottom bit of bti_ist_info, via a deliberate alias with BTI_IST_IBRS. - */ + /* Load Xen's intended value. */ mov $MSR_SPEC_CTRL, %ecx - and $BTI_IST_IBRS, %eax + movzbl STACK_CPUINFO_FIELD(xen_spec_ctrl)(%r14), %eax xor %edx, %edx wrmsr -- generated by git-patchbot for /home/xen/git/xen.git#staging-4.10 _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |