[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen stable-4.9] x86/spec_ctrl: Read MSR_ARCH_CAPABILITIES only once
commit a29695c88818e0bb931714cae2a75edbb7b708e1 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Tue May 29 09:43:28 2018 +0200 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Tue May 29 09:43:28 2018 +0200 x86/spec_ctrl: Read MSR_ARCH_CAPABILITIES only once Make it available from the beginning of init_speculation_mitigations(), and pass it into appropriate functions. Fix an RSBA typo while moving the affected comment. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: d6c65187252a6c1810fd24c4d46f812840de8d3c master date: 2018-05-16 12:19:10 +0100 --- xen/arch/x86/spec_ctrl.c | 34 ++++++++++++++-------------------- 1 file changed, 14 insertions(+), 20 deletions(-) diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c index fa67a0ffbd..dc90743514 100644 --- a/xen/arch/x86/spec_ctrl.c +++ b/xen/arch/x86/spec_ctrl.c @@ -81,18 +81,15 @@ static int __init parse_bti(const char *s) } custom_param("bti", parse_bti); -static void __init print_details(enum ind_thunk thunk) +static void __init print_details(enum ind_thunk thunk, uint64_t caps) { unsigned int _7d0 = 0, e8b = 0, tmp; - uint64_t caps = 0; /* Collect diagnostics about available mitigations. */ if ( boot_cpu_data.cpuid_level >= 7 ) cpuid_count(7, 0, &tmp, &tmp, &tmp, &_7d0); if ( boot_cpu_data.extended_cpuid_level >= 0x80000008 ) cpuid(0x80000008, &tmp, &e8b, &tmp, &tmp); - if ( _7d0 & cpufeat_mask(X86_FEATURE_ARCH_CAPS) ) - rdmsrl(MSR_ARCH_CAPABILITIES, caps); printk(XENLOG_DEBUG "Speculative mitigation facilities:\n"); @@ -125,7 +122,7 @@ static void __init print_details(enum ind_thunk thunk) } /* Calculate whether Retpoline is known-safe on this CPU. */ -static bool __init retpoline_safe(void) +static bool __init retpoline_safe(uint64_t caps) { unsigned int ucode_rev = this_cpu(ucode_cpu_info).cpu_sig.rev; @@ -136,19 +133,12 @@ static bool __init retpoline_safe(void) boot_cpu_data.x86 != 6 ) return false; - if ( boot_cpu_has(X86_FEATURE_ARCH_CAPS) ) - { - uint64_t caps; - - rdmsrl(MSR_ARCH_CAPABILITIES, caps); - - /* - * RBSA may be set by a hypervisor to indicate that we may move to a - * processor which isn't retpoline-safe. - */ - if ( caps & ARCH_CAPS_RSBA ) - return false; - } + /* + * RSBA may be set by a hypervisor to indicate that we may move to a + * processor which isn't retpoline-safe. + */ + if ( caps & ARCH_CAPS_RSBA ) + return false; switch ( boot_cpu_data.x86_model ) { @@ -218,6 +208,10 @@ void __init init_speculation_mitigations(void) { enum ind_thunk thunk = THUNK_DEFAULT; bool ibrs = false; + uint64_t caps = 0; + + if ( boot_cpu_has(X86_FEATURE_ARCH_CAPS) ) + rdmsrl(MSR_ARCH_CAPABILITIES, caps); /* * Has the user specified any custom BTI mitigations? If so, follow their @@ -246,7 +240,7 @@ void __init init_speculation_mitigations(void) * On Intel hardware, we'd like to use retpoline in preference to * IBRS, but only if it is safe on this hardware. */ - else if ( retpoline_safe() ) + else if ( retpoline_safe(caps) ) thunk = THUNK_RETPOLINE; else if ( boot_cpu_has(X86_FEATURE_IBRSB) ) ibrs = true; @@ -331,7 +325,7 @@ void __init init_speculation_mitigations(void) /* (Re)init BSP state now that default_bti_ist_info has been calculated. */ init_shadow_spec_ctrl_state(); - print_details(thunk); + print_details(thunk, caps); } static void __init __maybe_unused build_assertions(void) -- generated by git-patchbot for /home/xen/git/xen.git#stable-4.9 _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |