[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 3/4] xen/xsm: Use __init_data_cf_clobber for xsm_ops


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 1 Dec 2021 09:21:16 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RZu4PDmecZX7QRKHNDxESsRak5rcbyRea+cbNBa2B6U=; b=dL/gU8wVRgTq0rc/1BVeucqsIzRFL9wOYvNNDvmuOGeGbrmCTzvID3TCE8ok849eqN7a6EK3HLfBsAF4UND8u3lXQxatNky7G9NXbI4qQKVhNuy2ukU+6E/Xe/NUn/7UWTFUeltNH+MmMg9tOCSIhFx+sdkIZ4RibaMFn1I6yoE9wqRA9lNTDPGd2Y/c5RAv+7SjEsYZz/WZ2iD2CqZnRsXf8kK4i/RPem23NXvNwCIbQpzvBO7xFkN8PjyWiDNfPVbEW/riZXRGE/fSNgnQaI1cLzcpXg40YYmj0Gluh1pCYn/yZ3nR7Q5Sl3pYssHiczic/m1geCguQPpjT7gpOQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dKc67BxGlCfrpAV7IHkP3KPExaNDp1loCn92AdVLYDuuu7hxIk+BRcjTZJrCYFP1e+RQah+9JWZJbvOrKMSBKXhlESPHsuU6oHPrAuobxKpbo8skwvAkiUS/ExNLvYV1uZek/ch+rKd3h0UTsnjBqYT8pcmbvWdrM5pKP6MgBT/xgC+V4KAgfROscM3IGrNkJ5OhlZiGW2IaeiBMsVrDqI0VTw0r2hofV8M8TgLCaXXPlCsZFhziO24/ZlnheOtLn9VoDGqm2tAIJlU1d9jfMJ8YhLu0G82XlF7cISvbSH2g1wiE2qmD5GYcfzB+hdOdYjWa32piC8smkncXQx003A==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>, Daniel Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 01 Dec 2021 08:21:24 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 26.11.2021 22:22, Andrew Cooper wrote:
> All calls through xsm_ops are fully altcall'd.  Harden all fnptr targets.
> 
> This yields:
> 
>   (XEN) altcall: Optimised away 197 endbr64 instructions
> 
> of 1655 on an everything-enabled build of Xen, which is ~12%.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Subject to the resolution of the const aspect
Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.