[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection


  • To: Andrew Cooper <andrew.cooper@xxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Wed, 24 Sep 2025 15:40:43 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=v+xFrjZukHVrNFRXboPB7i891m4nPCVndE4tYppH4iU=; b=v8ngqyJOc2Doe+k+B8f5jYl54vfOnWBcueLMLtcYsRUNxjM8utykdk0SL8fEk9KGt4AjTuWcQSChcexj7semYnD7alU38FBsUd4bubNvOj4u0wHkNnVSpmGd9ebT9UTg0JvGsrWAB6BkDaaj+y751yjJ45Wr9Mx4L5WuEdTNwl7I0AHFvrB+Bpi2chc1dVTqeVyYUINWWsbfUdkjij/nZzJEojAEb0XgmDU/YjADJMAH8w37vPo8W/yexa3pfOWpaJeqnN5wz3+DQ2KyQhULu4vsiuppoN6GDYNOnvRjIRjig+A/EeE89Sy+8n06lU6PIYN9HOj5evZxD8dTjVyVoA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WGp5xRP8rdErWWHznv5cdD3/cMjv4eMhT1XOWRHb4KSgeGe+f0ZHTDyvcy5dyPIFJICdjNk997Qo62mA/gky8Ln7CZ5B1aTZ6qimRkg1MDXLMmwIo44xvZ6RvMBbMiaD8t+JWTBMyxs35VudUnPeax0kNml+1Nikspv61zxNTzkDnK/vGFw8ulvET5acOfONz9lNHwntNsefqMyLZgneUnGnufLJq1Sog7rHf4Gr7UeLdadAVAE+Wv2tkzOYxJY0DHKGiJMo1oW79dMfNSLeo0qxj8MU3azQpavNaW/TrRsRtowqI6RlJwihDHzPNNuvFsVUY11g/4odlotDNYvPpQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "oleksii.kurochko@xxxxxxxxx" <oleksii.kurochko@xxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>
  • Delivery-date: Wed, 24 Sep 2025 13:41:17 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed, Sep 24, 2025 at 11:50:02AM +0000, Andrew Cooper wrote:
> On 24/09/2025 4:00 am, Roger Pau Monne wrote:
> > Otherwise the check for the SS feature in
> > check_memory_type_self_snoop_errata() fails unconditionally, which leads to
> > X86_FEATURE_XEN_SELFSNOOP never being set.
> >
> > We could also avoid this by not doing the reset_cpuinfo() for the BSP in
> > identify_cpu(), because SS detection uses boot_cpu_data.
> 
> Doesn't this, mean ...

Well, that's the reason for the rant here.  The reset at the top of
identify_cpu() has been there since 2005.  It's arguably to make sure
the BSP and the APs have the same empty state in the passed
cpuinfo_x86 struct, as for the BSP this would be already partially
initialized due to what's done in early_cpu_init().

The underlying question is whether we would rather prefer to not do
the reset for the BSP, but that would lead to differences in the
contents of cpuinfo_x86 struct between the BSP and the APs.  In the
past we have arranged for leaves needed early to be populated in
generic_identify(), like FEATURESET_e21a, hence the proposed patch
does that for FEATURESET_1d.

> >   However that
> > creates an imbalance on the state of the BSP versus the APs in the
> > identify_cpu() code.
> >
> > I've opted for the less controversial solution of populating FEATURESET_1d
> > in generic_identify(), as the value is already there.  The same is done for
> > the AMD faulting probe code.
> >
> > Fixes: f2663ca2e520 ("x86/cpu/intel: Clear cache self-snoop capability in 
> > CPUs with known errata")
> > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> 
> ... this Fixes tag is incorrect?

I think the Fixes tag is accurate; the code was OK before that change.
Nothing in c_early_init hooks depended on (some of) the x86_capability
fields being populated, which is required after the change.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.