[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 3/6] X86: Disable PCID/INVPCID for dom0



>>> On 24.11.11 at 16:53, "Liu, Jinsong" <jinsong.liu@xxxxxxxxx> wrote:
> X86: Disable PCID/INVPCID for dom0
> 
> PCID (Process-context identifier) is a facility by which a logical processor 
> may cache information for multiple linear-address spaces. INVPCID is an new 
> instruction to invalidate TLB. Refer latest Intel SDM 
> http://www.intel.com/content/www/us/en/processors/architectures-software-develo
>  
> per-manuals.html
> 
> We disable PCID/INVPCID for dom0 and pv. Exposing them into dom0 and pv may 
> result in performance regression, and it would trigger GP or UD depending on 
> whether platform suppport INVPCID or not.
> 
> This patch disable PCID/INVPCID for dom0.

Do we really need to disable it, rather than making it work?
Conceptually the feature seems usable, and the instruction would
need replacement by a hypercall anyway (just like invlpg).

Jan

> Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
> 
> diff -r 519a0e3c982d xen/arch/x86/traps.c
> --- a/xen/arch/x86/traps.c    Thu Nov 17 18:06:01 2011 +0800
> +++ b/xen/arch/x86/traps.c    Thu Nov 17 18:41:59 2011 +0800
> @@ -813,6 +813,7 @@ static void pv_cpuid(struct cpu_user_reg
>              __clear_bit(X86_FEATURE_CX16 % 32, &c);
>          __clear_bit(X86_FEATURE_XTPR % 32, &c);
>          __clear_bit(X86_FEATURE_PDCM % 32, &c);
> +        __clear_bit(X86_FEATURE_PCID % 32, &c);
>          __clear_bit(X86_FEATURE_DCA % 32, &c);
>          if ( !xsave_enabled(current) )
>          {
> diff -r 519a0e3c982d xen/include/asm-x86/cpufeature.h
> --- a/xen/include/asm-x86/cpufeature.h        Thu Nov 17 18:06:01 2011 +0800
> +++ b/xen/include/asm-x86/cpufeature.h        Thu Nov 17 18:41:59 2011 +0800
> @@ -97,6 +97,7 @@
>  #define X86_FEATURE_CX16        (4*32+13) /* CMPXCHG16B */
>  #define X86_FEATURE_XTPR     (4*32+14) /* Send Task Priority Messages */
>  #define X86_FEATURE_PDCM     (4*32+15) /* Perf/Debug Capability MSR */
> +#define X86_FEATURE_PCID     (4*32+17) /* Process Context ID */
>  #define X86_FEATURE_DCA              (4*32+18) /* Direct Cache Access */
>  #define X86_FEATURE_SSE4_1   (4*32+19) /* Streaming SIMD Extensions 4.1 */
>  #define X86_FEATURE_SSE4_2   (4*32+20) /* Streaming SIMD Extensions 4.2 */
> @@ -152,6 +153,7 @@
>  #define X86_FEATURE_SMEP     (7*32+ 7) /* Supervisor Mode Execution 
> Protection 
> */
>  #define X86_FEATURE_BMI2     (7*32+ 8) /* 2nd bit manipulation extensions */
>  #define X86_FEATURE_ERMS     (7*32+ 9) /* Enhanced REP MOVSB/STOSB */
> +#define X86_FEATURE_INVPCID  (7*32+10) /* Invalidate Process Context ID */
>  
>  #define cpu_has(c, bit)              test_bit(bit, (c)->x86_capability)
>  #define boot_cpu_has(bit)    test_bit(bit, boot_cpu_data.x86_capability)




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.