* Peter Zijlstra <peterz@xxxxxxxxxxxxx> wrote: > On Mon, Feb 12, 2018 at 08:13:31AM -0800, Dave Hansen wrote: > > On 02/12/2018 02:22 AM, Ingo Molnar wrote: > > >> +static inline void firmware_restrict_branch_speculation_end(void) > > >> +{ > > >> + alternative_msr_write(MSR_IA32_SPEC_CTRL, 0, > > >> + X86_FEATURE_USE_IBRS_FW); > > > BTW., there's a detail that only occurred to me today, this enabling/disabling > > > sequence is not NMI safe, and it might be called from NMI context: > > > > FWIW, Tim Chen and I talked about this a bunch. We ended up just > > saving/restoring the MSR verbatim in the NMI handler the same way we do > > CR3, stashing it in a high general-purpose-register (r%12?). That costs > > a RDMSR (at least) and an WRMSR (which you can optimize out). We have a > > patch for that somewhere if anybody wants it. > > I would really rather not do that on the NMI path.. And if we _have_ to, > please keep a software shadow of that MSR state, such that we can avoid > touching that MSR 99% of the time. Yeah, I'd rather avoid doing firmware calls from NMI context altogether. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-tip-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html
![]() |