From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=162.221.156.55; helo=smtp03.citrix.com; envelope-from=prvs=8063d425f=anthony.perard@citrix.com; receiver=edk2-devel@lists.01.org Received: from SMTP03.CITRIX.COM (smtp03.citrix.com [162.221.156.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 64E71211439B1 for ; Tue, 2 Oct 2018 06:27:33 -0700 (PDT) X-IronPort-AV: E=Sophos;i="5.54,332,1534809600"; d="scan'208";a="66812016" Date: Tue, 2 Oct 2018 14:27:25 +0100 From: Anthony PERARD To: CC: , Jordan Justen , Laszlo Ersek , Ard Biesheuvel , Julien Grall Message-ID: <20181002132725.GA1331@perard.uk.xensource.com> References: <20181002121725.17178-1-marcandre.lureau@redhat.com> MIME-Version: 1.0 In-Reply-To: <20181002121725.17178-1-marcandre.lureau@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) Subject: Re: [PATCH v3 1/1] OvmfPkg/PlatformPei: clear CPU caches X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Oct 2018 13:27:34 -0000 Content-Type: text/plain; charset="iso-8859-1" Content-Disposition: inline Content-Transfer-Encoding: 8bit On Tue, Oct 02, 2018 at 04:17:25PM +0400, marcandre.lureau@redhat.com wrote: > From: Marc-André Lureau > > This is for conformance with the TCG "Platform Reset Attack Mitigation > Specification". Because clearing the CPU caches at boot doesn't impact > performance significantly, do it unconditionally, for simplicity's > sake. > > Flush the cache on all logical processors, thanks to > EFI_PEI_MP_SERVICES_PPI and CacheMaintenanceLib. > > Cc: Jordan Justen > Cc: Laszlo Ersek > Cc: Ard Biesheuvel > Cc: Anthony Perard > Cc: Julien Grall > Contributed-under: TianoCore Contribution Agreement 1.1 > Signed-off-by: Marc-André Lureau That patch works for me on Xen. I can still boot guests with the patch applied, with either 1 or 4 vcpus assigned to the guest: Tested-by: Anthony PERARD Thanks, -- Anthony PERARD