[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 8/9] x86/amd: Virtualise MSR_VIRT_SPEC_CTRL for guests
On Mon, Dec 03, 2018 at 04:18:21PM +0000, Andy Cooper wrote: > The semantics of MSR_VIRT_SPEC_CTRL are that unknown bits are write-discard > and read as zero. Only VIRT_SPEC_CTRL.SSBD is defined at the moment. > > To facilitate making this per-guest, the legacy SSBD state needs context > switching between vcpus. amd_ctxt_switch_legacy_ssbd() is updated to take the > vcpus setting into account. Furthermore, the guests chosen value needs > preserving across migrate. > > This marks a subtle change in how `ssbd=` behaves. If Xen wishes SSBD to be > asserted, it remains set in hardware all the time. In the default case of Xen > wishing SSBD not to be asserted, the value set in hardware is the guests > choice. Ok, we talked about this some over IRC, but I thought it would be better to get some more eyes on this on the mailing list. From what some engineers have said over here, it takes roughly 400 clock cycles for enabling SSBD via LS_CFG. It isn't cheap, no, but if the average VPCU time is 30ms, that's roughly .66%* overhead worst case (non-turbo'd on the slowest freq processor at max speed [2GHz]). The other thing I don't get is why advertise virtualized SSBD when the guest setting it does nothing? If ssbd_opt=true is set, as the code is now, why even advertise it to the guest? I'd suggest either allowing the guest to turn it off or not advertise it at all (when ssbd_opt = true). * Twrmsr (in ms) = (400/2000000)*1000, percent = (Twrmsr/30ms) * 100 = .66(repeating)% -- Brian Woods _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |