[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 1/9] x86/cpuid: Advertise SSB_NO to guests by default


  • To: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Mon, 31 Jan 2022 12:23:13 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8REmUeV1V4SLLzlCrB/FCcG+nNp2jowdG9widrP/nNc=; b=G9pmpjGmDFaFiP9djkGbYoVTVagSSaq3hqIWNfY/UhgMKU8qPha79i92nhjBzOAvnAM920+7LhQryZ7xhxnY/vK+9MaY5cOG7C5NtPk3/0Ucnvv/zKodyZeCbCrJuok9oHnQ9D6X0rS7Vtqgx8NMjYw/HxdzQss5p7f/4HXQyhbkGt/QcBlzmvu3EL0262zsEPf6oH4oeq6WfUeBZOMiOYK+rQ4G0c4TP9PICM26BOBA18kPEsjsoYe2ca+rqHpxISs6+h1kVnbIOTMm+yZl9bpB70fNnY/QRUzwx1Ar5Gbq/8FbBQrTVTsM3aGi3Mtw9OXyy7jxuEagB1SCjT2XdQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R/D88jwALga0ZlmyeOHQ1xW2Mfjei/1ZKGhqPzqv+aQHHh5SaWv26ADnO4E1QJw3tJHFh0JdrYDep+zbQ9wLszG92AYw29cps8Shp+RSuhl24N+Vs4s0wNXWk8o4M2GnteBvo9JAZgZXESzXIoB1ub7ZQXOQKnjUucua3N0+/QFyRMm56SnNMXnLhkPsthyOUXnY9/6uojicYGMonfntKEheduys2bIZKTxTuC1Dbq7QFm9AIf/c5mx+h+hVjiHTUgWAfRQe8a7KAa9JxxtQmCDAeGuLatGkt4v1ZvyLj3i3rCAqNFRW7cKMrmeMYoGPrBqJHfinT2u4Nqw0BnZu/g==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Mon, 31 Jan 2022 11:23:28 +0000
  • Ironport-data: A9a23:sgowvqwGIAftx7NS/dd6t+fRwSrEfRIJ4+MujC+fZmUNrF6WrkVUz mdJWj2POveLMTSmfot1b4nipkoBvsDWzNNjSVNupSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx 59DAjUVBJlsFhcwnvopW1TYhSEUOZugH9IQM8aZfHAhLeNYYH1500g7wrVg2tcAbeWRWGthh /uj+6UzB3f9s9JEGjp8B3Wr8U4HUFza4Vv0j3RmDRx5lAa2e0o9VfrzEZqZPXrgKrS4K8bhL wr1IBNVyUuCl/slIovNfr8W6STmSJaKVeSFoiI+t6RPHnGuD8H9u0o2HKN0VKtZt9mGt4ss6 foTsMfvcjpzP5KSke1aXQlRKxgraMWq+JefSZS+mcmazkmAeHrw2fR+SkoxOOX0+M4uXzsIr 6ZBbmlQMFbT3Ipaw5riIgVort4kI8TxepsWp1lrzC3DDOZgSpfGK0nPzYEDgW1p15EedRrYT 5cnMDhdRjvyXydsJWs7OYAwst2qoGaqJlW0r3rK/PFqsgA/1jdZz7zFINfTPNuQSq19vGyVu 2bH9GTRGQwBOZqUzj/t2mKhgKrDkD32XKoWFaak7bh6jVuL3GsRBRYKE1yhrpGEZlWWAowFb RZOo2x38PZ0pBfDosTBswOQ+yOlkUAZAIVrLrc711+Ew+3a8w+hPz1RJtJeU+AOuMgzTD0s8 1aGmdL1GDBi2IGopWKhGqS89m3rZ3VMRYMWTWpdFFZevYG/yG0mpk+XFr5e/LiJYsoZ8N0a6 xSDt2AAiroalqbnPI3rrAmc01pASnUkJzPZBzk7vEr4tGuVh6b/PuREDGQ3C94adu51qXHa5 BA5dzC2trxmMH10vHXlrB8xNL+o/e2ZFzbXnERiGZIsnxz0pSL4INAPuGEgdRs4WirhRdMPS BWJ0e+2zMQLVEZGkIctO97hYyjU5fWI+SvZugD8MYMVP8kZmP6v9yByf0+At10BY2B3+ZzTz ayzKJ72ZV5DUPwP5GPvG481jOF3rghjmzK7bc2rnnyPjOvFDFbIGOhtDbd7Rr1jhE9yiF+Lo 4832grj40g3bdASlQGOr9ZLcwhWfCdqbX00wuQOHtO+zsNdMDhJI9fawK87epwjmKJQl+zS+ Wq6VFMew1367UAr4y3QApy6QL+wD5t5s1whOikgYQSh13Q5ON7956YDbZonO7Ig8bU7n/JzS vAEfeSGA+hOFWubq2hMM8GlodwwbgmviCKPIzGhPGo1cal/SlGb4dTjZAbuqnUDV3Llqcskr rS8/QrHWp5fFR96BcPbZav3nVO8tHQQgsxoWE7MLoUBcUng6tEyeSfwkuU2M4cHLhCanmmW0 AOfABE5o+jRotBqrImV1P7c94rwSrlwBEtXGWXf/I2aDyiC8zrx25JEXcaJYSvZCDH+9pK9a LgH1Pr7KvAGwgpH6tIuD7ZxwKsizNLzvLsGnB98FXDGYln3WLNtJn6KgZtGuqFXn+ILvAK3X gSE+8VAOKXPM8TgSQZDKA0gZ+WF9PcVhjiNsqhlfBSkvHd6rOidTEFfHxiQkygMfrJ6PbQsz folpMNLuRe0jQAnM4regy1Zn4hWwqfsj0nzWkkmPbLW
  • Ironport-hdrordr: A9a23:daP1nKkotBfNXZTRXWb1S++IAwvpDfO0imdD5ihNYBxZY6Wkfp +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH Pz3Lsim9L2Ek5nEfhTS0N1FNTrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S yd+jaJq5mLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e O86SsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUQHIvsEobgcXgrS6kImst05+r lMxXilu51eCg6FtDjh5vDTPisa2HackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu 9zF8vRjcwmPm9yV0qp/lWH/ebcHUjaRny9Mwo/U42uonRrdUlCvgolLJd1pAZEyHo/I6M0kN gsfJ4Y0I2mdfVmHp6VMt1xNfdfOla9MS4kD1jiU2gPNJt3ck4l+KSHqInc2omRCek1Jd0J6d P8bG8=
  • Ironport-sdr: j3yjwsDSDkCwACDtlVfKF0p+kxmGUg0Tm32KEh6E/zLkHtl7TQh8zpmtFcDKQj7YB3CJj8W/um DxianSsnGfcHediS82PmCmV879jskJJFUU4uXvy1N4O1BS9GQP/+0Ohon3y2NH1nntxRzrsNOm GDyBksQxtSU9Nnb9QKI63rR5Xf4znEAwlMYyZlohIBehWvxMb3uO7qfSJM5s08+p6lXaJWE3Zf /T0qe8HAiL7E7vCCF/X+TEinlQuv8bU0nBRhP1X1/ZLunZ+ukWu2XuWbUvddpY7JGNl205dTiR zUM31cNaxk2WziuD+zLlFJux
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Mon, Jan 31, 2022 at 11:15:09AM +0000, Andrew Cooper wrote:
> On 31/01/2022 09:41, Roger Pau Monné wrote:
> > On Fri, Jan 28, 2022 at 01:29:19PM +0000, Andrew Cooper wrote:
> >> This is a statement of hardware behaviour, and not related to controls for 
> >> the
> >> guest kernel to use.  Pass it straight through from hardware.
> >>
> > Not really related to this patch per se, but I think we should expose
> > AMD_SSBD unconditionally for SPEC_CTRL (and VIRT_SSBD for
> > VIRT_SPEC_CTRL when supported) in the max policies and implement them
> > as noop for compatibility reasons?
> >
> > I would expect CPUs exposing SSB_NO to drop AMD_SSBD and VIRT_SSBD at
> > some point.
> 
> Why?  SSBD is an architectural feature.  It's far more likely to turn
> into a no-op on SSB_NO hardware, than to disappear, especially as the
> MSR is exposed to guests.
> 
> VIRT_SSBD is only offered by hypervisors, and should only be offered
> when there are members in the migration pool without MSR_SPEC_CTRL.

But we should also offer VIRT_SSBD in the max policy if the hardware
reports SSB_NO, because then it's a no-op and would allow for
migration from boxes where we do offer VIRT_SSBD.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.