[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 7/9] x86/svm: VMEntry/Exit logic for MSR_SPEC_CTRL


  • To: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 1 Feb 2022 13:40:11 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MDRW/Olnu5E8VPy5W3O0ZgHI1/knDGqygMIYuN6pLBw=; b=AC0YEK30+CjUztNhuaOWqNGJhAyWSCsYp/gpORQZmPoFp1AvbLn6brSJT39QBXPgUq27yBUV7RLVt7P7Tin3JOoksrZFU2E1YzhJ13thqxZFAseGxyOqTap87C/6JvCHj5yubyt3yIzceAipxCpbvXrpjATE8U9BpMl+slfnxPIKytC2iXAM27ZqCk2FoEH+gy8cfl1pUd/tVXY4OD0P9AoOkGf5MYzc6t9/fJBGueLzhZJWXt7r+9loR2P9+Qk/szROf7X4E91MHpQyEQmfM7lfHE9aK1Pglhz+cDwaQ/LOVb9xzi+ukVM4Hvfm/8SgeqZfeMreAvM4ktrV9jhT0A==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Z6/5F5XQeR7+H8Wf+53yvpNe9JZJFDYC2B5frAQTiHX+XPrrYrMWLw/ccVTuR8BQLqgknXN7Tjip5P3MeCmpEPmPkkiLDX8gtm2gPgyvrHfZrkaNKEuCoeYJ5DGFwu/GhImghvQ0u8jFJVvVZNdMX66A2fbJWieWEk1cHFNFEhdzAuH1zmlUMWw01Lt30x1BvcUal1mL2nD/Wf1n4NCFych8v4+sREZg9EkHZPlcxC+jSsJ9jKd08xoHab/suEa5gl/YooFBtBkrZByJzBKoFku/KBL2IyQ3QQ0OsXWhqyHjJrIYswkIKcYA+ygt/bJU6kysmmHv434Sk0aroGok7Q==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 01 Feb 2022 12:40:23 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 01.02.2022 13:28, Andrew Cooper wrote:
> On 01/02/2022 11:47, Jan Beulich wrote:
>> On 31.01.2022 16:36, Andrew Cooper wrote:
>>> Hardware maintains both host and guest versions of MSR_SPEC_CTRL, but guests
>>> run with the logical OR of both values.  Therefore, in principle we want to
>>> clear Xen's value before entering the guest.  However, for migration
>>> compatibility,
>> I think you've explained this to me before, but I can't seem to put
>> all of it together already now. Could expand on how a non-zero value
>> behind a guest's back can help with migration compatibility? At the
>> first glance I would be inclined to say only what the guest actually
>> gets to see and use can affect its migration.
> 
> For VMs which see VIRT_SPEC_CTRL (compatibility with Fam15 thru Zen1),
> writes of VIRT_SPEC_CTRL.SSBD (probably) need to use
> SSBD-behind-the-guest's back.  I say probably, because I think this is
> the least bad implementation option, but until we have working support,
> it's still a guess.

So this is future work (and mentioning just this in the description
would be enough to address my comment), but ...

> For the ultra paranoid, a VM migrating in which can't see PSFD (e.g. for
> compatibility with Zen2) should have PSFD set behind it's back.

... this is something we should be doing right away then?

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.