[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM guests


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 21 Apr 2022 11:39:25 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VFaAOGw15ZhpdmoNFHik/UtDGCLFuF8sa/fki2a9rP4=; b=EbfbgyAEeCyKZF7Taqeeaat/MPhA/rnsp8SdbgR4YX+4RTdqOKe1QIzEmbq5hLPSo7O2LF65St8voA6x8VWK1PghMlL+drUd+XW2/q2GUPrE5HuCLRyECMYZt6dHYejc7jSsH4/F+YFmOOn4w/vqyMc0VtUe1vWAQhns/gqsVgjb73ngG1x0p9YEwhjrKHzvqeqmRKJichgBzcjhSBvFYLSU162gDNb86WLQq4XstuVKug/b/nbXaiSUSmALASgQZMKKq815xHCNzsW5uGB8wb68M4mX+3hNFSkmMyNi5f7h6kVzyy4LmqbWXUIeGDQLJIEc7cVUraGwl4HE2XUf2w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DoaLt7p+a2kkxjs/eTfcrJO2T+M+RqkR+ssLdx9ODK2YlzzKx+hAI8Nl+xtR6xr/V7QiSeIOYjvr6v/XD+TBSJDi9tbvjR7z45+uCPZofU1hA8y0IJNOixUK8nGSHDirASzPi4mZ8y1rWPiG6jjLKvWtM/3WiCAdhXhq6nWVTFjYBLQiHdSH/AzmLjfiVxo+3dtr+fjQckYfbEIchkc8i00CDOJdCVFAF0hu99NUL/W79+fJmSXYTo4BKjBv5txTmfFh6hJkPEWNClsa80RIsS0C72iN5ISd6mql6QucWmOy6+miZuYiynIlLyOcHXvEso9yWjcouM53TE3wu6buNg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 21 Apr 2022 09:39:35 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 31.03.2022 11:27, Roger Pau Monne wrote:
> Allow HVM guests untrapped access to MSR_VIRT_SPEC_CTRL if the
> hardware has support for it. This requires adding logic in the
> vm{entry,exit} paths for SVM in order to context switch between the
> hypervisor value and the guest one. The added handlers for context
> switch will also be used for the legacy SSBD support.
> 
> Introduce a new synthetic feature leaf (X86_FEATURE_VIRT_SC_MSR_HVM)
> to signal whether VIRT_SPEC_CTRL needs to be handled on guest
> vm{entry,exit}.
> 
> This patch changes the annotation 's' to 'S' because it introduces
> support to expose VIRT_SSBD to guests by default when the host
> (virtual) hardware also supports it.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.