Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933561AbeAHPQP (ORCPT + 1 other); Mon, 8 Jan 2018 10:16:15 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:49859 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932606AbeAHPQM (ORCPT ); Mon, 8 Jan 2018 10:16:12 -0500 Date: Mon, 8 Jan 2018 16:15:35 +0100 (CET) From: Thomas Gleixner To: Tom Lendacky cc: Andrew Cooper , bp@alien8.de, dwmw@amazon.co.uk, gregkh@linux-foundation.org, pjt@google.com, mingo@kernel.org, linux-kernel@vger.kernel.org, hpa@zytor.com, tim.c.chen@linux.intel.com, torvalds@linux-foundation.org, peterz@infradead.org, dave.hansen@intel.com, linux-tip-commits@vger.kernel.org Subject: Re: [tip:x86/pti] x86/cpu/AMD: Use LFENCE_RDTSC instead of MFENCE_RDTSC In-Reply-To: <4d9a1f0d-a401-3f0f-9ee2-dd42f4b4716a@amd.com> Message-ID: References: <20180105160756.23786.4220.stgit@tlendack-t1.amdoffice.net> <1b179b8b-6cc8-d736-81dc-2445be4baf02@citrix.com> <4d9a1f0d-a401-3f0f-9ee2-dd42f4b4716a@amd.com> User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: multipart/mixed; BOUNDARY="8323329-638220534-1515424535=:1735" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --8323329-638220534-1515424535=:1735 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT On Mon, 8 Jan 2018, Tom Lendacky wrote: > On 1/8/2018 5:10 AM, Thomas Gleixner wrote: > >>> Second thoughts on that. As pointed out by someone in one of the insane > >>> long threads: > >>> > >>> What happens if the kernel runs as a guest and > >>> > >>> - the hypervisor did not set the LFENCE to serializing on the host > >>> > >>> - the hypervisor does not allow writing MSR_AMD64_DE_CFG > >>> > >>> That would bring the guest into a pretty bad state or am I missing > >>> something essential here? > >> > >> What I did in Xen was to attempt to set it, then read it back and see.  > >> If LFENCE still isn't serialising, using repoline is the only available > >> mitigation. > >> > >> My understanding from the folk at AMD is that retpoline is safe to use, > >> but has higher overhead than the LFENCE approach. > > Correct, the retpoline will work, it just takes more cycles. > > > > > That still does not help vs. rdtsc_ordered() and LFENCE_RDTSC ... > > Ok, I can add the read-back check before setting the feature flag(s). > > But... what about the case where the guest is a different family than > hypervisor? If we're on, say, a Fam15h hypervisor but the guest is started > as a Fam0fh guest where the MSR doesn't exist and LFENCE is supposed to be > serialized? I'll have to do a rdmsr_safe() and only set the flag(s) if I > can successfully read the MSR back and validate the bit. But that still does not make this patch correct and neither the next one. If you cannot set the flag and you cannot prove that you run on bare metal, then you still need the MFENCE_RDTSC variant as you have no idea what the underlying hypervisor is and how it has the LFENCE configured. Thanks, tglx --8323329-638220534-1515424535=:1735--