Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933827AbeAIQIU (ORCPT + 1 other); Tue, 9 Jan 2018 11:08:20 -0500 Received: from mx1.redhat.com ([209.132.183.28]:56180 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932998AbeAIQIS (ORCPT ); Tue, 9 Jan 2018 11:08:18 -0500 Subject: Re: [PATCH 6/8] kvm: svm: pass MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD down to guest To: Konrad Rzeszutek Wilk Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, rkrcmar@redhat.com, liran.alon@oracle.com, jmattson@google.com, aliguori@amazon.com, thomas.lendacky@amd.com, dwmw@amazon.co.uk, bp@alien8.de, x86@kernel.org References: <20180109120311.27565-1-pbonzini@redhat.com> <20180109120311.27565-7-pbonzini@redhat.com> <20180109142242.GD18661@char.us.oracle.com> From: Paolo Bonzini Message-ID: <7d96bfb5-99c3-da31-0094-23097e3faec2@redhat.com> Date: Tue, 9 Jan 2018 17:08:13 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0 MIME-Version: 1.0 In-Reply-To: <20180109142242.GD18661@char.us.oracle.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Tue, 09 Jan 2018 16:08:18 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: Oops, I missed these. On 09/01/2018 15:22, Konrad Rzeszutek Wilk wrote: >> + if (have_spec_ctrl) { >> + rdmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl); >> + if (svm->spec_ctrl != 0) > Perhaps just : > > if (svm->spec_ctrl) ? > > And above too? These will become != SPEC_CTRL_ENABLE_IBRS or something like that. >> + wrmsrl(MSR_IA32_SPEC_CTRL, 0); >> + } >> + /* >> + * Speculative execution past the above wrmsrl might encounter >> + * an indirect branch and use guest-controlled contents of the >> + * indirect branch predictor; block it. >> + */ >> + asm("lfence"); > Don't you want this to be part of the if () .. else part? Not right now, because the processor could speculate that have_spec_ctrl == 0 and skip the wrmsrl. After it becomes a static_cpu_has, it could move inside, but only if the kernel is compiled with static keys enabled. > Meaning: > > if (have_spec_ctrl && svm->spec_ctrl) > wrmsrl(MSR_IA32_SPEC_CTRL, 0); > else > asm("lfence"); > > But .. I am missing something - AMD don't expose 0x48. They expose only 0x49. > > That is only the IPBP is needed on AMD? (I haven't actually seen any official > docs from AMD). AMD is not exposing 0x48 yet, but they plan to based on my information from a few weeks ago. Paolo