Received: by 10.223.176.5 with SMTP id f5csp1642353wra; Wed, 31 Jan 2018 09:19:58 -0800 (PST) X-Google-Smtp-Source: AH8x2255nSytGj0lM0l8QRHsGbijZ9Cd/sWmo6dZMRZTqmEGhFO+ya3Wgzc4q21GxQQhJtcnu2G+ X-Received: by 2002:a17:902:14cb:: with SMTP id y11-v6mr9436760plg.294.1517419198592; Wed, 31 Jan 2018 09:19:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517419198; cv=none; d=google.com; s=arc-20160816; b=J5ARMa8WcHw01qfCn/9iocOvArHdOjV8QsVXZrHcV6FDL+KLRLIRPnPEAkHtQWeYwi aNqTwl5DC5dlKm6//3U23Pz1QS9c7MdI8V481/kIYwy44lkbGvCs5178UibwGobPyqN0 LlxrBzVKjSPvqIMymNk75ngFY2tURhSUVhut77u4lCwOfRANLJn13bjtjX0p2advntEN oD6/NozRqY8yv0UKfxj12ZR7viWEPa69QMCpypqidE61/fF0Vdc102NLw7CsKcmaWqhN MbdNbYyOlgqPMWdwMKIeZQ40mhnI/bqj3pbGAImkMI66MocLn9iZ5QS4z73ZIlakouDU r6eA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=Q3UOqeZ+APFSjlQC7I5BmgWaDDw5lOa+Oz+FEMd21og=; b=SIZmNQshwAKiyk/ygx8bRkCgxjA7fgHFZkCKLg0eluL59vlUft3lnclC2UPfMZFtgI Wm5nzKU2+4s8gs7YwVBMkyaAfGBCFHnm/OXetOHRd6/KJPsoAOA+w78jvWTumHvZCgBi N3JDKyqAapuzoPp04kntYB9CM8xsr5TZJ3n1vl2uiLeTlJqGtIeLGb6Tq0S9+M7ybgps oFCh2yUBih51tNA/KHdiE6xN4nWaKEy59i2Q9bkvRHk8Hfezol8uGWIMZWcVR9t9s1Wc +3ejjlrc+hthZJjEZ2yLveyv/NacS1Dcb4WoyD0O7pL99K7xjML1KziREsCyIbBrUMfF PKqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v8-v6si14316591plg.673.2018.01.31.09.19.43; Wed, 31 Jan 2018 09:19:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932179AbeAaRPq (ORCPT + 99 others); Wed, 31 Jan 2018 12:15:46 -0500 Received: from mx1.redhat.com ([209.132.183.28]:35156 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752347AbeAaRPn (ORCPT ); Wed, 31 Jan 2018 12:15:43 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5B6C8C053FBA; Wed, 31 Jan 2018 17:15:43 +0000 (UTC) Received: from [10.36.116.69] (ovpn-116-69.ams2.redhat.com [10.36.116.69]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 470F85D6B7; Wed, 31 Jan 2018 17:15:37 +0000 (UTC) Subject: Re: [PATCH v4 2/5] KVM: x86: Add IBPB support To: KarimAllah Ahmed , Jim Mattson , KarimAllah Ahmed Cc: the arch/x86 maintainers , LKML , kvm list , Ashok Raj , Asit Mallick , Dave Hansen , Arjan Van De Ven , Tim Chen , Linus Torvalds , Andrea Arcangeli , Andi Kleen , Thomas Gleixner , Dan Williams , Jun Nakajima , Andy Lutomirski , Greg KH , Peter Zijlstra , David Woodhouse References: <1517404231-22406-1-git-send-email-karahmed@amazon.de> <1517404231-22406-3-git-send-email-karahmed@amazon.de> <5f37b853-e7bb-0259-653c-6f526b106594@amazon.com> From: Paolo Bonzini Message-ID: <200c5e32-e238-ee87-45ed-4701285ff489@redhat.com> Date: Wed, 31 Jan 2018 12:15:35 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <5f37b853-e7bb-0259-653c-6f526b106594@amazon.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Wed, 31 Jan 2018 17:15:43 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 31/01/2018 12:11, KarimAllah Ahmed wrote: > On 01/31/2018 05:50 PM, Jim Mattson wrote: >> On Wed, Jan 31, 2018 at 5:10 AM, KarimAllah Ahmed >> wrote: >> >>> +               vmx_disable_intercept_for_msr(vmx->vmcs01.msr_bitmap, >>> MSR_IA32_PRED_CMD, >>> +                                             MSR_TYPE_W); >> >> Why not disable this intercept eagerly, rather than lazily? Unlike >> MSR_IA32_SPEC_CTRL, there is no guest value to save/restore, so there >> is no cost to disabling the intercept if the guest cpuid info declares >> support for it. >> >> >>> +       if (to_vmx(vcpu)->save_spec_ctrl_on_exit) { >>> +               nested_vmx_disable_intercept_for_msr( >>> +                               msr_bitmap_l1, msr_bitmap_l0, >>> +                               MSR_IA32_PRED_CMD, >>> +                               MSR_TYPE_R); >>> +       } >> >> I don't think this should be predicated on >> "to_vmx(vcpu)->save_spec_ctrl_on_exit." Why not just >> "guest_cpuid_has(vcpu, X86_FEATURE_IBPB)"? > > Paolo suggested this on the previous revision because guest_cpuid_has() > would be slow. Sorry, that was for spec_ctrl. Here there's no need to do any kind of conditional check. Paolo >> Also, the final argument to >> nested_vmx_disable_intercept_for_msr should be MSR_TYPE_W rather than >> MSR_TYPE_R. >> > Oops! will fix! > Amazon Development Center Germany GmbH > Berlin - Dresden - Aachen > main office: Krausenstr. 38, 10117 Berlin > Geschaeftsfuehrer: Dr. Ralf Herbrich, Christian Schlaeger > Ust-ID: DE289237879 > Eingetragen am Amtsgericht Charlottenburg HRB 149173 B