Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp3346396pxb; Mon, 6 Sep 2021 19:28:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx889GaXBJi+0H3UvtOUxwFdhpjqdtmJhEQbEAFCWU7LBciUedj3+HwF+gqcvi0isyySFMg X-Received: by 2002:aa7:db87:: with SMTP id u7mr433926edt.92.1630981715474; Mon, 06 Sep 2021 19:28:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630981715; cv=none; d=google.com; s=arc-20160816; b=upGDDPfeVRQmVvEX3D++4dNzPHa9Igb5XXnV15YqG0fgf4d2kAZm7ONWSaSn+5oN/w uUfRz7sLKm4p2Di4s8fSCl3ii6RO45IA7efC/BJZ78omDFEX+oR5H/+FTeCBT5RStstQ hCxG/DBeMmGd4xva0vCdOrhnz1y5xTqwGOFBel4GceHFnSrTPvv/kyGrskCSAGhLtfXc ER4F4eYJxhBvYgzdUXLsT/uAxaSBVgKGE3DTG2o3T4otuQX6uo4o3ykvaCjT0PdNsm2a gMIFrgvydvWJt2ByUNRqllFAQh58leDO/oA0KlsLGX9yMBx0dcAXgLAzGCFKb/TuYfX0 /h0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=+OBaYryiFnQQL3QrhB9KQ7J2ntZG/A/bNLrLdSxXn9M=; b=01m7FPTQufm7hlMnLjMiiz1tXpaLmyT9efovKSgEG7txBixEH7hlnmKjp02qMrlwah fqDMOolLqT1fir3A3PYitKBIzYY6lhkW2PwfWqIhZ1vG/GovY0eAxpaFkADFm4Kx+iyF aFtw76mzUblKFCq5nW4UtGR5Kf5wAZapZv2dRhiisf+UTtawVzcauyw+wR9GlEkuRu+s klrgRNI6NscdVQpSxw3mZb9pMrpJ8sSGNrTpTtpplEYSspBJYWy5ACmPkZjUSV6NM37b V2MPm7ATGqtzzGEDKSx6YgFgfqI6kyVi2NrT54oUEtXpmGLemixnSRYnh5B1h6lzWxmr ErTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q19si10106413edv.394.2021.09.06.19.28.12; Mon, 06 Sep 2021 19:28:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242256AbhIGCJO (ORCPT + 99 others); Mon, 6 Sep 2021 22:09:14 -0400 Received: from mga11.intel.com ([192.55.52.93]:47530 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230250AbhIGCJN (ORCPT ); Mon, 6 Sep 2021 22:09:13 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10099"; a="216916157" X-IronPort-AV: E=Sophos;i="5.85,273,1624345200"; d="scan'208";a="216916157" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Sep 2021 19:08:06 -0700 X-IronPort-AV: E=Sophos;i="5.85,273,1624345200"; d="scan'208";a="605024733" Received: from xiaoyaol-mobl.ccr.corp.intel.com (HELO [10.239.13.122]) ([10.239.13.122]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Sep 2021 19:08:04 -0700 Subject: Re: [PATCH] x86/tsx: clear RTM and HLE when MSR_IA32_TSX_CTRL is not supported To: Hao Peng , Borislav Petkov Cc: tglx@linutronix.de, mingo@redhat.com, x86@kernel.org, linux-kernel@vger.kernel.org, Pawan Gupta References: From: Xiaoyao Li Message-ID: Date: Tue, 7 Sep 2021 10:08:01 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Firefox/78.0 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/7/2021 9:47 AM, Hao Peng wrote: > On Mon, Sep 6, 2021 at 5:30 PM Borislav Petkov wrote: >> >> On Mon, Sep 06, 2021 at 10:46:05AM +0800, Hao Peng wrote: >>> If hypervisor does not support MSR_IA32_TSX_CTRL, but guest supports >>> RTM and HLE features, it will affect TAA mitigation. >>> >>> Signed-off-by: Peng Hao >>> --- >>> arch/x86/kernel/cpu/tsx.c | 7 +++++++ >>> 1 file changed, 7 insertions(+) >>> >>> diff --git a/arch/x86/kernel/cpu/tsx.c b/arch/x86/kernel/cpu/tsx.c >>> index 9c7a5f049292..5e852c14fef2 100644 >>> --- a/arch/x86/kernel/cpu/tsx.c >>> +++ b/arch/x86/kernel/cpu/tsx.c >>> @@ -122,6 +122,13 @@ void __init tsx_init(void) >>> >>> if (!tsx_ctrl_is_supported()) { >>> tsx_ctrl_state = TSX_CTRL_NOT_SUPPORTED; >>> + >>> + /* If hypervisor does not support MSR_IA32_TSX_CTRL emulation, >>> + * but guest supports RTM and HLE features, it will affect TAA >>> + * (tsx_async_abort)mitigation. >>> + */ >>> + setup_clear_cpu_cap(X86_FEATURE_RTM); >>> + setup_clear_cpu_cap(X86_FEATURE_HLE); anyway, IMHO, we shouldn't do anything here for TAA. It should be in taa_select_mitigation() >>> return; >>> } >> >> How does that even happen - the hypervisor does not support the MSR but >> "guest supports" TSX features?! >> >> I guess the guest is detecting it wrong. >> >> What hypervisor, what guest, how do I reproduce? >> > hypervisor is kvm, guest is linux too. >> Please give full details. >> > The host I used is kernel-5.4, and guest is kernel-5.13. > MSR_IA32_TSX_CTRL is exposed > to guest and guest to support RTM and HLE features, no direct > dependence. at the qemu I > started guest with -cpu host-model. > I have viewed the code of kernel-5.4, and MSR_IA32_TSX_CTRL is not > exposed to guest. Does guest see TAA_NO bit? > Thanks. >> -- >> Regards/Gruss, >> Boris. >> >> https://people.kernel.org/tglx/notes-about-netiquette