Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp927162rwe; Wed, 24 Aug 2022 11:24:26 -0700 (PDT) X-Google-Smtp-Source: AA6agR7ZA+0UvYne32jLLFKXn1SiLToHvM42+dNDTBylUKySOfSseqPl8cEuOvi2KC7alOLSaOB2 X-Received: by 2002:a17:907:391:b0:73d:c7d5:bb51 with SMTP id ss17-20020a170907039100b0073dc7d5bb51mr139731ejb.177.1661365466243; Wed, 24 Aug 2022 11:24:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661365466; cv=none; d=google.com; s=arc-20160816; b=BsTQLjm0Q4New1sbtDFXYg6Oq0dnTNMK98PGXODmKwJKFYJPJts/EXw2x0y4sNDFZX ukqcv3xbScVHUkrv6Y2u1pHLgkki5EK0DB4He1MCroRg9oF77VFNJ12UBtusnYzGpggm wNeDflBBg99dRo2vyGKaC7GUN/JCi8y0KxJv0JzLZcHIMMJOCw3yh9OQsAFp4+gTtY+6 qy9qTlOE+kr2qEjbI8ncr7UEqHrJUsxi36uVP67QPba8tQSkYE2jNQknT0N+wRKlXVwH O3EkLTk7PgyqPXwXRsvhbU+OQ9k6OVau/j1yelvrJAMGlk7kYDvEtwM0cniSK7sZmxFX E8wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=xH1Eh5z9tkUCDvtKIBQEtl0pleKDswE2sHWuXsvAcw0=; b=YoslS6G7g0BmpFhhtPNdL432LlO2OZbcM/QRgGMqwA9c0iZUh/NaMQsE4rH5mEbZQG 44Gqc7Et4pTzqa8ZK5zLWfT2BiwqWOBZU17OYrVXtL7a/mVpFzOfNijeZs73YdATKIHT Zo1XawSA/Hj7Mh0H+I7Vq+i/+tCVww3DMHY5sC4JbqP3HGcrEyzkSEOccRks73Hl8+M2 Q1vUswPoBXlHv4UdsaGEB3drNCjRaM9j0avEY72fLrBKxLGI9iWNb1f2+qKUIBxSQFYA 0lwWl9gFbWxGJDkuxRqi0hmvcYjHlfGdqFoA9g9/l0HjMFQ819/wX5uNKZW4WpkslP92 mFww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=NsQBcHWG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hb36-20020a170907162400b0073d8663d88csi2591991ejc.685.2022.08.24.11.24.00; Wed, 24 Aug 2022 11:24:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=NsQBcHWG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239998AbiHXRQ5 (ORCPT + 99 others); Wed, 24 Aug 2022 13:16:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52890 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238625AbiHXRQ4 (ORCPT ); Wed, 24 Aug 2022 13:16:56 -0400 Received: from mail-oi1-x233.google.com (mail-oi1-x233.google.com [IPv6:2607:f8b0:4864:20::233]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 705B97C192 for ; Wed, 24 Aug 2022 10:16:55 -0700 (PDT) Received: by mail-oi1-x233.google.com with SMTP id v125so20171378oie.0 for ; Wed, 24 Aug 2022 10:16:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=xH1Eh5z9tkUCDvtKIBQEtl0pleKDswE2sHWuXsvAcw0=; b=NsQBcHWGLr6oKTDzceDUWnHHpP7nUmIJa/T1MYZjObZKbcmEaYGtC3QHf2cMnptmuB +DIHBikwmq4vqES5qVSv+ILUA5HZbOYmtabmfRarE872HH2gC5t40PJsuj3INT/jfGI6 98swjjo91Qcj16FVsGmWU/KVXeUEzSMoUDXhbH2HfnAP9JmEiao/SD4h4RTqWVnnE6Z9 Rl5B0bGRew5yX7LmB08tSGtXR+PH/UqniywSKypYn0ZwYel64JvKcMTOZ6jiYI6STq5S NjyFEpKE/I3//FdFd2MU40jiTUBI91bVckHJEk7UILlyuYMU0N0DS7gBnHCa06yLJY2D eDWw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=xH1Eh5z9tkUCDvtKIBQEtl0pleKDswE2sHWuXsvAcw0=; b=5Q99Sz12Ez6v6htcAk3g7ai+ehVTj7armP1wQkW50Pe04upbUoTBabmMkHvUxun+Y4 vQ6r73WwH8op82yu+QaYB9kkc/noMSMcxnt447m81/OHp7AcWQ832qFk4uTqOlsDyFW8 vN6NIKYaKB92u5xCBZ9OItWoo2f9Culh0DmSyERcNfcABI/yL92/ldeBcthK0pLSTOKG qYPntZ80yO4TrIJiY5sL0ppY9Im//8/xELphkBrugms3uzg/N8RDfqE8qQNN0tE3OvW6 TZNXjvXNqGb9FOMasrnD6ukJ/yuO98hF1ym2Uo1rcNKtRZYK5kVeGRqUK19117OorN56 f0MQ== X-Gm-Message-State: ACgBeo0uxnD8Lu/KVLLbrv3sh7KU9ynOuVFJOlH0pNAxQRFL7TqlPGdR W8QSjYyhfFEZVn6+GMJWIH+1QnH5PNwgQ4gKS7ZF/A== X-Received: by 2002:a05:6808:150f:b0:343:3202:91cf with SMTP id u15-20020a056808150f00b00343320291cfmr3657938oiw.112.1661361414498; Wed, 24 Aug 2022 10:16:54 -0700 (PDT) MIME-Version: 1.0 References: <163244601049.30292.5855870305350227855.stgit@bmoger-ubuntu> In-Reply-To: From: Jim Mattson Date: Wed, 24 Aug 2022 10:16:42 -0700 Message-ID: Subject: Re: [PATCH] KVM: x86: Expose Predictive Store Forwarding Disable To: Paolo Bonzini Cc: Babu Moger , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, hpa@zytor.com, seanjc@google.com, vkuznets@redhat.com, wanpengli@tencent.com, joro@8bytes.org, tony.luck@intel.com, peterz@infradead.org, kyung.min.park@intel.com, wei.huang2@amd.com, jgross@suse.com, andrew.cooper3@citrix.com, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED,USER_IN_DEF_DKIM_WL, USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 24, 2022 at 10:13 AM Paolo Bonzini wrote: > > On 8/23/22 23:26, Jim Mattson wrote: > > For consistency, should this feature be renamed AMD_PSFD, now that > > Intel is enumerating PSFD with CPUID.(EAX=7,ECX=2):EDX.PSFD[bit 0]? > > Seehttps://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/cpuid-enumeration-and-architectural-msrs.html. > > > > And, Paolo, why are we carrying X86_FEATURE_PSFD as a private #define > > in KVM rather than putting it where it belongs in cpufeatures.h? > > > > Borislav asked to not show psfd in /proc/cpuinfo, because Linux had > decided not to control PSF separately; instead it just piggybacked > on SSBD which should disable PSF as well. Honestly I disagree but > it's not my area of maintenance. Do we expose PSFD in KVM for the use of another popular guest OS?