From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wm0-f71.google.com (mail-wm0-f71.google.com [74.125.82.71]) by kanga.kvack.org (Postfix) with ESMTP id 2C1D96B0372 for ; Thu, 8 Jun 2017 18:01:50 -0400 (EDT) Received: by mail-wm0-f71.google.com with SMTP id n125so4240622wmg.10 for ; Thu, 08 Jun 2017 15:01:50 -0700 (PDT) Received: from ppsw-30.csi.cam.ac.uk (ppsw-30.csi.cam.ac.uk. [131.111.8.130]) by mx.google.com with ESMTPS id 105si6012141wrb.23.2017.06.08.15.01.48 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 08 Jun 2017 15:01:48 -0700 (PDT) Subject: Re: [Xen-devel] [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3 References: <20170607191309.28645.15241.stgit@tlendack-t1.amdoffice.net> <20170607191453.28645.92256.stgit@tlendack-t1.amdoffice.net> <4a7376fb-abfc-8edd-42b7-38de461ac65e@amd.com> <67fe69ac-a213-8de3-db28-0e54bba95127@oracle.com> <12c7e511-996d-cf60-3a3b-0be7b41bd85b@oracle.com> From: Andrew Cooper Message-ID: Date: Thu, 8 Jun 2017 23:01:37 +0100 MIME-Version: 1.0 In-Reply-To: <12c7e511-996d-cf60-3a3b-0be7b41bd85b@oracle.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-GB Sender: owner-linux-mm@kvack.org List-ID: To: Boris Ostrovsky , Tom Lendacky , linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Brijesh Singh , Toshimitsu Kani , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Larry Woodman , Jonathan Corbet , Joerg Roedel , "Michael S. Tsirkin" , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , xen-devel , Paolo Bonzini On 08/06/2017 22:17, Boris Ostrovsky wrote: > On 06/08/2017 05:02 PM, Tom Lendacky wrote: >> On 6/8/2017 3:51 PM, Boris Ostrovsky wrote: >>>>> What may be needed is making sure X86_FEATURE_SME is not set for PV >>>>> guests. >>>> And that may be something that Xen will need to control through either >>>> CPUID or MSR support for the PV guests. >>> >>> Only on newer versions of Xen. On earlier versions (2-3 years old) leaf >>> 0x80000007 is passed to the guest unchanged. And so is MSR_K8_SYSCFG. >> The SME feature is in leaf 0x8000001f, is that leaf passed to the guest >> unchanged? > Oh, I misread the patch where X86_FEATURE_SME is defined. Then all > versions, including the current one, pass it unchanged. > > All that's needed is setup_clear_cpu_cap(X86_FEATURE_SME) in > xen_init_capabilities(). AMD processors still don't support CPUID Faulting (or at least, I couldn't find any reference to it in the latest docs), so we cannot actually hide SME from a guest which goes looking at native CPUID. Furthermore, I'm not aware of any CPUID masking support covering that leaf. However, if Linux is using the paravirtual cpuid hook, things are slightly better. On Xen 4.9 and later, no guests will see the feature. On earlier versions of Xen (before I fixed the logic), plain domUs will not see the feature, while dom0 will. For safely, I'd recommend unilaterally clobbering the feature as Boris suggested. There is no way SME will be supportable on a per-PV guest basis, although (as far as I am aware) Xen as a whole would be able to encompass itself and all of its PV guests inside one single SME instance. ~Andrew -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org