|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 7/9] x86/hvm: Disable MPX by default
On 17/06/2020 12:24, Jan Beulich wrote:
> On 17.06.2020 13:16, Andrew Cooper wrote:
>> On 17/06/2020 11:32, Jan Beulich wrote:
>>> On 16.06.2020 18:15, Andrew Cooper wrote:
>>>> On 16/06/2020 10:33, Jan Beulich wrote:
>>>>> On 15.06.2020 16:15, Andrew Cooper wrote:
>>>>>> @@ -479,6 +497,18 @@ int xc_cpuid_apply_policy(xc_interface *xch,
>>>>>> uint32_t domid, bool restore,
>>>>>> goto out;
>>>>>> }
>>>>>>
>>>>>> + /*
>>>>>> + * Account for feature which have been disabled by default since
>>>>>> Xen 4.13,
>>>>>> + * so migrated-in VM's don't risk seeing features disappearing.
>>>>>> + */
>>>>>> + if ( restore )
>>>>>> + {
>>>>>> + if ( di.hvm )
>>>>>> + {
>>>>>> + p->feat.mpx = test_bit(X86_FEATURE_MPX, host_featureset);
>>>>> Why do you derive this from the host featureset instead of the max
>>>>> one for the guest type?
>>>> Because that is how the logic worked for 4.13.
>>>>
>>>> Also, because we don't have easy access to the actual guest max
>>>> featureset at this point. I could add two new sysctl subops to
>>>> get_featureset, but the reason for not doing so before are still
>>>> applicable now.
>>>>
>>>> There is a theoretical case where host MPX is visible but guest max is
>>>> hidden, and that is down to the vmentry controls. As this doesn't exist
>>>> in real hardware, I'm not terribly concerned about it.
>>> I'd also see us allow features to be kept for the host, but masked
>>> off of the/some guest feature sets, by way of a to-be-introduced
>>> command line option.
>> What kind of usecase do you have in mind for this? We've got a load of
>> features which are blanket disabled for guests. I suppose `ler` et al
>> ought to have an impact, except for the fact that LBR at that level
>> isn't architectural and always expected.
> What I was thinking of was the kind of "none of my guests should use
> AVX512 - let me disable it globally, rather than individually in
> each guest's config" approach. Of course AVX512 is something we use
> in Xen only to emulate guest insns, but I think the example still
> serves the purpose.
We actually have AVX512 disabled by default in XenServer. The perf
implications of letting 1 guest play with it is very severe.
Now I think about it, I'm tempted to recommend it moves out of default
generally.
~Andrew
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |