On 24/05/18 09:13, Jan Beulich wrote:
>>>> On 24.05.18 at 00:09, <andrew.coop...@citrix.com> wrote:
>> It is, as documented, not completely strictly true (according to the
>> latest revision of the spec), but is there deliberately to simply so we
>> don't give the guest implausible configurations.  There is not a
>> processor with STIBP but without IBRSB, nor is there one with SSBD
>> without STIBP or IBRSB, and it is unlikely that future processors would
>> change this arrangement.
> As pointed out elsewhere I believe this is a wrong dependency to make,
> even if perhaps current or past Intel docs suggest so (AMD ones don't
> for their versions of the features). Wile it may be the case that there's
> currently no case in practice with SSBD but no IBRSB, I don't see why
> this would need to remain that way. The two things are strictly
> independent.

Features will never disappear.  x86, more than most, maintains its
backwards compatibility.

> I very much think there should be an indicator of the MSR itself
> existing, set to the OR of any of the bits in the MSR that are valid.
> Shouldn't such a mask anyway be part of struct msr_domain_policy
> (as a companion to the current value of the MSR per vCPU)?

The only think this gets you is the ability to create implausible
combinations.

I don't think it is a useful or sensible use of time trying to support
combinations which will, most likely, never exist.  Certainly not for
combinations without a plausible usecase, as these will go stale very
quickly, given the churn in this area.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to