linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Borislav Petkov <bp@alien8.de>
To: Manikandan Jagatheesan <mjagatheesan@vmware.com>
Cc: "peterz@infradead.org" <peterz@infradead.org>,
	"jpoimboe@kernel.org" <jpoimboe@kernel.org>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"dave.hansen@linux.intel.com" <dave.hansen@linux.intel.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"hpa@zytor.com" <hpa@zytor.com>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"srivatsa@csail.mit.edu" <srivatsa@csail.mit.edu>,
	Peter Jonasson <pjonasson@vmware.com>,
	Yiu Cho Lau <lauyiuch@vmware.com>, Rajender M <manir@vmware.com>,
	Abdul Anshad Azeez <aazees@vmware.com>,
	Kodeswaran Kumarasamy <kkumarasamy@vmware.com>,
	Rahul Gopakumar <gopakumarr@vmware.com>
Subject: Re: Performance Regression in Linux Kernel 5.19
Date: Sat, 10 Sep 2022 09:52:27 +0200	[thread overview]
Message-ID: <YxxCMSYaI/o3QH03@nazgul.tnic> (raw)
In-Reply-To: <PH0PR05MB8448A203A909959FAC754B7AAF439@PH0PR05MB8448.namprd05.prod.outlook.com>

On Fri, Sep 09, 2022 at 11:46:08AM +0000, Manikandan Jagatheesan wrote:
> After performing the bisect between kernel 5.18 and 5.19, we 
> identified the root cause to be the enablement of IBRS mitigation 
> for spectre_v2 vulnerability by commit 6ad0ad2bf8a6 ("x86/bugs: 
> Report Intel retbleed vulnerability").

What I'm wondering about is why does the guest enable IBRS when booting
on your HV?

I'm guessing you're exposing SPEC_CTRL and all the feature flags so that
the detection in spectre_v2_select_mitigation(), the SPECTRE_V2_CMD_AUTO
case, hits.

But then, why are you emulating a CPU which is vulnerable to retbleed?

Because as far as the guest is concerned, filling the RSB on VMEXIT
should be good enough and the guest doesn't have to do anything else.

IOW, X86_BUG_RETBLEED should not be set on the guest booting on your HV.

Hmmm?

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

  parent reply	other threads:[~2022-09-10  7:52 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-09-09 11:46 Performance Regression in Linux Kernel 5.19 Manikandan Jagatheesan
2022-09-09 13:18 ` Peter Zijlstra
2022-09-09 21:22 ` David Laight
2022-09-10  7:52 ` Borislav Petkov [this message]
2022-09-12 10:58   ` Borislav Petkov
2022-09-13  8:40     ` Manikandan Jagatheesan
2022-09-13 10:27       ` Boris Petkov
2022-09-13 11:20       ` Peter Zijlstra

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YxxCMSYaI/o3QH03@nazgul.tnic \
    --to=bp@alien8.de \
    --cc=aazees@vmware.com \
    --cc=dave.hansen@linux.intel.com \
    --cc=gopakumarr@vmware.com \
    --cc=hpa@zytor.com \
    --cc=jpoimboe@kernel.org \
    --cc=kkumarasamy@vmware.com \
    --cc=lauyiuch@vmware.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=manir@vmware.com \
    --cc=mingo@redhat.com \
    --cc=mjagatheesan@vmware.com \
    --cc=peterz@infradead.org \
    --cc=pjonasson@vmware.com \
    --cc=srivatsa@csail.mit.edu \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).