Re: [PATCH] x86/speculation/srbds: do not try to turn mitigation off when not supported

From: Borislav Petkov
Date: Mon Jun 15 2020 - 04:29:09 EST


On Tue, Jun 09, 2020 at 02:43:13PM -0300, Thadeu Lima de Souza Cascardo wrote:
> When SRBDS is mitigated by TSX OFF, update_srbds_msr will still read and

Are you talking about this case in srbds_select_mitigation():

if ((ia32_cap & ARCH_CAP_MDS_NO) && !boot_cpu_has(X86_FEATURE_RTM))
srbds_mitigation = SRBDS_MITIGATION_TSX_OFF;

?

and you have a system which:

* Check to see if this is one of the MDS_NO systems supporting
* TSX that are only exposed to SRBDS when TSX is enabled.

i.e., no SRBDS microcode for it and the fix is to disable TSX?

If so, I think the right fix should be to do:

if (!boot_cpu_has(X86_FEATURE_SRBDS_CTRL))
return;

in update_srbds_msr() with a comment above it explaining why that check
is being done.

Hmmm.

--
Regards/Gruss,
Boris.

https://people.kernel.org/tglx/notes-about-netiquette