From patchwork Mon Feb 27 21:05:24 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Takahiro Itazuri X-Patchwork-Id: 5911 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:5915:0:0:0:0:0 with SMTP id v21csp2651327wrd; Mon, 27 Feb 2023 13:17:28 -0800 (PST) X-Google-Smtp-Source: AK7set9m6YZIIfs+IOVXZM7zXBQ6pGWFbbF3W6ULzytYAXqn4e3jTCQQdeWM+2KlppltSPkZXWZe X-Received: by 2002:a17:903:120d:b0:19c:bcb4:cacb with SMTP id l13-20020a170903120d00b0019cbcb4cacbmr287878plh.56.1677532648330; Mon, 27 Feb 2023 13:17:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1677532648; cv=none; d=google.com; s=arc-20160816; b=P426J8wD8l4zYC87YSUOH8RpuuB3MRQgW9X+jKQbiAQykU0T6WgOUFHWG7YA/7f2bZ g5XRVnojQdVFvcp32ZQvwvM0mDrEdNzHcqWPW5ZCgmfEGtwXIkgxzCxjhRlI3DQpVhES TnX46sVTjWg0TAFuPZ/qz6eC/1grlJsy8sBaKJyhLAP3pg/Ut8fQaSM0K6LAH8gi+reh QjSFDNhU8gvfoQVHBaMyVWdZLncqTME9nHv/57m1zHpljmZbiCFvXcVGCCOybtI29v1P YsmvGeD11638PWc5ipRlxTCGNT9QD4ovQSIt1Yk8oKwmorrKDN3+IBFNzB//PnqviudZ Bg1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=2KiKvFK2pjl8jx0HGi3QbZP7fKXFC2HYLTg5JQbTjrI=; b=ADf/bLjZjfe710pWQgW0NpalbuCKoY3Hfjp+6pRWBYCKAwDHisy2Pdwd6VsSt3cykh 5U5UaBWfeQpiyE0V+W2fwIQNhP9VapVUtVxGfVDspNhDEn2gHqO9a2CuA31wVQPcZQli +9Xd938PA4rH/WRbksdXxNgY0oSkg5p5iybFN5Egqg82tcSipTB6c1+zPX+f8HkUD+Sk 6/Xy7kgEIuaW2trthQM7PYM2yR0Q6pc5mm5Hl7EtdR/wlx4vsjtr7DReHYLA6ejKOxT5 7YSipRgeiRnSHKISPlSQ5ak0F5LIxARK8qwGeKrcdenZpqlaubpNK09d1I+7rCgWADlV s7XA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=SND8uTU4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p6-20020a1709026b8600b0019cc6eac51bsi7277187plk.1.2023.02.27.13.17.15; Mon, 27 Feb 2023 13:17:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=SND8uTU4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229904AbjB0VOk (ORCPT + 99 others); Mon, 27 Feb 2023 16:14:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50942 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229800AbjB0VOi (ORCPT ); Mon, 27 Feb 2023 16:14:38 -0500 Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com [99.78.197.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CB70E23D85; Mon, 27 Feb 2023 13:14:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1677532476; x=1709068476; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=2KiKvFK2pjl8jx0HGi3QbZP7fKXFC2HYLTg5JQbTjrI=; b=SND8uTU4z93mnunsWeyCUw+sFXFoEPzgWKhmLRCcIAb3XsEeR0uVLUuw SCJ9d4IZv2qEsc9inQSOJGyZ9/vW7T/e1OwIkDRuuiXcGdhjG5nREqis0 zWmj+llWVQUNKcnMksg0T+5G2rE4ug/FRMYijSXBXd8rRX0QrylAwgRD7 k=; X-IronPort-AV: E=Sophos;i="5.98,220,1673913600"; d="scan'208";a="187220727" Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO email-inbound-relay-pdx-2a-m6i4x-d40ec5a9.us-west-2.amazon.com) ([10.25.36.210]) by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Feb 2023 21:05:49 +0000 Received: from EX13MTAUWB002.ant.amazon.com (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194]) by email-inbound-relay-pdx-2a-m6i4x-d40ec5a9.us-west-2.amazon.com (Postfix) with ESMTPS id A4C7140D3F; Mon, 27 Feb 2023 21:05:47 +0000 (UTC) Received: from EX19D002ANA003.ant.amazon.com (10.37.240.141) by EX13MTAUWB002.ant.amazon.com (10.43.161.202) with Microsoft SMTP Server (TLS) id 15.0.1497.45; Mon, 27 Feb 2023 21:05:47 +0000 Received: from b0f1d8753182.ant.amazon.com (10.95.130.142) by EX19D002ANA003.ant.amazon.com (10.37.240.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.24; Mon, 27 Feb 2023 21:05:42 +0000 From: Takahiro Itazuri To: , CC: Sean Christopherson , Paolo Bonzini , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , , "Takahiro Itazuri" , Takahiro Itazuri Subject: [PATCH 0/2] KVM: x86: Propagate AMD-specific IBRS bits to guests Date: Mon, 27 Feb 2023 21:05:24 +0000 Message-ID: <20230227210526.83182-1-itazur@amazon.com> X-Mailer: git-send-email 2.38.0 MIME-Version: 1.0 X-Originating-IP: [10.95.130.142] X-ClientProxiedBy: EX19D031UWC001.ant.amazon.com (10.13.139.241) To EX19D002ANA003.ant.amazon.com (10.37.240.141) X-Spam-Status: No, score=-11.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1759020474018266058?= X-GMAIL-MSGID: =?utf-8?q?1759020474018266058?= VMMs retrieve supported CPUID features via KVM_GET_SUPPORTED_CPUID to construct CPUID information to be passed to KVM_SET_CPUID2. Most CPUID feature bits related to speculative attacks are propagated from host CPUID. But AMD processors have AMD-specific IBRS related bits in CPUID Fn8000_0008_EBX (ref: AMD64 Architecture Programmer's Manual Volume 3: General-Purpose and System Instructions) and some bits are not propagated to guests. Enable propagation of these bits to guests, so that VMMs don't have to enable them explicitly based on host CPUID. Takahiro Itazuri (2): x86/cpufeatures: Add AMD-specific IBRS bits KVM: x86: Propagate AMD-specific IBRS related bits arch/x86/include/asm/cpufeatures.h | 3 +++ arch/x86/kvm/cpuid.c | 5 +++-- 2 files changed, 6 insertions(+), 2 deletions(-)