Received: by 10.223.176.5 with SMTP id f5csp2366884wra; Sun, 28 Jan 2018 19:01:16 -0800 (PST) X-Google-Smtp-Source: AH8x227BBb6INHDo65K95KQy5QaiMrZWkCPycRDWEnXUF90p1u3b4V7mXkw1hNJEp5CkUFaq/nN6 X-Received: by 2002:a17:902:7795:: with SMTP id o21-v6mr10577982pll.314.1517194876276; Sun, 28 Jan 2018 19:01:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517194876; cv=none; d=google.com; s=arc-20160816; b=vENMpIEhUlbi1H5i4zfQpWbwApuhFsqmWJfXUQ+alZEdgMbAZk9r1BKdWPYRiNjMG7 C1e00SLEmL60Z6n5qBiu2nfSVvUH3VRdHROB4DOU3Ta+kkerh47huhfbLD7vXcTyB/mz BXYSlH2Id/CpXbYRiYZVMCjHTuVL10wp4wmSFrrL+5PhaNogS/r8Mc+RpKlnbmfzImrm Abh+FYOdq73KiFMLec7CSkAQ7sWCbZHz3TLnOxeck3KYS//K0t0YTIaeFfNm957QDayo 8CAESljMXBagyn4tLlNsHUsWknVKtmjlTEAIkhMDnwSFqq30iGRUqvdAZs5oaTG6/uub Rfiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=dTEn4bBCrqNONd8mYQeEL8SchV8Fv6uLRNrG2ZNUiB8=; b=GawHHVc3Ymqo2cHW9lRCrU6KkXcLSWvX9yCj5FfvBRGKPZNpe3EuU+HF9vW/ZP0JOp Q9lm2qn7tV1KpXmkb2FYlARyXJXEcsQmM6JHUvkDQ41qUJWBfzxSUq6fYc8bweKgxfl6 0SQZSa+hIGvnGn7vrYF4HAhdA87z6M4gKFzG7IGAS00R7QQy41uVm9At737PyA4DGO3y 5tVlG+Zwwd7A+D2hbWBvFvaHmzx4MzZ+rVC/c2FhZ+V/bHfun6mKxR9dqZtW0npPvMvC y83j7tqB8jcNHNBF/MxXY6buslFcLypgO/QxMk+ay3zYGx0dAH3o9QMmN0TlgMpQRc4I 0AvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=WfhlK+Bu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si8324071plq.540.2018.01.28.19.01.01; Sun, 28 Jan 2018 19:01:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=WfhlK+Bu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754554AbeA2BAY (ORCPT + 99 others); Sun, 28 Jan 2018 20:00:24 -0500 Received: from smtp-fw-33001.amazon.com ([207.171.190.10]:21161 "EHLO smtp-fw-33001.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754468AbeA2BAW (ORCPT ); Sun, 28 Jan 2018 20:00:22 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1517187622; x=1548723622; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=dTEn4bBCrqNONd8mYQeEL8SchV8Fv6uLRNrG2ZNUiB8=; b=WfhlK+BuryPMAbb3yBxcjxJuKCPzZPs5NWG3vgPqty53K6hDt+JHlDWu /8LGpBxsDAFpb74W+m7H65t2OA0PTrHMVmfv6FAsXTXVaRD4kgQyfhmT/ JSOzrP+Ymsfw3MY+BudVub06WxtPq6kdz9E7XRHd9Er0eJ4OhghU9Mztx Q=; X-IronPort-AV: E=Sophos;i="5.46,428,1511827200"; d="scan'208";a="717361308" Received: from sea3-co-svc-lb6-vlan2.sea.amazon.com (HELO email-inbound-relay-2c-397e131e.us-west-2.amazon.com) ([10.47.22.34]) by smtp-border-fw-out-33001.sea14.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 29 Jan 2018 00:59:36 +0000 Received: from u54e1ad5160425a4b64ea.ant.amazon.com (pdx2-ws-svc-lb17-vlan2.amazon.com [10.247.140.66]) by email-inbound-relay-2c-397e131e.us-west-2.amazon.com (8.14.7/8.14.7) with ESMTP id w0T0xTZi086049 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 29 Jan 2018 00:59:31 GMT Received: from u54e1ad5160425a4b64ea.ant.amazon.com (localhost [127.0.0.1]) by u54e1ad5160425a4b64ea.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTP id w0T0xSIm032459; Mon, 29 Jan 2018 01:59:28 +0100 Received: (from karahmed@localhost) by u54e1ad5160425a4b64ea.ant.amazon.com (8.15.2/8.15.2/Submit) id w0T0xRwe032457; Mon, 29 Jan 2018 01:59:27 +0100 From: KarimAllah Ahmed To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org Cc: KarimAllah Ahmed , Asit Mallick , Dave Hansen , Arjan Van De Ven , Tim Chen , Linus Torvalds , Andrea Arcangeli , Andi Kleen , Thomas Gleixner , Dan Williams , Jun Nakajima , Andy Lutomirski , Greg KH , Paolo Bonzini , Ashok Raj Subject: [PATCH v2 4/4] x86: vmx: Allow direct access to MSR_IA32_ARCH_CAPABILITIES Date: Mon, 29 Jan 2018 01:58:52 +0100 Message-Id: <1517187532-32286-5-git-send-email-karahmed@amazon.de> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1517187532-32286-1-git-send-email-karahmed@amazon.de> References: <1517187532-32286-1-git-send-email-karahmed@amazon.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add direct access to MSR_IA32_SPEC_CTRL for guests. Future intel processors will use this MSR to indicate RDCL_NO (bit 0) and IBRS_ALL (bit 1). Cc: Asit Mallick Cc: Dave Hansen Cc: Arjan Van De Ven Cc: Tim Chen Cc: Linus Torvalds Cc: Andrea Arcangeli Cc: Andi Kleen Cc: Thomas Gleixner Cc: Dan Williams Cc: Jun Nakajima Cc: Andy Lutomirski Cc: Greg KH Cc: Paolo Bonzini Cc: Ashok Raj Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/cpuid.c | 4 +++- arch/x86/kvm/vmx.c | 2 ++ 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 32c0c14..2339b1a 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -71,6 +71,7 @@ u64 kvm_supported_xcr0(void) #define KVM_CPUID_BIT_AVX512_4VNNIW 2 #define KVM_CPUID_BIT_AVX512_4FMAPS 3 #define KVM_CPUID_BIT_IBRS 26 +#define KVM_CPUID_BIT_ARCH_CAPABILITIES 29 #define KF(x) bit(KVM_CPUID_BIT_##x) int kvm_update_cpuid(struct kvm_vcpu *vcpu) @@ -394,7 +395,8 @@ static inline int __do_cpuid_ent(struct kvm_cpuid_entry2 *entry, u32 function, /* cpuid 7.0.edx*/ const u32 kvm_cpuid_7_0_edx_x86_features = KF(AVX512_4VNNIW) | KF(AVX512_4FMAPS) | \ - (boot_cpu_has(X86_FEATURE_IBRS) ? KF(IBRS) : 0); + (boot_cpu_has(X86_FEATURE_IBRS) ? KF(IBRS) : 0) | \ + (boot_cpu_has(X86_FEATURE_ARCH_CAPABILITIES) ? KF(ARCH_CAPABILITIES) : 0); /* all calls to cpuid_count() should be made on the same cpu */ get_cpu(); diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index f82a44c..99cb761 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -9617,6 +9617,8 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id) if (boot_cpu_has(X86_FEATURE_IBPB)) vmx_disable_intercept_for_msr(msr_bitmap, MSR_IA32_PRED_CMD, MSR_TYPE_RW); + if (boot_cpu_has(X86_FEATURE_ARCH_CAPABILITIES)) + vmx_disable_intercept_for_msr(msr_bitmap, MSR_IA32_ARCH_CAPABILITIES, MSR_TYPE_R); vmx_disable_intercept_for_msr(msr_bitmap, MSR_FS_BASE, MSR_TYPE_RW); vmx_disable_intercept_for_msr(msr_bitmap, MSR_GS_BASE, MSR_TYPE_RW); vmx_disable_intercept_for_msr(msr_bitmap, MSR_KERNEL_GS_BASE, MSR_TYPE_RW); -- 2.7.4