Received: by 10.223.176.5 with SMTP id f5csp2367102wra; Sun, 28 Jan 2018 19:01:34 -0800 (PST) X-Google-Smtp-Source: AH8x226EQtK2tdpFIsmeeUKTi+6KbR5QPUonk87LKCaBuXQBXNsGI7MDGxX7FFRBM8sbFnuIqZ4l X-Received: by 2002:a17:902:b40d:: with SMTP id x13-v6mr358484plr.308.1517194894132; Sun, 28 Jan 2018 19:01:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517194894; cv=none; d=google.com; s=arc-20160816; b=i+2rL76gqzpG2p/mD81Dv1f+lisLILFVNbKq/aOy0ZSQlscR3G0ZFRyj2PJuaG+CPy q7+gScDN9Zr33vjN+GekXqGm3VFyfu16H4hMMrMdMP4OtH8dgJUjB+bfUq6eVcA7KBx2 HNc1e+inrLDUX5XkggI/GzBQYHCF17zOSu1Si7YRf0025WcI2Bv4H7Vf4Ce+EhedOqkq 3Oc9TCu5y5OBSok110W0paC9wDbpU15SFJ2Y4sbDTsvx8ML+XLTV5NXlQyn6zI4vxjKE KXsIKOP12D+RWyM0UgoDcFhDl66xQCods4ykI4v1+xynthMghA7EDd8EDdBxR1BVF1UV HVYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=CUGQlBMwMD6HdkNo2PzDS0F5/NTQVwDoEZgsFf39dLE=; b=DsqMXUwRllArXVmUYsl3VvDUXHO0QcdyQhZ6T+CQ1GZwDRBj2waMVEkv4CmCjzIHjl QMjvlYFHo9b4Cn6KxUfIUbK2LFthK6lBKlAZdLm7AwYqXyXpYrI3ss/4YqdM1CQcdKC7 TJm4ilr8KuGmDI2tMZXV0eiEfhbCM4v2kPbnv3F2QjxTOJsH7J82ZfcDJvf37WNCNJW/ r2UFNHLxM6VmAiodzD+lw9C6D9xNkpoCvyfp7eCZ6C+gewJZJqF/ENJufNzRhp6wDoyt LkPvzF0xgUKBFcPNxnf2Vb8bLV+cq+NdCJPXbb1BbcZlTze8YmDbpLnz/M6mlxnoc2uT ipGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=Hs42rgqb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s72si430017pgc.149.2018.01.28.19.01.19; Sun, 28 Jan 2018 19:01:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=Hs42rgqb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753753AbeA2BEE (ORCPT + 99 others); Sun, 28 Jan 2018 20:04:04 -0500 Received: from smtp-fw-9101.amazon.com ([207.171.184.25]:63403 "EHLO smtp-fw-9101.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753201AbeA2BEC (ORCPT ); Sun, 28 Jan 2018 20:04:02 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1517187842; x=1548723842; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=CUGQlBMwMD6HdkNo2PzDS0F5/NTQVwDoEZgsFf39dLE=; b=Hs42rgqbZgL+4yhBxulJi8snPM94TQalnb8QENrRKv4n3UklZGzjywPK 2WcueUM/aveOuDw9JrVDlt6RfMptKVkujGROkOo+Kjrb5ItuTGb/UDVSU 2PkN2Ln+Dey1nDlczBOuG5uaMJ13JyRN2kxMArKf9PGawoh9farE6EVs2 s=; X-IronPort-AV: E=Sophos;i="5.46,428,1511827200"; d="scan'208";a="720899683" Received: from sea3-co-svc-lb6-vlan3.sea.amazon.com (HELO email-inbound-relay-1d-98acfc19.us-east-1.amazon.com) ([10.47.22.38]) by smtp-border-fw-out-9101.sea19.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 29 Jan 2018 00:59:54 +0000 Received: from u54e1ad5160425a4b64ea.ant.amazon.com (iad1-ws-svc-lb91-vlan3.amazon.com [10.0.103.150]) by email-inbound-relay-1d-98acfc19.us-east-1.amazon.com (8.14.7/8.14.7) with ESMTP id w0T0xRRM049368 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 29 Jan 2018 00:59:30 GMT Received: from u54e1ad5160425a4b64ea.ant.amazon.com (localhost [127.0.0.1]) by u54e1ad5160425a4b64ea.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTP id w0T0xQ4v032454; Mon, 29 Jan 2018 01:59:26 +0100 Received: (from karahmed@localhost) by u54e1ad5160425a4b64ea.ant.amazon.com (8.15.2/8.15.2/Submit) id w0T0xOHE032452; Mon, 29 Jan 2018 01:59:24 +0100 From: KarimAllah Ahmed To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org Cc: Ashok Raj , Asit Mallick , Dave Hansen , Arjan Van De Ven , Tim Chen , Linus Torvalds , Andrea Arcangeli , Andi Kleen , Thomas Gleixner , Dan Williams , Jun Nakajima , Andy Lutomirski , Greg KH , Paolo Bonzini , Peter Zijlstra , David Woodhouse , KarimAllah Ahmed Subject: [PATCH v2 3/4] x86/kvm: Add IBPB support Date: Mon, 29 Jan 2018 01:58:51 +0100 Message-Id: <1517187532-32286-4-git-send-email-karahmed@amazon.de> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1517187532-32286-1-git-send-email-karahmed@amazon.de> References: <1517187532-32286-1-git-send-email-karahmed@amazon.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ashok Raj Add MSR passthrough for MSR_IA32_PRED_CMD and place branch predictor barriers on switching between VMs to avoid inter VM Spectre-v2 attacks. [peterz: rebase and changelog rewrite] [karahmed: - rebase - vmx: expose PRED_CMD whenever it is available - svm: only pass through IBPB if it is available] Cc: Asit Mallick Cc: Dave Hansen Cc: Arjan Van De Ven Cc: Tim Chen Cc: Linus Torvalds Cc: Andrea Arcangeli Cc: Andi Kleen Cc: Thomas Gleixner Cc: Dan Williams Cc: Jun Nakajima Cc: Andy Lutomirski Cc: Greg KH Cc: Paolo Bonzini Signed-off-by: Ashok Raj Signed-off-by: Peter Zijlstra (Intel) Link: http://lkml.kernel.org/r/1515720739-43819-6-git-send-email-ashok.raj@intel.com Signed-off-by: David Woodhouse Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/svm.c | 14 ++++++++++++++ arch/x86/kvm/vmx.c | 4 ++++ 2 files changed, 18 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 2744b973..c886e46 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -529,6 +529,7 @@ struct svm_cpu_data { struct kvm_ldttss_desc *tss_desc; struct page *save_area; + struct vmcb *current_vmcb; }; static DEFINE_PER_CPU(struct svm_cpu_data *, svm_data); @@ -918,6 +919,9 @@ static void svm_vcpu_init_msrpm(u32 *msrpm) set_msr_interception(msrpm, direct_access_msrs[i].index, 1, 1); } + + if (boot_cpu_has(X86_FEATURE_IBPB)) + set_msr_interception(msrpm, MSR_IA32_PRED_CMD, 1, 1); } static void add_msr_offset(u32 offset) @@ -1706,11 +1710,17 @@ static void svm_free_vcpu(struct kvm_vcpu *vcpu) __free_pages(virt_to_page(svm->nested.msrpm), MSRPM_ALLOC_ORDER); kvm_vcpu_uninit(vcpu); kmem_cache_free(kvm_vcpu_cache, svm); + /* + * The vmcb page can be recycled, causing a false negative in + * svm_vcpu_load(). So do a full IBPB now. + */ + indirect_branch_prediction_barrier(); } static void svm_vcpu_load(struct kvm_vcpu *vcpu, int cpu) { struct vcpu_svm *svm = to_svm(vcpu); + struct svm_cpu_data *sd = per_cpu(svm_data, cpu); int i; if (unlikely(cpu != vcpu->cpu)) { @@ -1739,6 +1749,10 @@ static void svm_vcpu_load(struct kvm_vcpu *vcpu, int cpu) if (static_cpu_has(X86_FEATURE_RDTSCP)) wrmsrl(MSR_TSC_AUX, svm->tsc_aux); + if (sd->current_vmcb != svm->vmcb) { + sd->current_vmcb = svm->vmcb; + indirect_branch_prediction_barrier(); + } avic_vcpu_load(vcpu, cpu); } diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index dac564d..f82a44c 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -2296,6 +2296,7 @@ static void vmx_vcpu_load(struct kvm_vcpu *vcpu, int cpu) if (per_cpu(current_vmcs, cpu) != vmx->loaded_vmcs->vmcs) { per_cpu(current_vmcs, cpu) = vmx->loaded_vmcs->vmcs; vmcs_load(vmx->loaded_vmcs->vmcs); + indirect_branch_prediction_barrier(); } if (!already_loaded) { @@ -9613,6 +9614,9 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id) goto free_msrs; msr_bitmap = vmx->vmcs01.msr_bitmap; + + if (boot_cpu_has(X86_FEATURE_IBPB)) + vmx_disable_intercept_for_msr(msr_bitmap, MSR_IA32_PRED_CMD, MSR_TYPE_RW); vmx_disable_intercept_for_msr(msr_bitmap, MSR_FS_BASE, MSR_TYPE_RW); vmx_disable_intercept_for_msr(msr_bitmap, MSR_GS_BASE, MSR_TYPE_RW); vmx_disable_intercept_for_msr(msr_bitmap, MSR_KERNEL_GS_BASE, MSR_TYPE_RW); -- 2.7.4