Received: by 10.223.176.5 with SMTP id f5csp168625wra; Tue, 30 Jan 2018 09:38:02 -0800 (PST) X-Google-Smtp-Source: AH8x226tXbd1V2g365iCdCibLuh1v355NhS/TikOc9crBJJGdZhKQ8l2c/szI/AHkdYYAUwY+b8k X-Received: by 10.101.82.1 with SMTP id o1mr24119041pgp.259.1517333882639; Tue, 30 Jan 2018 09:38:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517333882; cv=none; d=google.com; s=arc-20160816; b=GZXWV2ZgZfke4sZANanVa2Y831y4tPjr7es3BMQeyD4BY9L7ZPW1YVEWrwmRyQxpzC pYyGddocRI4rrbSaUKn9L5d3TgHH72SZCWbeEBlEfsDjZJJxRjsgI4mTXrJjX8SYuizU 7lJEGtGcMbLvZFfz+CACaOETPQCzLqeFO4Mv7A/H3a1bLwVBTsElLHeHQuAEtjJWzV/h tMv1V7rQZl0I0uL2nqG7hCZIEEG33mwvKRD7vJvyEC7MY0AYW6srXv5Jdbxz2iggd2+9 rmXc4iED24wtwvsOdJAbAKbhM9uyakjhEg2M6wOibYjentWo9/dr7P4BSYOv0ICcWOyJ 4gFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=VdeP1h0KuvQYgbYO2LqvccD4X+m+pWQ7v9nxEdiPmSY=; b=c2qgWElRv7ny6/mhBYB0+aDB9tuufQvLymXM4WAdGJ1ky3SKRXyNzd+fuD+bwwBqtz Kxh6lBjQexAWp81wZQBYP5mj/DXiZNqmxKqYwQLTbg9DmhbZsf8eHIyfBHFq7KEMqKVX M54cL/WPuxfpBiOcmS3v16HsXhLyEj4F3r/QV1e5mGYDZwt+0PZSg64oKE5MR3FyEK7F vAjLSPvKz057bfhW+Muwa75jKj0r/F9fLrW5XJwp3wtOIA3Y5XreS0JZHfD3zQFcvXvf pkEiopR+6Y32e8ZVKrzgx5Pk1zshmJ99uxzvYOVozySrGSBOA0kOhi0L3anLi3Q/pipB Pxyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JSF3CaSA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m21si1978764pgc.351.2018.01.30.09.37.48; Tue, 30 Jan 2018 09:38:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JSF3CaSA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752706AbeA3RTT (ORCPT + 99 others); Tue, 30 Jan 2018 12:19:19 -0500 Received: from mail-io0-f193.google.com ([209.85.223.193]:37585 "EHLO mail-io0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751821AbeA3RTR (ORCPT ); Tue, 30 Jan 2018 12:19:17 -0500 Received: by mail-io0-f193.google.com with SMTP id f89so12252124ioj.4 for ; Tue, 30 Jan 2018 09:19:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=VdeP1h0KuvQYgbYO2LqvccD4X+m+pWQ7v9nxEdiPmSY=; b=JSF3CaSAPUASPWLeiHKHZRUrrvXGS7voJo5dZQ/GjHQNkHoO5XNW/r/7HGTDsPNq+z gAq3kvi2FF1UBgvNHPGPyI9JodWhOisFGLF3ky0EPfIAqud2EEsJLn+v71LKyRJndWrf 4QbQ7FAyJA8XwqOHMn8225D0rsuaWHb9DFSXdASu89rWqKFSrVboEPajrVxoM69h1fdL 7/Y0V35Bu/pZkgOKBzohnH8EbQUXxV8rGQ/HkKN5MZJjNKaeea5eQ83otgkyzYvD/1JU 7EPcicaL7lS1fghpbSL8wY1E0PjfYWeY+TR6S6B/pbXKQoolxC/Iyo2lga3+ULL7aKsm L4oA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=VdeP1h0KuvQYgbYO2LqvccD4X+m+pWQ7v9nxEdiPmSY=; b=nblSBtaRbYBSHIxO3FLaOvFYF1tNo9ainbHjc0vVwFTq72XVG0RCRELejsT6e/ir0V xXJdCBaU5GV8XJlYgnJSxnQRKe6RyainO7xRm6XqlxJaFhmnhpHLTGDA1ndSG4ABmp0l er5LP8WZwRFnk+uhYnO5hTpI5W1ca3VA0+2sdElXm2FPwrhvxpNgOTrypEI/j5guSoCD 62Yh+dwFZ8J/6gaxer8xWvyxJP2BoXN+HgHtAyVgYPTVjZBkFNfbY+7AX4/x5c/WyvRH zg7Tm3k2nRAYvynw6zaK4TGGZWjr6ml4ePK/aUt1TzlTD8akyRqZkGS+Dt7BNn7aD36s DbCA== X-Gm-Message-State: AKwxyte/0XvnY2xaLx8SwvY8QYpOoIWMVpIKXDkNzk9SkuqvXlUZ3gjI yvrTI+piJOzGQKumAjgkEDAbZ8sw2F2gIWTGzocaCA== X-Received: by 10.107.97.24 with SMTP id v24mr30593435iob.296.1517332755297; Tue, 30 Jan 2018 09:19:15 -0800 (PST) MIME-Version: 1.0 Received: by 10.107.128.7 with HTTP; Tue, 30 Jan 2018 09:19:14 -0800 (PST) In-Reply-To: <1517271028-15916-3-git-send-email-karahmed@amazon.de> References: <1517271028-15916-1-git-send-email-karahmed@amazon.de> <1517271028-15916-3-git-send-email-karahmed@amazon.de> From: Jim Mattson Date: Tue, 30 Jan 2018 09:19:14 -0800 Message-ID: Subject: Re: [PATCH v3 2/4] KVM: x86: Add IBPB support To: KarimAllah Ahmed Cc: kvm list , LKML , "the arch/x86 maintainers" , Ashok Raj , Asit Mallick , Dave Hansen , Arjan Van De Ven , Tim Chen , Linus Torvalds , Andrea Arcangeli , Andi Kleen , Thomas Gleixner , Dan Williams , Jun Nakajima , Andy Lutomirski , Greg KH , Paolo Bonzini , Peter Zijlstra , David Woodhouse Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 29, 2018 at 4:10 PM, KarimAllah Ahmed wrote: > From: Ashok Raj > > Add MSR passthrough for MSR_IA32_PRED_CMD and place branch predictor > barriers on switching between VMs to avoid inter VM Spectre-v2 attacks. > > [peterz: rebase and changelog rewrite] > [karahmed: - rebase > - vmx: expose PRED_CMD whenever it is available > - svm: only pass through IBPB if it is available > - vmx: support !cpu_has_vmx_msr_bitmap()] > [dwmw2: Expose CPUID bit too (AMD IBPB only for now as we lack IBRS) > PRED_CMD is a write-only MSR] > > Cc: Asit Mallick > Cc: Dave Hansen > Cc: Arjan Van De Ven > Cc: Tim Chen > Cc: Linus Torvalds > Cc: Andrea Arcangeli > Cc: Andi Kleen > Cc: Thomas Gleixner > Cc: Dan Williams > Cc: Jun Nakajima > Cc: Andy Lutomirski > Cc: Greg KH > Cc: Paolo Bonzini > Signed-off-by: Ashok Raj > Signed-off-by: Peter Zijlstra (Intel) > Link: http://lkml.kernel.org/r/1515720739-43819-6-git-send-email-ashok.raj@intel.com > Signed-off-by: David Woodhouse > Signed-off-by: KarimAllah Ahmed > --- > arch/x86/kvm/cpuid.c | 11 ++++++++++- > arch/x86/kvm/svm.c | 14 ++++++++++++++ > arch/x86/kvm/vmx.c | 12 ++++++++++++ > 3 files changed, 36 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index c0eb337..033004d 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -365,6 +365,10 @@ static inline int __do_cpuid_ent(struct kvm_cpuid_entry2 *entry, u32 function, > F(3DNOWPREFETCH) | F(OSVW) | 0 /* IBS */ | F(XOP) | > 0 /* SKINIT, WDT, LWP */ | F(FMA4) | F(TBM); > > + /* cpuid 0x80000008.ebx */ > + const u32 kvm_cpuid_8000_0008_ebx_x86_features = > + F(IBPB); > + > /* cpuid 0xC0000001.edx */ > const u32 kvm_cpuid_C000_0001_edx_x86_features = > F(XSTORE) | F(XSTORE_EN) | F(XCRYPT) | F(XCRYPT_EN) | > @@ -625,7 +629,12 @@ static inline int __do_cpuid_ent(struct kvm_cpuid_entry2 *entry, u32 function, > if (!g_phys_as) > g_phys_as = phys_as; > entry->eax = g_phys_as | (virt_as << 8); > - entry->ebx = entry->edx = 0; > + entry->edx = 0; > + /* IBPB isn't necessarily present in hardware cpuid */ > + if (boot_cpu_has(X86_FEATURE_IBPB)) > + entry->ebx |= F(IBPB); > + entry->ebx &= kvm_cpuid_8000_0008_ebx_x86_features; > + cpuid_mask(&entry->ebx, CPUID_8000_0008_EBX); > break; > } > case 0x80000019: > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > index 2744b973..c886e46 100644 > --- a/arch/x86/kvm/svm.c > +++ b/arch/x86/kvm/svm.c > @@ -529,6 +529,7 @@ struct svm_cpu_data { > struct kvm_ldttss_desc *tss_desc; > > struct page *save_area; > + struct vmcb *current_vmcb; > }; > > static DEFINE_PER_CPU(struct svm_cpu_data *, svm_data); > @@ -918,6 +919,9 @@ static void svm_vcpu_init_msrpm(u32 *msrpm) > > set_msr_interception(msrpm, direct_access_msrs[i].index, 1, 1); > } > + > + if (boot_cpu_has(X86_FEATURE_IBPB)) > + set_msr_interception(msrpm, MSR_IA32_PRED_CMD, 1, 1); > } > > static void add_msr_offset(u32 offset) > @@ -1706,11 +1710,17 @@ static void svm_free_vcpu(struct kvm_vcpu *vcpu) > __free_pages(virt_to_page(svm->nested.msrpm), MSRPM_ALLOC_ORDER); > kvm_vcpu_uninit(vcpu); > kmem_cache_free(kvm_vcpu_cache, svm); > + /* > + * The vmcb page can be recycled, causing a false negative in > + * svm_vcpu_load(). So do a full IBPB now. > + */ > + indirect_branch_prediction_barrier(); > } > > static void svm_vcpu_load(struct kvm_vcpu *vcpu, int cpu) > { > struct vcpu_svm *svm = to_svm(vcpu); > + struct svm_cpu_data *sd = per_cpu(svm_data, cpu); > int i; > > if (unlikely(cpu != vcpu->cpu)) { > @@ -1739,6 +1749,10 @@ static void svm_vcpu_load(struct kvm_vcpu *vcpu, int cpu) > if (static_cpu_has(X86_FEATURE_RDTSCP)) > wrmsrl(MSR_TSC_AUX, svm->tsc_aux); > > + if (sd->current_vmcb != svm->vmcb) { > + sd->current_vmcb = svm->vmcb; > + indirect_branch_prediction_barrier(); > + } > avic_vcpu_load(vcpu, cpu); > } > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index aa8638a..ea278ce 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -2272,6 +2272,7 @@ static void vmx_vcpu_load(struct kvm_vcpu *vcpu, int cpu) > if (per_cpu(current_vmcs, cpu) != vmx->loaded_vmcs->vmcs) { > per_cpu(current_vmcs, cpu) = vmx->loaded_vmcs->vmcs; > vmcs_load(vmx->loaded_vmcs->vmcs); > + indirect_branch_prediction_barrier(); > } > > if (!already_loaded) { > @@ -3330,6 +3331,14 @@ static int vmx_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > case MSR_IA32_TSC: > kvm_write_tsc(vcpu, msr_info); > break; > + case MSR_IA32_PRED_CMD: > + if (!msr_info->host_initiated && > + !guest_cpuid_has(vcpu, X86_FEATURE_IBPB)) > + return 1; > + > + if (data & PRED_CMD_IBPB) > + wrmsrl(MSR_IA32_PRED_CMD, PRED_CMD_IBPB); > + break; > case MSR_IA32_CR_PAT: > if (vmcs_config.vmentry_ctrl & VM_ENTRY_LOAD_IA32_PAT) { > if (!kvm_mtrr_valid(vcpu, MSR_IA32_CR_PAT, data)) > @@ -9548,6 +9557,9 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id) > goto free_msrs; > > msr_bitmap = vmx->vmcs01.msr_bitmap; > + > + if (boot_cpu_has(X86_FEATURE_IBPB)) > + vmx_disable_intercept_for_msr(msr_bitmap, MSR_IA32_PRED_CMD, MSR_TYPE_W); > vmx_disable_intercept_for_msr(msr_bitmap, MSR_FS_BASE, MSR_TYPE_RW); > vmx_disable_intercept_for_msr(msr_bitmap, MSR_GS_BASE, MSR_TYPE_RW); > vmx_disable_intercept_for_msr(msr_bitmap, MSR_KERNEL_GS_BASE, MSR_TYPE_RW); > -- > 2.7.4 > Are you planning to allow L2 to write MSR_IA32_PRED_CMD without L0 intercepting it, if the MSR write intercept is disabled in both the vmcs01 MSR permission bitmap and the vmcs12 MSR permission bitmap?