Received: by 10.223.185.116 with SMTP id b49csp2168682wrg; Thu, 22 Feb 2018 09:10:06 -0800 (PST) X-Google-Smtp-Source: AH8x227NVZP6vnIGqUXaJkbg8s+NwFRdXW9Z1zleaN9SBDm01Re2J1RjXNaXpXO4yFA2udjYV9pr X-Received: by 10.99.3.8 with SMTP id 8mr6181078pgd.5.1519319406764; Thu, 22 Feb 2018 09:10:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519319406; cv=none; d=google.com; s=arc-20160816; b=Il71wxbOnqzkkuTdt69txDKUYTiPJyc54khd2hNEbowQ3fdYIjYBkt//MS8QvPVThr YR4ySwECdMRGgHJ6wZbqvZaM8CMfMQHNRNRLKQKKtZeOtp6qsWLNMW+oHMKCrpPYESjP w5+S6P5t+/zuP4ZtesxTdI2Bq4FDh8mPJ9pQd8OLiBpO3P+Vee3NNfeizmc3uthA+mP5 MOjCsM3nz7I+DOBFod7t5WESz74/QDveoZuei7GjoQm75AzLr+KC6C1lppNmIZO1yz1j mZl228UoWXDhdkrZ9Lz6JSyApVj8al1WSrfFLA9o+Wr+gtImfaKhSYrt5M7ojcoNRerP mpKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:dkim-signature:arc-authentication-results; bh=sONDLPHe//Gw253ClIXPOR2ddf41e+7wVC8y47w8B54=; b=jh3mZbtsId0Gj20I5HaMi+cPhtttN1HgEGVlCvlEq+iR9TbmDXH2I72zob0vctklQm Q7MW8Uokt7z4u99BhB4pErYBp+IaC9so5rIF459d4UKomDwoRF86HFE28ShFjb6APBD7 u3xnTrAEfot6pyLwv6olkjs9Yf2icBaTKR52QPp+w32JU6eDBN2q52yPInCI3+ISah5f nBURqm7RLZIhCmY/+FdmbNAExBlWDzUusfM5W1Xr/ObIvcFx+luoWrDRSS1ljHY8MLQI +J9VpIuMbl8QW5hTckyVuEWtWbbikhShEJAH4HoVpDUF/S662xsWV9y03whrDsfqdFvC 96/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=fSS6Y9Nr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si310342pfr.368.2018.02.22.09.09.47; Thu, 22 Feb 2018 09:10:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=fSS6Y9Nr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933429AbeBVRHl (ORCPT + 99 others); Thu, 22 Feb 2018 12:07:41 -0500 Received: from userp2130.oracle.com ([156.151.31.86]:59428 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933139AbeBVRHg (ORCPT ); Thu, 22 Feb 2018 12:07:36 -0500 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w1MH7Kb7025011; Thu, 22 Feb 2018 17:07:20 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc : subject : message-id : references : mime-version : content-type : in-reply-to : content-transfer-encoding; s=corp-2017-10-26; bh=sONDLPHe//Gw253ClIXPOR2ddf41e+7wVC8y47w8B54=; b=fSS6Y9NrFWGNnEdswPCHyht2StxoLSbluXAWGUS5FgAxtddgro3C4k+UAIY3QPtpVBRx T4WSjth7sE6yL3Zi4TEdyt/vcCn6iyclklsnJdgJZm7i8tJS7waRBpDba9Ww53jNJwwX H5ux9b1SlGGC971abgDrdPwkIkjWmsljr02DUbHx9+mOIdbTSrNcwr9bErt07WKKbNcd kDkyfb+giwVqJ0pb0wMpQFhjIxdi6kZcK/TPA3DFtPxbBL1mAvbp3hu+ohTrcULm2j4+ XkxrgyUDUD7MTcK6pK2FZiizNuNU/EncPhxWPh/CCEHjKCfSz+btSirjv08Y9ub6Q8w/ Rw== Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp2130.oracle.com with ESMTP id 2ga1k686am-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 22 Feb 2018 17:07:20 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w1MH7KbW023935 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 22 Feb 2018 17:07:20 GMT Received: from abhmp0010.oracle.com (abhmp0010.oracle.com [141.146.116.16]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w1MH7J4M026424; Thu, 22 Feb 2018 17:07:19 GMT Received: from char.us.oracle.com (/10.137.176.158) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 22 Feb 2018 09:07:19 -0800 Received: by char.us.oracle.com (Postfix, from userid 1000) id 011026A00E2; Thu, 22 Feb 2018 12:07:17 -0500 (EST) Date: Thu, 22 Feb 2018 12:07:17 -0500 From: Konrad Rzeszutek Wilk To: Paolo Bonzini Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, x86@kernel.org, Radim =?utf-8?B?S3LEjW3DocWZ?= , KarimAllah Ahmed , David Woodhouse , Jim Mattson , Thomas Gleixner , Ingo Molnar , stable@vger.kernel.org Subject: Re: [PATCH 1/3] KVM: x86: use native MSR ops for SPEC_CTRL Message-ID: <20180222170717.GP31483@char.us.oracle.com> References: <1519249297-73718-1-git-send-email-pbonzini@redhat.com> <1519249297-73718-2-git-send-email-pbonzini@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <1519249297-73718-2-git-send-email-pbonzini@redhat.com> User-Agent: Mutt/1.8.3 (2017-05-23) Content-Transfer-Encoding: quoted-printable X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8812 signatures=668677 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802220214 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 21, 2018 at 10:41:35PM +0100, Paolo Bonzini wrote: > Having a paravirt indirect call in the IBRS restore path is not a > good idea, since we are trying to protect from speculative execution > of bogus indirect branch targets. It is also slower, so use > native_wrmsrl on the vmentry path too. But it gets replaced during patching. As in once the machine boots the assembler changes from: callq *0xfffflbah to wrmsr ? I don't think you need this patch. >=20 > Fixes: d28b387fb74da95d69d2615732f50cceb38e9a4d > Cc: x86@kernel.org > Cc: Radim Kr=C4=8Dm=C3=A1=C5=99 > Cc: KarimAllah Ahmed > Cc: David Woodhouse > Cc: Jim Mattson > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: stable@vger.kernel.org > Signed-off-by: Paolo Bonzini > --- > arch/x86/kvm/svm.c | 7 ++++--- > arch/x86/kvm/vmx.c | 7 ++++--- > 2 files changed, 8 insertions(+), 6 deletions(-) >=20 > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > index b3e488a74828..1598beeda11c 100644 > --- a/arch/x86/kvm/svm.c > +++ b/arch/x86/kvm/svm.c > @@ -49,6 +49,7 @@ > #include > #include > #include > +#include > #include > =20 > #include > @@ -5355,7 +5356,7 @@ static void svm_vcpu_run(struct kvm_vcpu *vcpu) > * being speculatively taken. > */ > if (svm->spec_ctrl) > - wrmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl); > + native_wrmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl); > =20 > asm volatile ( > "push %%" _ASM_BP "; \n\t" > @@ -5465,10 +5466,10 @@ static void svm_vcpu_run(struct kvm_vcpu *vcpu) > * save it. > */ > if (!msr_write_intercepted(vcpu, MSR_IA32_SPEC_CTRL)) > - rdmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl); > + svm->spec_ctrl =3D native_read_msr(MSR_IA32_SPEC_CTRL); > =20 > if (svm->spec_ctrl) > - wrmsrl(MSR_IA32_SPEC_CTRL, 0); > + native_wrmsrl(MSR_IA32_SPEC_CTRL, 0); > =20 > /* Eliminate branch target predictions from guest mode */ > vmexit_fill_RSB(); > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index 67b028d8e726..5caeb8dc5bda 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -51,6 +51,7 @@ > #include > #include > #include > +#include > #include > =20 > #include "trace.h" > @@ -9453,7 +9454,7 @@ static void __noclone vmx_vcpu_run(struct kvm_vcp= u *vcpu) > * being speculatively taken. > */ > if (vmx->spec_ctrl) > - wrmsrl(MSR_IA32_SPEC_CTRL, vmx->spec_ctrl); > + native_wrmsrl(MSR_IA32_SPEC_CTRL, vmx->spec_ctrl); > =20 > vmx->__launched =3D vmx->loaded_vmcs->launched; > asm( > @@ -9589,10 +9590,10 @@ static void __noclone vmx_vcpu_run(struct kvm_v= cpu *vcpu) > * save it. > */ > if (!msr_write_intercepted(vcpu, MSR_IA32_SPEC_CTRL)) > - rdmsrl(MSR_IA32_SPEC_CTRL, vmx->spec_ctrl); > + vmx->spec_ctrl =3D native_read_msr(MSR_IA32_SPEC_CTRL); > =20 > if (vmx->spec_ctrl) > - wrmsrl(MSR_IA32_SPEC_CTRL, 0); > + native_wrmsrl(MSR_IA32_SPEC_CTRL, 0); > =20 > /* Eliminate branch target predictions from guest mode */ > vmexit_fill_RSB(); > --=20 > 1.8.3.1 >=20 >=20