Received: by 2002:a05:7412:1703:b0:e2:908c:2ebd with SMTP id dm3csp813659rdb; Fri, 25 Aug 2023 01:39:22 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGRmuSyKGlz9AdiobdRP6QU3zJpA1mOpL7oFizY421bHGYhtrP8zkP1PCdRJOurNcfsEbP/ X-Received: by 2002:a17:907:2711:b0:9a1:df30:e158 with SMTP id w17-20020a170907271100b009a1df30e158mr6558583ejk.36.1692952762092; Fri, 25 Aug 2023 01:39:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692952762; cv=none; d=google.com; s=arc-20160816; b=oEUle8eIiqgx7+ShSJA7++mNsacQ06UlTBjZJcQJaU/QHjQo5ZaebBrtSECxRcP7Sy eBsfTVVPOWRBYzBrjOqaAkIXh/hAtTv710qi0nQIMGm55cgHq+7rvWqaXyo7ciWGz70M 7VW0JScm/1XoJoTNXYGLLKsTXYWk65jcX52fGhMHo6Wcui5w1oIgrIk6KKdounbA0Hru F4YIwpGkm3ovoijzxt/RaEahBaxGOr1AYuDTsxoMZg1rfAI35IooCu801JtIzkNjdFO7 Hh92QwD65c6tcda4PPeseXT7UT3ehxwr73mgFmB1mMSGH1jChveFdlLHhxdsmlK2zwXb Cc4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=E8mnQCjuzaqKch3U00Tn0OGnfH6u+FtLA4vlV+5S3Ms=; fh=ZwaEcDYNCnlh+U7YxZ1LCEcet9pcdhSkEX0cCEOksvY=; b=TglT4IH0eFFYJASKhDIRnnnpQkZKZ4wRe6AUM7f1sh04IT6twQnlP62yjt2abhjwYB Z4KzYqS756mhk+ntLAQ+ljaP2eDAIQOxa4YQidZO0O9X9OSIMIB2Xlr0OpM+UIBvMIxP a+RJpVdB+A7Mz/ZvtsahnCFY+gwa37eMhADiX8Y66aXoco65JhH9jhkYYD21LMsBf+Uf hMPWZKDVL/O/oDLZcm6XNaY75bPu9EnOqIANu2EtzQOQY9enEHm3ojTHwx4hzM4Q/8Lc VIW2ynIYkj6Tyh2xhva8tWhvZERLTD4efgkCGxh6Mmakb7HvAvh/OTxc/DqEgpL3hzIZ 3ndw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RL8t05De; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ss13-20020a170907038d00b00992c243f101si654761ejb.854.2023.08.25.01.38.52; Fri, 25 Aug 2023 01:39:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RL8t05De; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242741AbjHYHCR (ORCPT + 99 others); Fri, 25 Aug 2023 03:02:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58722 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241686AbjHYHCI (ORCPT ); Fri, 25 Aug 2023 03:02:08 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4BE0719A1 for ; Fri, 25 Aug 2023 00:02:06 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id D5A1F647DE for ; Fri, 25 Aug 2023 07:02:05 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D272BC433CB; Fri, 25 Aug 2023 07:02:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692946925; bh=zeNcQIFerO0x8e576oBWYTsxTNAjnbWNYZddqKZsdI8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RL8t05DeXH+QXuuA5q1zgKYzkcykxzaVQx8WG1SHhumZo8qbLEx4uWLgLKbfFj98S 5mwiG4d4MsLt97x9I3Ek8lDbztGY5TZ69llr8HL79kVKZ/n8jHJm2gMXh8En6sdLVZ SX6EXqXdQDLJ5HpW5Dj1PXpLBHLKXuaeGjUKJD7uLjzmCX3CndeLSHeL4N8xmgLuRo wOQvrY+moGz7WgYP01Jv/oS+LqA2Pg/9dye3RrQsA4atVXMv03nShNiizNFFShl2Dv VlHBb+JfYPdzBumJyGnz0AqbtTEYCW3uWdZGNOXZCByeER//xX0TkmfaxENqWZaFq2 CyVSxlgnccWUw== From: Josh Poimboeuf To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Borislav Petkov , Peter Zijlstra , Babu Moger , Paolo Bonzini , Sean Christopherson , David.Kaplan@amd.com, Andrew Cooper , Nikolay Borisov , gregkh@linuxfoundation.org, Thomas Gleixner Subject: [PATCH 05/23] KVM: x86: Add SBPB support Date: Fri, 25 Aug 2023 00:01:36 -0700 Message-ID: X-Mailer: git-send-email 2.41.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add support for the AMD Selective Branch Predictor Barrier (SBPB) by advertising the CPUID bit and handling PRED_CMD writes accordingly. Co-developed-by: Sean Christopherson Signed-off-by: Sean Christopherson Signed-off-by: Josh Poimboeuf --- arch/x86/kvm/cpuid.c | 1 + arch/x86/kvm/cpuid.h | 3 ++- arch/x86/kvm/x86.c | 29 ++++++++++++++++++++++++----- 3 files changed, 27 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index c65f3ff1c79d..3a9879605513 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -729,6 +729,7 @@ void kvm_set_cpu_caps(void) F(NULL_SEL_CLR_BASE) | F(AUTOIBRS) | 0 /* PrefetchCtlMsr */ ); + kvm_cpu_cap_check_and_set(X86_FEATURE_SBPB); kvm_cpu_cap_check_and_set(X86_FEATURE_IBPB_BRTYPE); kvm_cpu_cap_check_and_set(X86_FEATURE_SRSO_NO); diff --git a/arch/x86/kvm/cpuid.h b/arch/x86/kvm/cpuid.h index b1658c0de847..e4db844a58fe 100644 --- a/arch/x86/kvm/cpuid.h +++ b/arch/x86/kvm/cpuid.h @@ -174,7 +174,8 @@ static inline bool guest_has_spec_ctrl_msr(struct kvm_vcpu *vcpu) static inline bool guest_has_pred_cmd_msr(struct kvm_vcpu *vcpu) { return (guest_cpuid_has(vcpu, X86_FEATURE_SPEC_CTRL) || - guest_cpuid_has(vcpu, X86_FEATURE_AMD_IBPB)); + guest_cpuid_has(vcpu, X86_FEATURE_AMD_IBPB) || + guest_cpuid_has(vcpu, X86_FEATURE_SBPB)); } static inline bool supports_cpuid_fault(struct kvm_vcpu *vcpu) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index c381770bcbf1..0af7d4484435 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -3672,17 +3672,36 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) vcpu->arch.perf_capabilities = data; kvm_pmu_refresh(vcpu); break; - case MSR_IA32_PRED_CMD: - if (!msr_info->host_initiated && !guest_has_pred_cmd_msr(vcpu)) + case MSR_IA32_PRED_CMD: { + u64 reserved_bits = ~(PRED_CMD_IBPB | PRED_CMD_SBPB); + + if (!msr_info->host_initiated) { + if ((!guest_has_pred_cmd_msr(vcpu))) + return 1; + + if (!guest_cpuid_has(vcpu, X86_FEATURE_SPEC_CTRL) && + !guest_cpuid_has(vcpu, X86_FEATURE_AMD_IBPB)) + reserved_bits |= PRED_CMD_IBPB; + + if (!guest_cpuid_has(vcpu, X86_FEATURE_SBPB)) + reserved_bits |= PRED_CMD_SBPB; + } + + if (!boot_cpu_has(X86_FEATURE_IBPB)) + reserved_bits |= PRED_CMD_IBPB; + + if (!boot_cpu_has(X86_FEATURE_SBPB)) + reserved_bits |= PRED_CMD_SBPB; + + if (data & reserved_bits) return 1; - if (!boot_cpu_has(X86_FEATURE_IBPB) || (data & ~PRED_CMD_IBPB)) - return 1; if (!data) break; - wrmsrl(MSR_IA32_PRED_CMD, PRED_CMD_IBPB); + wrmsrl(MSR_IA32_PRED_CMD, data); break; + } case MSR_IA32_FLUSH_CMD: if (!msr_info->host_initiated && !guest_cpuid_has(vcpu, X86_FEATURE_FLUSH_L1D)) -- 2.41.0