Received: by 2002:a05:7412:1703:b0:e2:908c:2ebd with SMTP id dm3csp813888rdb; Fri, 25 Aug 2023 01:40:01 -0700 (PDT) X-Google-Smtp-Source: AGHT+IECXwVm+Gvd1Q7Tfx362hQGrBKroGsLDdG4c7A5FZ/Q+KBC88RfO5McCCh81Guux1tjaGp8 X-Received: by 2002:a17:906:cc:b0:9a2:139:f469 with SMTP id 12-20020a17090600cc00b009a20139f469mr3740859eji.69.1692952800901; Fri, 25 Aug 2023 01:40:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692952800; cv=none; d=google.com; s=arc-20160816; b=U+I1wX1Qr77E51+zB826G/69BzBDyRdHm7CI37S0Oa9Ff90zwDO4Oqj/RhGvda2/Ts vWSI/EHuCQPKeE0jfKcSQTLqbk0AK9ig+ycylFLi3VRxHyqEP1NENBtmCqGFFQRTCrCY aron0DWspz5SpXPmph/vEuaFgvJAGzfMeR5TbIGS+27EkFNM9HjZtxKAtwdZK5aBfqur 5IJmfcZJ3sd0p8otg9A4e8E/02LBQkib6SQc0fUaIJA603qMiSUtlp2QigiujW2n8tN9 sMk4XlgcbrhjisHRqUCJ9V+j/nphz4Rq3C4stvLj7Mf1AGc779EDgmh4nxeUe5o74D/G D93w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IGQFLHsOHF/IRDQdTb6NWofiqCZd7Qo/ElQmZGNb0yo=; fh=ZwaEcDYNCnlh+U7YxZ1LCEcet9pcdhSkEX0cCEOksvY=; b=lY7H2IM29TVR+pa7V88dSUiG901BruJRuNHmlA6OfFnbV7+2Cw/HMAgs/qvOvA9i2W DrvG+BuuBgL0OPWfrpisKlzuSHRoaztqBiDo51zyVz+5jLf84onT4+542vlmD/bgQS7G IToB2NYsjRufTiOGbwRLosyl9V+Zm1j/w3lDFPy3ZigU9cwcpULsmYQ+tAQGNFqQv2TA /ZdCRu+aO932QjH87BslFoIOS9KigmHt1bgWIuQ8o4jBsT4ck4zwORd2VEmNvqScxEmM tXuKWf3CWwDaF8qFOo6SNA/JX37/BOXRgwnbkx5UNmXerGVbJl1nScQhd1ZCHEZAUEkz YARQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hRtIRdIy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qx22-20020a170906fcd600b0099bcfd32960si679868ejb.161.2023.08.25.01.39.29; Fri, 25 Aug 2023 01:40:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hRtIRdIy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242771AbjHYHCT (ORCPT + 99 others); Fri, 25 Aug 2023 03:02:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241488AbjHYHCH (ORCPT ); Fri, 25 Aug 2023 03:02:07 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0DF8AE6B for ; Fri, 25 Aug 2023 00:02:05 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A008863D4D for ; Fri, 25 Aug 2023 07:02:04 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A429BC433CB; Fri, 25 Aug 2023 07:02:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692946924; bh=UvnB+1HRcJkP+iJJQOrqezgOZR8rm8LcTjqaiUaMuO8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hRtIRdIyzn9CR8R2LqOOBc6cqyI8Ggy0B8De8BVha9dFQdezBRBwBNoQYFVNe3y0Y gmsMFw/utGVnPE8Y6eB//Nc9qQpoeEOt3e3pN2R4YBclowPSyJ05TcT9PAzkVGEqLL y6D4Qnu3UhqOGBxC77w7owMpY24UV10GTgfIvILSQmF91NuKCGxuKzdcklVlK8l1l4 nFJL6Ta+IDhEyf5b1399j86TUsJA6BHaiBrMUUP+5Bl7rE4/k3kHCaGegHBh/yPFVa grN7upITlu156yYg+FNUJ/Qv3rMoRU6IfOox5nL3szeOS5uJoOGmbyMA0AfXMqUuFQ /tOncAJ0m44yw== From: Josh Poimboeuf To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Borislav Petkov , Peter Zijlstra , Babu Moger , Paolo Bonzini , Sean Christopherson , David.Kaplan@amd.com, Andrew Cooper , Nikolay Borisov , gregkh@linuxfoundation.org, Thomas Gleixner Subject: [PATCH 03/23] x86/srso: Don't probe microcode in a guest Date: Fri, 25 Aug 2023 00:01:34 -0700 Message-ID: <3e293282e96b9fe1835c8bd22d1aaac07d9628e7.1692919072.git.jpoimboe@kernel.org> X-Mailer: git-send-email 2.41.0 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org To support live migration, the hypervisor sets the "lowest common denominator" of features. Probing the microcode isn't allowed because any detected features might go away after a migration. As Andy Cooper states: "Linux must not probe microcode when virtualised.  What it may see instantaneously on boot (owing to MSR_PRED_CMD being fully passed through) is not accurate for the lifetime of the VM." Rely on the hypervisor to set the needed IBPB_BRTYPE and SBPB bits. Fixes: 1b5277c0ea0b ("x86/srso: Add SRSO_NO support") Suggested-by: Andrew Cooper Signed-off-by: Josh Poimboeuf --- arch/x86/kernel/cpu/amd.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index b08af929135d..28e77c5d6484 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -767,7 +767,7 @@ static void early_init_amd(struct cpuinfo_x86 *c) if (cpu_has(c, X86_FEATURE_TOPOEXT)) smp_num_siblings = ((cpuid_ebx(0x8000001e) >> 8) & 0xff) + 1; - if (!cpu_has(c, X86_FEATURE_IBPB_BRTYPE)) { + if (!cpu_has(c, X86_FEATURE_HYPERVISOR) && !cpu_has(c, X86_FEATURE_IBPB_BRTYPE)) { if (c->x86 == 0x17 && boot_cpu_has(X86_FEATURE_AMD_IBPB)) setup_force_cpu_cap(X86_FEATURE_IBPB_BRTYPE); else if (c->x86 >= 0x19 && !wrmsrl_safe(MSR_IA32_PRED_CMD, PRED_CMD_SBPB)) { -- 2.41.0