Received: by 2002:a05:7412:5112:b0:fa:6e18:a558 with SMTP id fm18csp866189rdb; Tue, 23 Jan 2024 18:56:39 -0800 (PST) X-Google-Smtp-Source: AGHT+IFCCoZxFwOGD0lyJER/BdBN2aRxUlGZVn1UHWMhQ5tsgkO/KJibBZ485pvGSiS1csFE74c0 X-Received: by 2002:a05:600c:4fd0:b0:40e:c66a:6a with SMTP id o16-20020a05600c4fd000b0040ec66a006amr62365wmq.78.1706064999119; Tue, 23 Jan 2024 18:56:39 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706064999; cv=pass; d=google.com; s=arc-20160816; b=isGVKv/gmI9STtYnFjxTHg8/QqxAd8zNTqjROscCU3/QGAwFKexNO7VZ5ntqOtyU3G Qfdnanh8Nezwhehzm8qfpv3zpop1Pi9G1O7CwZ3qYAdILNA+3BsfInp/7v7seDcMMG0d ODoOGLx0m2NZ+9QU5bMxqh/RmZaSTtm+ZkxQE7GVaQ+Nqu9R7b5SPt908GN1N9/WmW/4 5gcI3mQp2WZMq/k08gb8tG7a6SzGtlduNLJIb6FWbdXiSlyY0KcwXLkpyd1flozEEO8L G+Tvc9wifivSQL8zg5L5IFaf7q6iSzTaMuFlmhDF64UEMCldI9QscHfa7ZWUiXrECs1d TDBw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=jIwEnXvIo4TbIWS/neLbAh+V+jH9M64HxoKUrdHGwRs=; fh=D+u40KSnYgjUYLGDRdXdD62xsMHg3nFDmpf3sEnyojA=; b=IVyKv5CZI2S/RU9ilPcPqR9zXxEJr00xvXjPwhljm1bfaU/waQE+S46CBBtirU2PaA NnJuRawRdP/F5bmlzKthZvb+arfjfxsm9y2OpWy5OvxVx0ojiurNrqg0dbdrViUxtjRr MeyGUdyuYX5qBsMRY6oaGWDN4ShOa5BEq0fHEYo0A/bDnA9ogCLXqR9gxWankEcQcBA+ /BmFlqv85k7GpPl9bln01jTojrMAT0FZrLvRgNGpJH6ie6DoeJwaAasqH71srlYWSOid UmYRV48Q5X7hzMU8WaEzHy3ZepI4m9Gj8MEpd9vLumjm82oQyyUtr+bAQQG5CKAjQDpg k/3Q== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=AQOESCbq; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-36343-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-36343-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id x101-20020a50baee000000b00553be25f7c0si13192132ede.433.2024.01.23.18.56.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Jan 2024 18:56:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-36343-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=AQOESCbq; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-36343-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-36343-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 4B1111F2B6CD for ; Wed, 24 Jan 2024 02:50:35 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AB9D2BE5A; Wed, 24 Jan 2024 02:42:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="AQOESCbq" Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id F3C5B18E2E; Wed, 24 Jan 2024 02:42:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.55.52.120 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706064169; cv=none; b=D/g2It0/SQptT0d6ws0iLOoo8m76UHjrQzrcxl42Kw02RLpLicCCGLGRvj8T7vW0IWq1ALdSSvgxA7JjuoKI3k+Bt4LRdLFsohS3CP7twh597WO9suwcOl9/+3NsRDiL+UfL119RL0II7rqSEt9cY3c9qHgoXWlwONmM723OkoA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706064169; c=relaxed/simple; bh=aUDtDd9ZiQ5V5sav0MsmNz0UbTbFO26UdWqqrMbfWFc=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=NHUcwfqjoUyhjuYxdl5IRc3eOXgBEymTknIUjbzNDXGdwav25EOyUnqtCAMX4sBh1I7FQCVoexmyoR0CH8DBD8vLvm2pJZfOytYiD52cKQ4Ad1nbYpsZG7YobwUivHMqD/TAb66W1VaAxKZdkt2w+Nu1OpZXExlHu/wu3ixGnrQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=AQOESCbq; arc=none smtp.client-ip=192.55.52.120 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1706064167; x=1737600167; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=aUDtDd9ZiQ5V5sav0MsmNz0UbTbFO26UdWqqrMbfWFc=; b=AQOESCbqqW3TKW+tqFAsZVYe+3kjX5lpFFHTFJoqha3umZOjWFfwOsqH cHFQ9vtoqg1K+lebeGPbdbW/7tIkm0pY/YirBuCOq7Zxnu05UYZXSrM65 0c1kaKLzmwnKccmff84bt7B4AXeLlBw794qH902rrEsnE+cwxCSOGH/1M dJf6kqUh5qS/u4ESRy1YPNiwu6YeTKIGd7U84CoOceKjr1TZXJUtJtOui ARLMGTbKwJcL+itDsDdtX6qUTuVRRhE04vzdzATJH4Cua4fhwFLa3uCQM 24JANC5MjYNA5iSl2Wi/47/l8+194Nqd4z4xwMGhdH5AgPbH6COjo7lQG w==; X-IronPort-AV: E=McAfee;i="6600,9927,10962"; a="400586563" X-IronPort-AV: E=Sophos;i="6.05,215,1701158400"; d="scan'208";a="400586563" Received: from fmviesa003.fm.intel.com ([10.60.135.143]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jan 2024 18:42:43 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.05,215,1701158400"; d="scan'208";a="1825914" Received: from 984fee00a5ca.jf.intel.com ([10.165.9.183]) by fmviesa003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jan 2024 18:42:42 -0800 From: Yang Weijiang To: seanjc@google.com, pbonzini@redhat.com, dave.hansen@intel.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, yuan.yao@linux.intel.com Cc: peterz@infradead.org, chao.gao@intel.com, rick.p.edgecombe@intel.com, mlevitsk@redhat.com, john.allen@amd.com, weijiang.yang@intel.com Subject: [PATCH v9 22/27] KVM: VMX: Set up interception for CET MSRs Date: Tue, 23 Jan 2024 18:41:55 -0800 Message-Id: <20240124024200.102792-23-weijiang.yang@intel.com> X-Mailer: git-send-email 2.39.3 In-Reply-To: <20240124024200.102792-1-weijiang.yang@intel.com> References: <20240124024200.102792-1-weijiang.yang@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Enable/disable CET MSRs interception per associated feature configuration. Shadow Stack feature requires all CET MSRs passed through to guest to make it supported in user and supervisor mode while IBT feature only depends on MSR_IA32_{U,S}_CETS_CET to enable user and supervisor IBT. Note, this MSR design introduced an architectural limitation of SHSTK and IBT control for guest, i.e., when SHSTK is exposed, IBT is also available to guest from architectual perspective since IBT relies on subset of SHSTK relevant MSRs. Signed-off-by: Yang Weijiang Reviewed-by: Maxim Levitsky --- arch/x86/kvm/vmx/vmx.c | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 064a5fe87948..34e91dbbffed 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -692,6 +692,10 @@ static bool is_valid_passthrough_msr(u32 msr) case MSR_LBR_CORE_TO ... MSR_LBR_CORE_TO + 8: /* LBR MSRs. These are handled in vmx_update_intercept_for_lbr_msrs() */ return true; + case MSR_IA32_U_CET: + case MSR_IA32_S_CET: + case MSR_IA32_PL0_SSP ... MSR_IA32_INT_SSP_TAB: + return true; } r = possible_passthrough_msr_slot(msr) != -ENOENT; @@ -7767,6 +7771,41 @@ static void update_intel_pt_cfg(struct kvm_vcpu *vcpu) vmx->pt_desc.ctl_bitmask &= ~(0xfULL << (32 + i * 4)); } +static void vmx_update_intercept_for_cet_msr(struct kvm_vcpu *vcpu) +{ + bool incpt; + + if (kvm_cpu_cap_has(X86_FEATURE_SHSTK)) { + incpt = !guest_cpuid_has(vcpu, X86_FEATURE_SHSTK); + + vmx_set_intercept_for_msr(vcpu, MSR_IA32_U_CET, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_S_CET, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_PL0_SSP, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_PL1_SSP, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_PL2_SSP, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_PL3_SSP, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_INT_SSP_TAB, + MSR_TYPE_RW, incpt); + if (!incpt) + return; + } + + if (kvm_cpu_cap_has(X86_FEATURE_IBT)) { + incpt = !guest_cpuid_has(vcpu, X86_FEATURE_IBT); + + vmx_set_intercept_for_msr(vcpu, MSR_IA32_U_CET, + MSR_TYPE_RW, incpt); + vmx_set_intercept_for_msr(vcpu, MSR_IA32_S_CET, + MSR_TYPE_RW, incpt); + } +} + static void vmx_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu) { struct vcpu_vmx *vmx = to_vmx(vcpu); @@ -7845,6 +7884,8 @@ static void vmx_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu) /* Refresh #PF interception to account for MAXPHYADDR changes. */ vmx_update_exception_bitmap(vcpu); + + vmx_update_intercept_for_cet_msr(vcpu); } static u64 vmx_get_perf_capabilities(void) -- 2.39.3