[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230227210526.83182-1-itazur@amazon.com>
Date: Mon, 27 Feb 2023 21:05:24 +0000
From: Takahiro Itazuri <itazur@...zon.com>
To: <kvm@...r.kernel.org>, <x86@...nel.org>
CC: Sean Christopherson <seanjc@...gle.com>,
Paolo Bonzini <pbonzini@...hat.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Dave Hansen <dave.hansen@...ux.intel.com>,
<linux-kernel@...r.kernel.org>,
"Takahiro Itazuri" <zulinx86@...il.com>,
Takahiro Itazuri <itazur@...zon.com>
Subject: [PATCH 0/2] KVM: x86: Propagate AMD-specific IBRS bits to guests
VMMs retrieve supported CPUID features via KVM_GET_SUPPORTED_CPUID to
construct CPUID information to be passed to KVM_SET_CPUID2. Most CPUID
feature bits related to speculative attacks are propagated from host
CPUID. But AMD processors have AMD-specific IBRS related bits in CPUID
Fn8000_0008_EBX (ref: AMD64 Architecture Programmer's Manual Volume 3:
General-Purpose and System Instructions) and some bits are not
propagated to guests.
Enable propagation of these bits to guests, so that VMMs don't have to
enable them explicitly based on host CPUID.
Takahiro Itazuri (2):
x86/cpufeatures: Add AMD-specific IBRS bits
KVM: x86: Propagate AMD-specific IBRS related bits
arch/x86/include/asm/cpufeatures.h | 3 +++
arch/x86/kvm/cpuid.c | 5 +++--
2 files changed, 6 insertions(+), 2 deletions(-)
--
2.38.0
Powered by blists - more mailing lists