linux_dsm_epyc7002/arch/x86/kvm
Paolo Bonzini c11f83e062 KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality
The current guest mitigation of TAA is both too heavy and not really
sufficient.  It is too heavy because it will cause some affected CPUs
(those that have MDS_NO but lack TAA_NO) to fall back to VERW and
get the corresponding slowdown.  It is not really sufficient because
it will cause the MDS_NO bit to disappear upon microcode update, so
that VMs started before the microcode update will not be runnable
anymore afterwards, even with tsx=on.

Instead, if tsx=on on the host, we can emulate MSR_IA32_TSX_CTRL for
the guest and let it run without the VERW mitigation.  Even though
MSR_IA32_TSX_CTRL is quite heavyweight, and we do not want to write
it on every vmentry, we can use the shared MSR functionality because
the host kernel need not protect itself from TSX-based side-channels.

Tested-by: Jim Mattson <jmattson@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-11-21 10:00:59 +01:00
..
vmx KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality 2019-11-21 10:00:59 +01:00
cpuid.c KVM: x86: implement MSR_IA32_TSX_CTRL effect on CPUID 2019-11-21 09:59:31 +01:00
cpuid.h
debugfs.c KVM: no need to check return value of debugfs_create functions 2019-08-05 12:55:49 +02:00
emulate.c KVM: x86: set ctxt->have_exception in x86_decode_insn() 2019-09-11 18:01:34 +02:00
hyperv.c KVM: x86: hyper-v: set NoNonArchitecturalCoreSharing CPUID bit when SMT is impossible 2019-09-24 13:37:30 +02:00
hyperv.h
i8254.c
i8254.h
i8259.c
ioapic.c kvm: x86: ioapic and apic debug macros cleanup 2019-07-15 20:39:01 +02:00
ioapic.h
irq_comm.c
irq.c
irq.h
Kconfig
kvm_cache_regs.h
lapic.c KVM: SVM: Fix potential wrong physical id in avic_handle_ldr_update 2019-10-22 18:47:50 +02:00
lapic.h KVM: SVM: Fix potential wrong physical id in avic_handle_ldr_update 2019-10-22 18:47:50 +02:00
Makefile
mmu_audit.c
mmu.c KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() 2019-11-14 16:21:22 +01:00
mmu.h kvm: x86: mmu: Recovery of shattered NX large pages 2019-11-04 20:26:00 +01:00
mmutrace.h KVM: x86/mmu: Explicitly track only a single invalid mmu generation 2019-09-24 14:36:00 +02:00
mtrr.c
page_track.c
paging_tmpl.h kvm: mmu: ITLB_MULTIHIT mitigation 2019-11-04 12:22:02 +01:00
pmu_amd.c
pmu.c KVM: x86: Add fixed counters to PMU filter 2019-07-20 09:00:48 +02:00
pmu.h
svm.c KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active 2019-10-31 12:13:44 +01:00
trace.h KVM: nVMX: trace nested VM-Enter failures detected by H/W 2019-09-11 17:34:17 +02:00
tss.h
x86.c KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality 2019-11-21 10:00:59 +01:00
x86.h KVM: x86: Move triple fault request into RM int injection 2019-09-24 14:31:20 +02:00