Fill in VMCB accessors for spec_ctrl in svm_{get,set}_reg(), and CPUID checks
for all supported bits in guest_{rd,wr}msr().
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
static uint64_t svm_get_reg(struct vcpu *v, unsigned int reg)
{
+ const struct vmcb_struct *vmcb = v->arch.hvm.svm.vmcb;
struct domain *d = v->domain;
switch ( reg )
{
+ case MSR_SPEC_CTRL:
+ return vmcb->spec_ctrl;
+
default:
printk(XENLOG_G_ERR "%s(%pv, 0x%08x) Bad register\n",
__func__, v, reg);
static void svm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
{
+ struct vmcb_struct *vmcb = v->arch.hvm.svm.vmcb;
struct domain *d = v->domain;
switch ( reg )
{
+ case MSR_SPEC_CTRL:
+ vmcb->spec_ctrl = val;
+ break;
+
default:
printk(XENLOG_G_ERR "%s(%pv, 0x%08x, 0x%016"PRIx64") Bad register\n",
__func__, v, reg, val);
break;
case MSR_SPEC_CTRL:
- if ( !cp->feat.ibrsb )
+ if ( !cp->feat.ibrsb && !cp->extd.ibrs )
goto gp_fault;
goto get_reg;
*/
uint64_t msr_spec_ctrl_valid_bits(const struct cpuid_policy *cp)
{
- bool ssbd = cp->feat.ssbd;
+ bool ssbd = cp->feat.ssbd || cp->extd.amd_ssbd;
+ bool psfd = cp->extd.psfd;
/*
* Note: SPEC_CTRL_STIBP is specified as safe to use (i.e. ignored)
*/
return (SPEC_CTRL_IBRS | SPEC_CTRL_STIBP |
(ssbd ? SPEC_CTRL_SSBD : 0) |
+ (psfd ? SPEC_CTRL_PSFD : 0) |
0);
}
break;
case MSR_SPEC_CTRL:
- if ( !cp->feat.ibrsb ||
+ if ( (!cp->feat.ibrsb && !cp->extd.ibrs) ||
(val & ~msr_spec_ctrl_valid_bits(cp)) )
goto gp_fault;
goto set_reg;