From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D350C19D8AC; Fri, 3 Apr 2026 00:30:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.17 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775176236; cv=none; b=Yim6FFczEYsdEs6pOiIvE4PMWILuoAqxfpRTAhLtTRXYdSAzpadDk8uWFQYypmjyv4ehOtCilOEWw8/Uy54puGbqy2k0mFL9SkK2WWzErY1ktL8VupiFWSsEYca7K/e0PetkvatThKurnRr69XNlc47XXEy5KqphY1O3wI5vLWg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775176236; c=relaxed/simple; bh=UuwJ8yXw4XkWXQx/iKyQTgIm9ATWbQaaFvVzD5JlStA=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=c3M9BkltsyLAK7MLNzsOEUs3xN+lMhPzxPLymcq4VMULnwimTzn79qoidKpkL77QrW1rGPFDuOXcyx+BdiZ/aViybxfI5eD4PpeZ7KXaDy7ZFSWtZwxNzJq7OqMx9AE4MkEkfMDpuis1NTC5Qrys19nNibXF595wcRYbaCdqv3U= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=pass smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=HBrL79eg; arc=none smtp.client-ip=198.175.65.17 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="HBrL79eg" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1775176234; x=1806712234; h=date:from:to:cc:subject:message-id:mime-version; bh=UuwJ8yXw4XkWXQx/iKyQTgIm9ATWbQaaFvVzD5JlStA=; b=HBrL79egKKaGKi9CUs3ZMqQft3yifENTGoQuy9BzTXXMZSq6XvUrj1oP W/r7dVfYneN8jgKA0vhI0LNCjK69PAIW/nlmcDVxZHeCDDKR6AiVGtgF9 DrwyHuERi5abtu9IOZGK4mnfxAXVIPmpUYTmzKMUCjX2ZDMFxLGNJ+ylv JX4vMFkrLVtmAr8gT4JXco8oa3dNjO1c2fnHehrgiR2g7I6/e0zH9XMoY +qdNVMHDBlM7sUJWsbrKx4aeHHAHeoKmZJNtbmqDuIMLZB93no27EulAv ca4HsX2CZgsfWHD9F4NuJeNqXndfpPb2GlHuzpkbfUrVeZIpVR2luH+Ok Q==; X-CSE-ConnectionGUID: svjiuWSFQnG8ICWMRLUF7g== X-CSE-MsgGUID: oW3lUR+FRH+ybMadQM6l0A== X-IronPort-AV: E=McAfee;i="6800,10657,11747"; a="76213261" X-IronPort-AV: E=Sophos;i="6.23,156,1770624000"; d="scan'208";a="76213261" Received: from orviesa001.jf.intel.com ([10.64.159.141]) by orvoesa109.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2026 17:30:32 -0700 X-CSE-ConnectionGUID: 4LCLjDXiQ/qPn2+2/W3xmQ== X-CSE-MsgGUID: yXL7VDL8QQ6Y3IXdP/4bvA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.23,156,1770624000"; d="scan'208";a="265050114" Received: from guptapa-desk.jf.intel.com (HELO desk) ([10.165.239.46]) by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2026 17:30:33 -0700 Date: Thu, 2 Apr 2026 17:30:32 -0700 From: Pawan Gupta To: x86@kernel.org, Jon Kohler , Nikolay Borisov , "H. Peter Anvin" , Josh Poimboeuf , David Kaplan , Sean Christopherson , Borislav Petkov , Dave Hansen , Peter Zijlstra , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , KP Singh , Jiri Olsa , "David S. Miller" , David Laight , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , David Ahern , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , Stanislav Fomichev , Hao Luo , Paolo Bonzini , Jonathan Corbet Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Asit Mallick , Tao Zhang , bpf@vger.kernel.org, netdev@vger.kernel.org, linux-doc@vger.kernel.org Subject: [PATCH v9 00/10] VMSCAPE optimization for BHI variant Message-ID: <20260402-vmscape-bhb-v9-0-94d16bc29774@linux.intel.com> X-B4-Tracking: v=1; b=H4sIALEJz2kC/23R3W7CMAwF4FdBuV5Q7PzVXO09pl0kcToiQYtaV jEh3n0BbYOyXh5L/qRjn8WYh5JHsVmdxZCnMpa+q4FeViJtQ/eRZeGaBSq0isDJaT+mcMgybqN kz8YRed9iK+rGYchtOd20t/eat2U89sPXDZ/gOv1x0MycCaSSHCy0KgNpw6+70n2e1qU75t069 Xtx1Sb8E0CBnQtYBYIUmSnpQG5Z0A8C+rmgq2A96YRWm0x6WTB3AYDmgqkCBA5ssiPmtCzYBwH n95ysrD2QncsGdVRqWXB3ARXMBXe9pAPFbMF6MMuC/xWc0s8tfBWid8F7H6gJ7bLQPAjP32yq4 JoYLZqoQ6T/wuVy+QawmEKwegIAAA== X-Change-ID: 20250916-vmscape-bhb-d7d469977f2f X-Mailer: b4 0.15-dev Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline v9: - Use global variables for BHB loop counters instead of ALTERNATIVE-based approach. (Dave & others) - Use 32-bit registers (%eax/%ecx) for loop counters, loaded via movzbl from 8-bit globals. 8-bit registers (e.g. %ah in the inner loop) caused performance regression on certain CPUs due to partial-register stalls. (David Laight) - Let BPF save/restore %rax/%rcx as in the original implementation, since it is the only caller that needs these registers preserved across the BHB clearing sequence. - Drop Reviewed-by from patch 2/10 as the implementation changed significantly. - Apply Tested-by from Jon Kohler to the series (except patch 2/10). - Fix commit message grammar. (Borislav) - Rebased to v7.0-rc6. v8: https://lore.kernel.org/r/20260324-vmscape-bhb-v8-0-68bb524b3ab9@linux.intel.com - Use helper in KVM to convey the mitigation status. (PeterZ/Borisov) - Fix the documentation for default vmscape mitigation. (BPF bot) - Remove the stray lines in bug.c (BPF bot). - Updated commit messages and comments. - Rebased to v7.0-rc5. v7: https://lore.kernel.org/r/20260319-vmscape-bhb-v7-0-b76a777a98af@linux.intel.com - s/This allows/Allow/ and s/This does adds/This adds/ in patch 1/10 commit message (Borislav). - Minimize register usage in BHB clearing seq. (David Laight) - Instead of separate ecx/eax counters, use al/ah. - Adjust the alignment of RET due to register size change. - save/restore rax in the seq itself. - Remove the save/restore of rax/rcx for BPF callers. - Rename clear_bhb_loop() to clear_bhb_loop_nofence() to make it obvious that the LFENCE is not part of the sequence (Borislav). - Fix Kconfig: s/select/depends on/ HAVE_STATIC_CALL (PeterZ). - Rebased to v7.0-rc4. v6: https://lore.kernel.org/r/20251201-vmscape-bhb-v6-0-d610dd515714@linux.intel.com - Remove semicolon at the end of asm in ALTERNATIVE (Uros). - Fix build warning in vmscape_select_mitigation() (LKP). - Rebased to v6.18. v5: https://lore.kernel.org/r/20251126-vmscape-bhb-v5-2-02d66e423b00@linux.intel.com - For BHI seq, limit runtime-patching to loop counts only (Dave). Dropped 2 patches that moved the BHB seq to a macro. - Remove redundant switch cases in vmscape_select_mitigation() (Nikolay). - Improve commit message (Nikolay). - Collected tags. v4: https://lore.kernel.org/r/20251119-vmscape-bhb-v4-0-1adad4e69ddc@linux.intel.com - Move LFENCE to the callsite, out of clear_bhb_loop(). (Dave) - Make clear_bhb_loop() work for larger BHB. (Dave) This now uses hardware enumeration to determine the BHB size to clear. - Use write_ibpb() instead of indirect_branch_prediction_barrier() when IBPB is known to be available. (Dave) - Use static_call() to simplify mitigation at exit-to-userspace. (Dave) - Refactor vmscape_select_mitigation(). (Dave) - Fix vmscape=on which was wrongly behaving as AUTO. (Dave) - Split the patches. (Dave) - Patch 1-4 prepares for making the sequence flexible for VMSCAPE use. - Patch 5 trivial rename of variable. - Patch 6-8 prepares for deploying BHB mitigation for VMSCAPE. - Patch 9 deploys the mitigation. - Patch 10-11 fixes ON Vs AUTO mode. v3: https://lore.kernel.org/r/20251027-vmscape-bhb-v3-0-5793c2534e93@linux.intel.com - s/x86_pred_flush_pending/x86_predictor_flush_exit_to_user/ (Sean). - Removed IBPB & BHB-clear mutual exclusion at exit-to-userspace. - Collected tags. v2: https://lore.kernel.org/r/20251015-vmscape-bhb-v2-0-91cbdd9c3a96@linux.intel.com - Added check for IBPB feature in vmscape_select_mitigation(). (David) - s/vmscape=auto/vmscape=on/ (David) - Added patch to remove LFENCE from VMSCAPE BHB-clear sequence. - Rebased to v6.18-rc1. v1: https://lore.kernel.org/r/20250924-vmscape-bhb-v1-0-da51f0e1934d@linux.intel.com Hi All, These patches aim to improve the performance of a recent mitigation for VMSCAPE[1] vulnerability. This improvement is relevant for BHI variant of VMSCAPE that affect Alder Lake and newer processors. The current mitigation approach uses IBPB on kvm-exit-to-userspace for all affected range of CPUs. This is an overkill for CPUs that are only affected by the BHI variant. On such CPUs clearing the branch history is sufficient for VMSCAPE, and also more apt as the underlying issue is due to poisoned branch history. Below is the iPerf data for transfer between guest and host, comparing IBPB and BHB-clear mitigation. BHB-clear shows performance improvement over IBPB in most cases. Platform: Emerald Rapids Baseline: vmscape=off Target: IBPB at VMexit-to-userspace Vs the new BHB-clear at VMexit-to-userspace mitigation (both compared against baseline). (pN = N parallel connections) | iPerf user-net | IBPB | BHB Clear | |----------------|---------|-----------| | UDP 1-vCPU_p1 | -12.5% | 1.3% | | TCP 1-vCPU_p1 | -10.4% | -1.5% | | TCP 1-vCPU_p1 | -7.5% | -3.0% | | UDP 4-vCPU_p16 | -3.7% | -3.7% | | TCP 4-vCPU_p4 | -2.9% | -1.4% | | UDP 4-vCPU_p4 | -0.6% | 0.0% | | TCP 4-vCPU_p4 | 3.5% | 0.0% | | iPerf bridge-net | IBPB | BHB Clear | |------------------|---------|-----------| | UDP 1-vCPU_p1 | -9.4% | -0.4% | | TCP 1-vCPU_p1 | -3.9% | -0.5% | | UDP 4-vCPU_p16 | -2.2% | -3.8% | | TCP 4-vCPU_p4 | -1.0% | -1.0% | | TCP 4-vCPU_p4 | 0.5% | 0.5% | | UDP 4-vCPU_p4 | 0.0% | 0.9% | | TCP 1-vCPU_p1 | 0.0% | 0.9% | | iPerf vhost-net | IBPB | BHB Clear | |-----------------|---------|-----------| | UDP 1-vCPU_p1 | -4.3% | 1.0% | | TCP 1-vCPU_p1 | -3.8% | -0.5% | | TCP 1-vCPU_p1 | -2.7% | -0.7% | | UDP 4-vCPU_p16 | -0.7% | -2.2% | | TCP 4-vCPU_p4 | -0.4% | 0.8% | | UDP 4-vCPU_p4 | 0.4% | -0.7% | | TCP 4-vCPU_p4 | 0.0% | 0.6% | [1] https://comsec.ethz.ch/research/microarch/vmscape-exposing-and-exploiting-incomplete-branch-predictor-isolation-in-cloud-environments/ --- Pawan Gupta (10): x86/bhi: x86/vmscape: Move LFENCE out of clear_bhb_loop() x86/bhi: Make clear_bhb_loop() effective on newer CPUs x86/bhi: Rename clear_bhb_loop() to clear_bhb_loop_nofence() x86/vmscape: Rename x86_ibpb_exit_to_user to x86_predictor_flush_exit_to_user x86/vmscape: Move mitigation selection to a switch() x86/vmscape: Use write_ibpb() instead of indirect_branch_prediction_barrier() x86/vmscape: Use static_call() for predictor flush x86/vmscape: Deploy BHB clearing mitigation x86/vmscape: Resolve conflict between attack-vectors and vmscape=force x86/vmscape: Add cmdline vmscape=on to override attack vector controls Documentation/admin-guide/hw-vuln/vmscape.rst | 15 ++++- Documentation/admin-guide/kernel-parameters.txt | 6 +- arch/x86/Kconfig | 1 + arch/x86/entry/entry_64.S | 21 +++--- arch/x86/include/asm/cpufeatures.h | 2 +- arch/x86/include/asm/entry-common.h | 13 ++-- arch/x86/include/asm/nospec-branch.h | 15 +++-- arch/x86/include/asm/processor.h | 1 + arch/x86/kernel/cpu/bugs.c | 89 +++++++++++++++++++++---- arch/x86/kvm/x86.c | 4 +- arch/x86/net/bpf_jit_comp.c | 4 +- 11 files changed, 135 insertions(+), 36 deletions(-) --- base-commit: 7aaa8047eafd0bd628065b15757d9b48c5f9c07d change-id: 20250916-vmscape-bhb-d7d469977f2f Best regards, -- Thanks, Pawan