Received: by 10.223.176.46 with SMTP id f43csp2647066wra; Mon, 22 Jan 2018 00:49:38 -0800 (PST) X-Google-Smtp-Source: AH8x225JKKZgSYNcg4y+8pA/GJuGV7JYoJffAQZ5Sx/7gqvaENSBBkFeaNLIAAk+xNWD20/qKVPn X-Received: by 2002:a17:902:780f:: with SMTP id p15-v6mr3067396pll.16.1516610978611; Mon, 22 Jan 2018 00:49:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516610978; cv=none; d=google.com; s=arc-20160816; b=qYyDWzTbHKavmNs9KOsmt3GcNWdWIC8IuO0qGh8TXNMj0cN9Q0N7V4s5Z6ozRmFe7L pFpafQxLmmTf+Hmu0dwzJl0AtYmhGaabQukNP59ZCojojK4dbr+YalSs50WhEiWS+NvQ 0MCP4nMvcT0duspp+UINgE+Ak+uRpQYj2OtAJQir1G2Et/J8V405L31Bw2rNHzfm8BO6 thZAwFyxQuAMXBgqsN3DJXoS35OCrafXhDMSR5p9zmUo+aiJrtmRV1yozk9gkCLZcp3y UGgLAB805IlGoFsR1ywEvzZRQkOcidnQCE/z/tJzU/7w7twRTCuTsT8QtwRNw5OGzeSI 8O8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=2OY9C1WZMjlapS2ccS3yAQRTYZ58yaglq+e0f64M8dU=; b=kiHgwyZ/+S4qswfpcLhB3BCH64HVnssFXMY3N3kTl9Uihv3Ker15+BNgym11at7baf 3amVTTuvjg0J4OUNeb2vDJG1gEasGmaJYmxV6+1+RTMIlL65D4fMLCGboOh23eoHES+G HaQfTgPTQZdpJavGyTyKYnmLE3usDyqYd04z6am4NGH6jHm9tJ75ezDNuM4ksATEM8YK wzdqlbfuspfcRhtO95PdkYbKovGQF/p72SSZuGtTfIc2L91sbhMiHaAApOK/fd+B2p3p wgUAuDJZm7C+CxqZ9unx3W1LLGgQP32ha7tPpRrziDwXSI0ovHMCBmB9fGJ2f9ztjbZC 5YjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q78si15226696pfi.268.2018.01.22.00.49.24; Mon, 22 Jan 2018 00:49:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751702AbeAVIrO (ORCPT + 99 others); Mon, 22 Jan 2018 03:47:14 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:58974 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751831AbeAVImf (ORCPT ); Mon, 22 Jan 2018 03:42:35 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 4C444F3C; Mon, 22 Jan 2018 08:42:34 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tom Lendacky , Thomas Gleixner , Borislav Petkov , Dave Hansen , Andy Lutomirski , Nick Lowe Subject: [PATCH 4.4 46/53] x86/cpu, x86/pti: Do not enable PTI on AMD processors Date: Mon, 22 Jan 2018 09:40:38 +0100 Message-Id: <20180122083912.578867910@linuxfoundation.org> X-Mailer: git-send-email 2.16.0 In-Reply-To: <20180122083910.299610926@linuxfoundation.org> References: <20180122083910.299610926@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Tom Lendacky commit 694d99d40972f12e59a3696effee8a376b79d7c8 upstream. AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against. The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault. Disable page table isolation by default on AMD processors by not setting the X86_BUG_CPU_INSECURE feature, which controls whether X86_FEATURE_PTI is set. Signed-off-by: Tom Lendacky Signed-off-by: Thomas Gleixner Reviewed-by: Borislav Petkov Cc: Dave Hansen Cc: Andy Lutomirski Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/20171227054354.20369.94587.stgit@tlendack-t1.amdoffice.net Cc: Nick Lowe Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/common.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c @@ -831,8 +831,8 @@ static void __init early_identify_cpu(st setup_force_cpu_cap(X86_FEATURE_ALWAYS); - /* Assume for now that ALL x86 CPUs are insecure */ - setup_force_cpu_bug(X86_BUG_CPU_MELTDOWN); + if (c->x86_vendor != X86_VENDOR_AMD) + setup_force_cpu_bug(X86_BUG_CPU_MELTDOWN); setup_force_cpu_bug(X86_BUG_SPECTRE_V1); setup_force_cpu_bug(X86_BUG_SPECTRE_V2);