Received: by 10.223.176.5 with SMTP id f5csp722325wra; Fri, 9 Feb 2018 06:14:03 -0800 (PST) X-Google-Smtp-Source: AH8x225EoDJ+lJgtOeMygt+0ObCj5RfHGMkhzmxYrMiBLrCRKrViRkuSlcyNMTnUcG4t6n4vO3Xv X-Received: by 10.98.86.27 with SMTP id k27mr1211789pfb.174.1518185643040; Fri, 09 Feb 2018 06:14:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518185643; cv=none; d=google.com; s=arc-20160816; b=MvDLrvahnPBA3cIZxcLgxEQQfEILTtSovA/IbgrOlL+nMDZoPgVoxd6myhmSLwJagm vEQ7ofS3nx6pFLQGRupOFsVy/jgKbHcep4gzkBhSGh5BxbdEh1TgiaBZw/zpF6mUu1MM j+Ah5lhU/dWlJg+Oq5qFJ7e82xxTOqWR/QxFKWXxJs9RQqqTJbUJ8xp3dCE4QCkK7iBK X1/HPKnsa0lAgwCX8cglSbaX9ww6I9iwDFmDdtjxjwFRubInaxoLUEoiqjbNO2BHajQ8 GHV7ZMbA+5Uwe2PyfAEqb9LaYfIDRMC1jISOzcuQKZm8LqKX9d12xDBqyucC8Cea4pnQ EJ1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=CzTqvnA/JP8TFn819sXsxS4TVhapN240AbPzR2lS+O0=; b=xqM6TXF44MhV/Tnebwhgo8DY/85wjqxqrSWoSWJoa+AAj7JNTXGpmAPBaxMmpnMrau 5nOVj13e2KpHj1Y9ZAu7QjPhu5TcoIxTU+ibVTvB1qk1hcL3uiaZfKffdD3Oj7uSDisu mwwVAItXKXvt5gcPX9YHsFtkgn4ZmpNn7EkI1odnqKJ7rG6p1iHGTcZYd7UbaVOYy1B5 rbVaQhuq93gFuQSqqFqBckDlaWqZQkpT/sWnSMiT2/CUdlpdMARVAJ7I2JbNJ4Y2yU0T pzetE2SvDV0DMs/gZe3soccQ3uEwc3eJhu/GEZShld3wIZcYCaqcVnnJiWXCNzMzIIQE b2ng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m27si1774062pfg.64.2018.02.09.06.13.48; Fri, 09 Feb 2018 06:14:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752696AbeBINlq (ORCPT + 99 others); Fri, 9 Feb 2018 08:41:46 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:49202 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752647AbeBINlj (ORCPT ); Fri, 9 Feb 2018 08:41:39 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 559AAE7F; Fri, 9 Feb 2018 13:41:38 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Borislav Petkov , Juergen Gross , Boris Ostrovsky , Thomas Gleixner , Rolf Neugebauer Subject: [PATCH 4.9 31/92] x86/microcode/AMD: Do not load when running on a hypervisor Date: Fri, 9 Feb 2018 14:39:00 +0100 Message-Id: <20180209133933.427851594@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180209133931.211869118@linuxfoundation.org> References: <20180209133931.211869118@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Borislav Petkov commit a15a753539eca8ba243d576f02e7ca9c4b7d7042 upstream. Doing so is completely void of sense for multiple reasons so prevent it. Set dis_ucode_ldr to true and thus disable the microcode loader by default to address xen pv guests which execute the AP path but not the BSP path. By having it turned off by default, the APs won't run into the loader either. Also, check CPUID(1).ECX[31] which hypervisors set. Well almost, not the xen pv one. That one gets the aforementioned "fix". Also, improve the detection method by caching the final decision whether to continue loading in dis_ucode_ldr and do it once on the BSP. The APs then simply test that value. Signed-off-by: Borislav Petkov Tested-by: Juergen Gross Tested-by: Boris Ostrovsky Acked-by: Juergen Gross Link: http://lkml.kernel.org/r/20161218164414.9649-4-bp@alien8.de Signed-off-by: Thomas Gleixner Cc: Rolf Neugebauer Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/microcode/core.c | 28 +++++++++++++++++++--------- 1 file changed, 19 insertions(+), 9 deletions(-) --- a/arch/x86/kernel/cpu/microcode/core.c +++ b/arch/x86/kernel/cpu/microcode/core.c @@ -43,7 +43,7 @@ #define MICROCODE_VERSION "2.01" static struct microcode_ops *microcode_ops; -static bool dis_ucode_ldr; +static bool dis_ucode_ldr = true; /* * Synchronization. @@ -73,6 +73,7 @@ struct cpu_info_ctx { static bool __init check_loader_disabled_bsp(void) { static const char *__dis_opt_str = "dis_ucode_ldr"; + u32 a, b, c, d; #ifdef CONFIG_X86_32 const char *cmdline = (const char *)__pa_nodebug(boot_command_line); @@ -85,8 +86,23 @@ static bool __init check_loader_disabled bool *res = &dis_ucode_ldr; #endif - if (cmdline_find_option_bool(cmdline, option)) - *res = true; + if (!have_cpuid_p()) + return *res; + + a = 1; + c = 0; + native_cpuid(&a, &b, &c, &d); + + /* + * CPUID(1).ECX[31]: reserved for hypervisor use. This is still not + * completely accurate as xen pv guests don't see that CPUID bit set but + * that's good enough as they don't land on the BSP path anyway. + */ + if (c & BIT(31)) + return *res; + + if (cmdline_find_option_bool(cmdline, option) <= 0) + *res = false; return *res; } @@ -118,9 +134,6 @@ void __init load_ucode_bsp(void) if (check_loader_disabled_bsp()) return; - if (!have_cpuid_p()) - return; - vendor = x86_cpuid_vendor(); family = x86_cpuid_family(); @@ -154,9 +167,6 @@ void load_ucode_ap(void) if (check_loader_disabled_ap()) return; - if (!have_cpuid_p()) - return; - vendor = x86_cpuid_vendor(); family = x86_cpuid_family();