Received: by 10.213.65.68 with SMTP id h4csp179305imn; Tue, 3 Apr 2018 18:17:27 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/Y0D2TKJNpcDXJ1ghkaetlZW+E8u9+aJ/HF0Uxsnu3prD2iCSfjov8LoflOYjdzSlGM59I X-Received: by 10.101.69.133 with SMTP id o5mr10503729pgq.156.1522804646978; Tue, 03 Apr 2018 18:17:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522804646; cv=none; d=google.com; s=arc-20160816; b=EjU914NBaOUnJbPV+Jf6W9a96d21kEAzNTgfWZbpxRJhng5tRw7TwiifjOhf2hK9mn q48uq5V1aa/pTetynhppg7yQdqBS7a7gl9vHAq/f2jjUQbVCN1pdYVSTpGLqUmkobSJf 0EHhnULElUb4SH8iFwzdITPVDYlPZYGTKJEA1Rp2qWHYgc8TrL/DCeGF720lc2xnhh+9 mb/dsjjf9DxQQOOV9FWqa4KX+9z5nK3clAxnMoMVDMwb3uT4zXVe7uAcETImbWuZ2cGC jjuLxVxlQsLg2Ih9FLgFlRwdQddazgfY4F0QtlzR0Lu+0nGVvdc9mrxCARLe92oNHhFa lJ1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:in-reply-to:references:date :from:cc:to:subject:arc-authentication-results; bh=OGiZ6ZqIydHa/KxhRXuyQ/woot6F4M8sDxFF5HN/DdY=; b=pxgErLldIx7GUk4aqixLt4uXAizvfccxwu85Dx3LLqkuCXEL4kK0tWWjGyIRUdLjJm tFqO89unzaz5Ch+aItvUpGnBmP2HFN/kg1FO+/ktGibGccDCcVyTp9loZlf1rqSgzRU4 l31YoyGNV9areK6U3n2sDmoE+54HVApgiFtOgH0KWhXhJHn3+lnJPCZOPeuiYxXMAVfz wOu12YZxE+bA1tBWKbdzUTlG3zCHrWUaswXSaAHIGNkFG8htnWiZFa0PpSveD+KX9iY+ QzMC3fhTOR2W5/V9tGCnWecu8tvqH+80rg3I6ApUIVQ0sBwt/VC40rOdu2e8FtpF2wE7 Nz/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n1si2789761pgv.736.2018.04.03.18.17.12; Tue, 03 Apr 2018 18:17:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755130AbeDDBOj (ORCPT + 99 others); Tue, 3 Apr 2018 21:14:39 -0400 Received: from mga07.intel.com ([134.134.136.100]:26742 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754890AbeDDBMn (ORCPT ); Tue, 3 Apr 2018 21:12:43 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Apr 2018 18:12:42 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,403,1517904000"; d="scan'208";a="217321571" Received: from viggo.jf.intel.com (HELO localhost.localdomain) ([10.54.39.119]) by fmsmga006.fm.intel.com with ESMTP; 03 Apr 2018 18:12:42 -0700 Subject: [PATCH 04/11] x86/espfix: document use of _PAGE_GLOBAL To: linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, Dave Hansen , aarcange@redhat.com, luto@kernel.org, torvalds@linux-foundation.org, keescook@google.com, hughd@google.com, jgross@suse.com, x86@kernel.org, namit@vmware.com From: Dave Hansen Date: Tue, 03 Apr 2018 18:09:56 -0700 References: <20180404010946.6186729B@viggo.jf.intel.com> In-Reply-To: <20180404010946.6186729B@viggo.jf.intel.com> Message-Id: <20180404010956.32C1983F@viggo.jf.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dave Hansen The "normal" kernel page table creation mechanisms using PAGE_KERNEL_* page protections will never set _PAGE_GLOBAL with PTI. The few places in the kernel that always want _PAGE_GLOBAL must avoid using PAGE_KERNEL_*. Document that we want it here and its use is not accidental. Signed-off-by: Dave Hansen Cc: Andrea Arcangeli Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Kees Cook Cc: Hugh Dickins Cc: Juergen Gross Cc: x86@kernel.org Cc: Nadav Amit --- b/arch/x86/kernel/espfix_64.c | 4 ++++ 1 file changed, 4 insertions(+) diff -puN arch/x86/kernel/espfix_64.c~espfix-use-kern-defaults-not-supported arch/x86/kernel/espfix_64.c --- a/arch/x86/kernel/espfix_64.c~espfix-use-kern-defaults-not-supported 2018-04-02 16:41:14.274605175 -0700 +++ b/arch/x86/kernel/espfix_64.c 2018-04-02 16:41:14.278605175 -0700 @@ -195,6 +195,10 @@ void init_espfix_ap(int cpu) pte_p = pte_offset_kernel(&pmd, addr); stack_page = page_address(alloc_pages_node(node, GFP_KERNEL, 0)); + /* + * __PAGE_KERNEL_* includes _PAGE_GLOBAL, which we want since + * this is mapped to userspace. + */ pte = __pte(__pa(stack_page) | ((__PAGE_KERNEL_RO | _PAGE_ENC) & ptemask)); for (n = 0; n < ESPFIX_PTE_CLONES; n++) set_pte(&pte_p[n*PTE_STRIDE], pte); _