Received: by 2002:a4a:311b:0:0:0:0:0 with SMTP id k27-v6csp4783388ooa; Tue, 14 Aug 2018 10:29:30 -0700 (PDT) X-Google-Smtp-Source: AA+uWPyR2cdqCHW2abV0WUJsFWLfCGI0PsXlCuZ87VLhM1kri7DF5oYHWZxgXBMor4QKADVpdTMk X-Received: by 2002:a65:6455:: with SMTP id s21-v6mr21172382pgv.394.1534267770668; Tue, 14 Aug 2018 10:29:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534267770; cv=none; d=google.com; s=arc-20160816; b=MtLQkW5MK7uaf+zlPw2w7hlMNUjzWuZcG2CPX86A8jvPa6Q0ttRcaFIUj0v7gfvl3X CU0xO9WAMOdvDyrmRWpFYgvaDduqpglqQIIPBZ8mmTy+n4xOoPaIFDYgdPI1isDYBrFB RqU0Dhfcn789YfoDncEDDtKxDsjVRx2zk/pePe+9VSm76YkVLRsJvAP9Pv5x1JpgDBDk rB3+jWl+6hgSkp5+IjDljOf9zZBs3L4k22sLv/4ZEG8QF/RKd0+g74powzhVf3HqCSS0 ugCsgJ98ZFoW9ZBjIh1pUK47xfN5W45wQwyx/X3O6yPLaA3f5KXUz1UPZgIw8+JkwtnY QhVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=pwSef3N5oktyqqHQwgflf6gEwHNrzvHmjE+QCTlcgjQ=; b=hS2424QHq1WGemJG60hzsbpVuZt/Gw0oNCEwZplxOdMGC3NFGyTANjEZMjj9m82zzi XoJxZ1lEEjwRb9xHYSGUnbVuyz6lUp559EzA/kxdCwOkEmDgAwwid/Qg2QTf6hNgo3Ef GIHdmh67m/BxcpUmYyPSX3gFQ4ycJ+DD95TS+qE2+rfHgauTkzolfemoVQVIEJzYOmX9 NvyIcQyPEhzXjkLzhrwDSNEGfPpHfHoRGIqxmreYMEgHelsvZHvSE8pljUFngAVApVYq +bWHcfqlxuryg6AfWRolah2VPbUNzl8exzQLzEsnGpsvGY2gpB893f5g378hSOy6jqp2 +rNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r15-v6si18441695pgf.403.2018.08.14.10.29.15; Tue, 14 Aug 2018 10:29:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388761AbeHNUPl (ORCPT + 99 others); Tue, 14 Aug 2018 16:15:41 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:52490 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387825AbeHNUPl (ORCPT ); Tue, 14 Aug 2018 16:15:41 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 1CE03C5C; Tue, 14 Aug 2018 17:27:33 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paolo Bonzini , Thomas Gleixner Subject: [PATCH 4.18 71/79] x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry Date: Tue, 14 Aug 2018 19:17:30 +0200 Message-Id: <20180814171340.852690243@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180814171336.799314117@linuxfoundation.org> References: <20180814171336.799314117@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Paolo Bonzini Bit 3 of ARCH_CAPABILITIES tells a hypervisor that L1D flush on vmentry is not needed. Add a new value to enum vmx_l1d_flush_state, which is used either if there is no L1TF bug at all, or if bit 3 is set in ARCH_CAPABILITIES. Signed-off-by: Paolo Bonzini Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/msr-index.h | 1 + arch/x86/include/asm/vmx.h | 1 + arch/x86/kernel/cpu/bugs.c | 1 + arch/x86/kvm/vmx.c | 10 ++++++++++ 4 files changed, 13 insertions(+) --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -70,6 +70,7 @@ #define MSR_IA32_ARCH_CAPABILITIES 0x0000010a #define ARCH_CAP_RDCL_NO (1 << 0) /* Not susceptible to Meltdown */ #define ARCH_CAP_IBRS_ALL (1 << 1) /* Enhanced IBRS support */ +#define ARCH_CAP_SKIP_VMENTRY_L1DFLUSH (1 << 3) /* Skip L1D flush on vmentry */ #define ARCH_CAP_SSB_NO (1 << 4) /* * Not susceptible to Speculative Store Bypass * attack, so no Speculative Store Bypass --- a/arch/x86/include/asm/vmx.h +++ b/arch/x86/include/asm/vmx.h @@ -582,6 +582,7 @@ enum vmx_l1d_flush_state { VMENTER_L1D_FLUSH_COND, VMENTER_L1D_FLUSH_ALWAYS, VMENTER_L1D_FLUSH_EPT_DISABLED, + VMENTER_L1D_FLUSH_NOT_REQUIRED, }; extern enum vmx_l1d_flush_state l1tf_vmx_mitigation; --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -731,6 +731,7 @@ static const char *l1tf_vmx_states[] = { [VMENTER_L1D_FLUSH_COND] = "conditional cache flushes", [VMENTER_L1D_FLUSH_ALWAYS] = "cache flushes", [VMENTER_L1D_FLUSH_EPT_DISABLED] = "EPT disabled", + [VMENTER_L1D_FLUSH_NOT_REQUIRED] = "flush not necessary" }; static ssize_t l1tf_show_state(char *buf) --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -218,6 +218,16 @@ static int vmx_setup_l1d_flush(enum vmx_ return 0; } + if (boot_cpu_has(X86_FEATURE_ARCH_CAPABILITIES)) { + u64 msr; + + rdmsrl(MSR_IA32_ARCH_CAPABILITIES, msr); + if (msr & ARCH_CAP_SKIP_VMENTRY_L1DFLUSH) { + l1tf_vmx_mitigation = VMENTER_L1D_FLUSH_NOT_REQUIRED; + return 0; + } + } + /* If set to auto use the default l1tf mitigation method */ if (l1tf == VMENTER_L1D_FLUSH_AUTO) { switch (l1tf_mitigation) {