Received: by 2002:a4a:311b:0:0:0:0:0 with SMTP id k27-v6csp4793640ooa; Tue, 14 Aug 2018 10:37:45 -0700 (PDT) X-Google-Smtp-Source: AA+uWPztP+NinOvJHLr2EMpYSTw5ac5EK1vZG991abtvY4ya7Dx+DCCEJwlQpTPPm2fyMX5Uzqrl X-Received: by 2002:a62:e218:: with SMTP id a24-v6mr24603560pfi.75.1534268265595; Tue, 14 Aug 2018 10:37:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534268265; cv=none; d=google.com; s=arc-20160816; b=NdHA33P6Fd2fVj7KdKImjl0AxW04mZWJRLyPAZ7pvFoxcHOhGfx205RJrOAMtAxOvA kAqczDQ5ArqIievgzzKbZylwvr6FA8JKtCQtpLXjyI1BsYfDTe/3jUk25DJbulBw8HDH KNfbSJ6/jsDh0kqkwDB55LvBz9TL9pvMdlQ9yQJjBnNRpsjAPXuBM1in90IfuDjV3Y5P Msy8t01uQeWaobSrZbP7NGkeH5XbcvPhD/Om9s8fIlX9NXMKEYtZUZ+Zc0dHZsKEXDtR HESu2+477dZLzOcb28/gw5p8WrpjN7jaR8QGZTi8mrrL8id/H1nbKXOtVENBYqHMbw/L EQhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=VZZLH89IegP+QQsmTJfAcPA4iWr4ucMpvSMPtpm2SpM=; b=ffwY4Z1VeAHBw6AApUAShmECGUfSZsgDzlwXQ99WpcsdTy5GD1xIWSyIHZogtOc01u UfGW85d2f1IR73N+gSi4kE7WvvhmVW9Iu50Z0HBQkfckFchI6w9K7tw/EebEacNQuCcs PQiQG1ddLf6U4nDr3BuMwcAz9StnSU/sNDLkts7l3y0jmtwpHka5oOFrx24+Tm1/1wLd 40Xr9LdUeW1zr/lBANjfHADchb8J8f6UEVrCxVm/KrFauyRm8HopDUwmU4vhCYH+1n9u qVznbMWHxhSan2L7xnizdfZ5oKyMtoV+Dv6t6ohfaPg66fdXqc88ccgWFXNBc9MxCTBV o5og== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g80-v6si23008882pfk.53.2018.08.14.10.37.30; Tue, 14 Aug 2018 10:37:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730080AbeHNUYB (ORCPT + 99 others); Tue, 14 Aug 2018 16:24:01 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:57344 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729803AbeHNUYA (ORCPT ); Tue, 14 Aug 2018 16:24:00 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id B1D30DE0; Tue, 14 Aug 2018 17:35:50 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andi Kleen , Thomas Gleixner , Josh Poimboeuf , Michal Hocko , Dave Hansen Subject: [PATCH 4.14 033/104] x86/speculation/l1tf: Limit swap file size to MAX_PA/2 Date: Tue, 14 Aug 2018 19:16:47 +0200 Message-Id: <20180814171517.426182550@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180814171515.270692185@linuxfoundation.org> References: <20180814171515.270692185@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andi Kleen commit 377eeaa8e11fe815b1d07c81c4a0e2843a8c15eb upstream For the L1TF workaround its necessary to limit the swap file size to below MAX_PA/2, so that the higher bits of the swap offset inverted never point to valid memory. Add a mechanism for the architecture to override the swap file size check in swapfile.c and add a x86 specific max swapfile check function that enforces that limit. The check is only enabled if the CPU is vulnerable to L1TF. In VMs with 42bit MAX_PA the typical limit is 2TB now, on a native system with 46bit PA it is 32TB. The limit is only per individual swap file, so it's always possible to exceed these limits with multiple swap files or partitions. Signed-off-by: Andi Kleen Signed-off-by: Thomas Gleixner Reviewed-by: Josh Poimboeuf Acked-by: Michal Hocko Acked-by: Dave Hansen Signed-off-by: Greg Kroah-Hartman --- arch/x86/mm/init.c | 15 +++++++++++++++ include/linux/swapfile.h | 2 ++ mm/swapfile.c | 46 ++++++++++++++++++++++++++++++---------------- 3 files changed, 47 insertions(+), 16 deletions(-) --- a/arch/x86/mm/init.c +++ b/arch/x86/mm/init.c @@ -4,6 +4,8 @@ #include #include #include /* for max_low_pfn */ +#include +#include #include #include @@ -880,3 +882,16 @@ void update_cache_mode_entry(unsigned en __cachemode2pte_tbl[cache] = __cm_idx2pte(entry); __pte2cachemode_tbl[entry] = cache; } + +unsigned long max_swapfile_size(void) +{ + unsigned long pages; + + pages = generic_max_swapfile_size(); + + if (boot_cpu_has_bug(X86_BUG_L1TF)) { + /* Limit the swap file size to MAX_PA/2 for L1TF workaround */ + pages = min_t(unsigned long, l1tf_pfn_limit() + 1, pages); + } + return pages; +} --- a/include/linux/swapfile.h +++ b/include/linux/swapfile.h @@ -10,5 +10,7 @@ extern spinlock_t swap_lock; extern struct plist_head swap_active_head; extern struct swap_info_struct *swap_info[]; extern int try_to_unuse(unsigned int, bool, unsigned long); +extern unsigned long generic_max_swapfile_size(void); +extern unsigned long max_swapfile_size(void); #endif /* _LINUX_SWAPFILE_H */ --- a/mm/swapfile.c +++ b/mm/swapfile.c @@ -2902,6 +2902,35 @@ static int claim_swapfile(struct swap_in return 0; } + +/* + * Find out how many pages are allowed for a single swap device. There + * are two limiting factors: + * 1) the number of bits for the swap offset in the swp_entry_t type, and + * 2) the number of bits in the swap pte, as defined by the different + * architectures. + * + * In order to find the largest possible bit mask, a swap entry with + * swap type 0 and swap offset ~0UL is created, encoded to a swap pte, + * decoded to a swp_entry_t again, and finally the swap offset is + * extracted. + * + * This will mask all the bits from the initial ~0UL mask that can't + * be encoded in either the swp_entry_t or the architecture definition + * of a swap pte. + */ +unsigned long generic_max_swapfile_size(void) +{ + return swp_offset(pte_to_swp_entry( + swp_entry_to_pte(swp_entry(0, ~0UL)))) + 1; +} + +/* Can be overridden by an architecture for additional checks. */ +__weak unsigned long max_swapfile_size(void) +{ + return generic_max_swapfile_size(); +} + static unsigned long read_swap_header(struct swap_info_struct *p, union swap_header *swap_header, struct inode *inode) @@ -2937,22 +2966,7 @@ static unsigned long read_swap_header(st p->cluster_next = 1; p->cluster_nr = 0; - /* - * Find out how many pages are allowed for a single swap - * device. There are two limiting factors: 1) the number - * of bits for the swap offset in the swp_entry_t type, and - * 2) the number of bits in the swap pte as defined by the - * different architectures. In order to find the - * largest possible bit mask, a swap entry with swap type 0 - * and swap offset ~0UL is created, encoded to a swap pte, - * decoded to a swp_entry_t again, and finally the swap - * offset is extracted. This will mask all the bits from - * the initial ~0UL mask that can't be encoded in either - * the swp_entry_t or the architecture definition of a - * swap pte. - */ - maxpages = swp_offset(pte_to_swp_entry( - swp_entry_to_pte(swp_entry(0, ~0UL)))) + 1; + maxpages = max_swapfile_size(); last_page = swap_header->info.last_page; if (!last_page) { pr_warn("Empty swap-file\n");