Received: by 2002:a4a:311b:0:0:0:0:0 with SMTP id k27-v6csp4796276ooa; Tue, 14 Aug 2018 10:40:09 -0700 (PDT) X-Google-Smtp-Source: AA+uWPxtQQXUgM58BUhB/iHUGpWnKsqGaLBfZ6YFcQNsfSugjJkaR0AoQla2N8fHWaaopRGtfJQF X-Received: by 2002:a63:e56:: with SMTP id 22-v6mr22434695pgo.438.1534268409203; Tue, 14 Aug 2018 10:40:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534268409; cv=none; d=google.com; s=arc-20160816; b=hcOh6XXTwHL2pycC+EQLlLkw6dvp4ZkI9s1SI6hj3sVDsFyVRGDeG6GjOjCt83wJFc +7IOxdhHGvE/YbJxOc6Vysmx9D35VjBHYurlBGdIRipzeo9V+9k/qGxCd5W7uwdhkTF/ oCRot1ccUkcJj+glQb+giL60p/7i7FRzjOuQxdJRMSPtgRAaDnRyar8GsEz8s8X3lDVu Wl6to90L5RwRbNyF4PDGTFtTIz4IGYqIRUV10EizYOC2TT66xBzFy3w/mO7JriqkcGCT cwv8jW+aF7NAnPmyihtowT1X0w3BhkOQw4hUx58xF7pQIH8qjIKU9F2+oliIx1ctJ9Dz /oHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=dNLw5o0t6J80IFi+wRXeHmZaJb2CYbQg66pyCsSiMVU=; b=jh1N6FGRmVbf2BAB+IY3fM6CODyf0JrFMGPeIvpYGiDYPg2UhC7w95iNRg0jtjfRhC xssqZ5s4lVjS76VT5+vU4Ga8Yo+7py+o9GVQaI3LQ+OHFYnxHDGe4RpDVu1wvXzK/TeM 3+XComtHEleSq/Ky6XBYDvRA77IlBIDsmBzGQQKC7fACHL0jwl47ErixcVv1ERJMv/z8 +Yl6LdEMlEwWeKE5ZiC86uYJQ+KjMvWHcJCyYbPCpSOomi1AG9EZeGfMQwI/rRt2hmx8 mLi12UGXWvLE1rQPgh7W+53+TBXcOrNqzzS0tuIllVx373d4Hv/q/iq5A3J/F3jar6Qw JcnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c3-v6si17118121plr.108.2018.08.14.10.39.54; Tue, 14 Aug 2018 10:40:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732962AbeHNU0m (ORCPT + 99 others); Tue, 14 Aug 2018 16:26:42 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:58344 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728596AbeHNU0l (ORCPT ); Tue, 14 Aug 2018 16:26:41 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 8DE1BD20; Tue, 14 Aug 2018 17:38:31 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andi Kleen , Thomas Gleixner Subject: [PATCH 4.14 102/104] x86/mm/kmmio: Make the tracer robust against L1TF Date: Tue, 14 Aug 2018 19:17:56 +0200 Message-Id: <20180814171521.627418245@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180814171515.270692185@linuxfoundation.org> References: <20180814171515.270692185@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andi Kleen commit 1063711b57393c1999248cccb57bebfaf16739e7 upstream The mmio tracer sets io mapping PTEs and PMDs to non present when enabled without inverting the address bits, which makes the PTE entry vulnerable for L1TF. Make it use the right low level macros to actually invert the address bits to protect against L1TF. In principle this could be avoided because MMIO tracing is not likely to be enabled on production machines, but the fix is straigt forward and for consistency sake it's better to get rid of the open coded PTE manipulation. Signed-off-by: Andi Kleen Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/mm/kmmio.c | 25 +++++++++++++++---------- 1 file changed, 15 insertions(+), 10 deletions(-) --- a/arch/x86/mm/kmmio.c +++ b/arch/x86/mm/kmmio.c @@ -126,24 +126,29 @@ static struct kmmio_fault_page *get_kmmi static void clear_pmd_presence(pmd_t *pmd, bool clear, pmdval_t *old) { + pmd_t new_pmd; pmdval_t v = pmd_val(*pmd); if (clear) { - *old = v & _PAGE_PRESENT; - v &= ~_PAGE_PRESENT; - } else /* presume this has been called with clear==true previously */ - v |= *old; - set_pmd(pmd, __pmd(v)); + *old = v; + new_pmd = pmd_mknotpresent(*pmd); + } else { + /* Presume this has been called with clear==true previously */ + new_pmd = __pmd(*old); + } + set_pmd(pmd, new_pmd); } static void clear_pte_presence(pte_t *pte, bool clear, pteval_t *old) { pteval_t v = pte_val(*pte); if (clear) { - *old = v & _PAGE_PRESENT; - v &= ~_PAGE_PRESENT; - } else /* presume this has been called with clear==true previously */ - v |= *old; - set_pte_atomic(pte, __pte(v)); + *old = v; + /* Nothing should care about address */ + pte_clear(&init_mm, 0, pte); + } else { + /* Presume this has been called with clear==true previously */ + set_pte_atomic(pte, __pte(*old)); + } } static int clear_page_presence(struct kmmio_fault_page *f, bool clear)