Received: by 2002:a4a:311b:0:0:0:0:0 with SMTP id k27-v6csp4801673ooa; Tue, 14 Aug 2018 10:44:45 -0700 (PDT) X-Google-Smtp-Source: AA+uWPxQrS5RucmtJRR3/Wc2Ls4pcwEZJHDjSl2TKBjm3XoWIRi6gHHqLMAU/82YzObDsRn5ncJZ X-Received: by 2002:a63:c312:: with SMTP id c18-v6mr22019956pgd.449.1534268685369; Tue, 14 Aug 2018 10:44:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534268685; cv=none; d=google.com; s=arc-20160816; b=u8pgxP8MutLG1U2nSOvX4X7yI1+4I8PYyWMtL1dZsC74AeWF+T6R4hTAW2YkDqcIWA rBwq3uvB8pHNUebgqgC0HDjN0SFvV4hK/lje7EBV4GJQfONpQqdZKc5QHABGYu2tcbd6 MIl2Z40IgsOtNGjV4+xW+re8Sg55Iwi+ju9xBwVZc5VsAg5+gm3FPuWT7fvCjCwCwqbf 1eUJKTmNBJlTwRZ4tyfnMFFwzpEUKfW8978FQwcMaNRxd55MGgXybvTnaXoiHXSyVtnl 8CMbqdBiLXozKGr3IVZ3WmDypEREmvXe5dnaTxjdUG3ORc+p83rHMChEO8LFpdeseiWj k3Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=SH5kzKwahsnpgE67s0tJSb4FxnXHcDuYuzJPZ5nbhWQ=; b=ckCadGgvBRWo1+mCJbt+wy7zhbVd94//fQsLl4p95jl5QVIedrDd9X6odq+q+5lmLk DEtR9h74EHrfnq9EHrl70mLfkBDsLVK7geFN/qtOQvOEWtmMiYuJGylfgST+1HEsQpNp Xj3yNYwfUSv4RRe48UjBzbdZOoJll+onNdO6ui01RsdSaegQLeCE9D1SyFgYTJ1zcC5k vfUa1uaiYlaFT566GCnY9fom25t8Qm2QsSCBN6b+cAtJLsOYg0hcVEkG5qvLfmpikcDb cOt1zJ4l8ioaOwzIDvkkfrj8Eue+qYx0w/TtLaFVDqdEnezlAuML6rVDp+KU/41iWfjr V0yQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j62-v6si24096716pfb.348.2018.08.14.10.44.30; Tue, 14 Aug 2018 10:44:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390503AbeHNUbS (ORCPT + 99 others); Tue, 14 Aug 2018 16:31:18 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:59764 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728642AbeHNUbR (ORCPT ); Tue, 14 Aug 2018 16:31:17 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 5AFDBC7B; Tue, 14 Aug 2018 17:43:05 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , Jiri Kosina , Josh Poimboeuf , David Woodhouse Subject: [PATCH 4.9 071/107] x86/l1tf: Handle EPT disabled state proper Date: Tue, 14 Aug 2018 19:17:34 +0200 Message-Id: <20180814171525.164507724@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180814171520.883143803@linuxfoundation.org> References: <20180814171520.883143803@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner commit a7b9020b06ec6d7c3f3b0d4ef1a9eba12654f4f7 upstream If Extended Page Tables (EPT) are disabled or not supported, no L1D flushing is required. The setup function can just avoid setting up the L1D flush for the EPT=n case. Invoke it after the hardware setup has be done and enable_ept has the correct state and expose the EPT disabled state in the mitigation status as well. Signed-off-by: Thomas Gleixner Tested-by: Jiri Kosina Reviewed-by: Greg Kroah-Hartman Reviewed-by: Josh Poimboeuf Link: https://lkml.kernel.org/r/20180713142322.612160168@linutronix.de Signed-off-by: David Woodhouse Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/vmx.h | 1 + arch/x86/kernel/cpu/bugs.c | 9 +++++---- arch/x86/kvm/vmx.c | 44 ++++++++++++++++++++++++++------------------ 3 files changed, 32 insertions(+), 22 deletions(-) --- a/arch/x86/include/asm/vmx.h +++ b/arch/x86/include/asm/vmx.h @@ -504,6 +504,7 @@ enum vmx_l1d_flush_state { VMENTER_L1D_FLUSH_NEVER, VMENTER_L1D_FLUSH_COND, VMENTER_L1D_FLUSH_ALWAYS, + VMENTER_L1D_FLUSH_EPT_DISABLED, }; extern enum vmx_l1d_flush_state l1tf_vmx_mitigation; --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -675,10 +675,11 @@ static void __init l1tf_select_mitigatio #if IS_ENABLED(CONFIG_KVM_INTEL) static const char *l1tf_vmx_states[] = { - [VMENTER_L1D_FLUSH_AUTO] = "auto", - [VMENTER_L1D_FLUSH_NEVER] = "vulnerable", - [VMENTER_L1D_FLUSH_COND] = "conditional cache flushes", - [VMENTER_L1D_FLUSH_ALWAYS] = "cache flushes", + [VMENTER_L1D_FLUSH_AUTO] = "auto", + [VMENTER_L1D_FLUSH_NEVER] = "vulnerable", + [VMENTER_L1D_FLUSH_COND] = "conditional cache flushes", + [VMENTER_L1D_FLUSH_ALWAYS] = "cache flushes", + [VMENTER_L1D_FLUSH_EPT_DISABLED] = "EPT disabled", }; static ssize_t l1tf_show_state(char *buf) --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -11659,6 +11659,11 @@ static int __init vmx_setup_l1d_flush(vo if (!boot_cpu_has_bug(X86_BUG_L1TF)) return 0; + if (!enable_ept) { + l1tf_vmx_mitigation = VMENTER_L1D_FLUSH_EPT_DISABLED; + return 0; + } + l1tf_vmx_mitigation = vmentry_l1d_flush; if (vmentry_l1d_flush == VMENTER_L1D_FLUSH_NEVER) @@ -11685,18 +11690,35 @@ static void vmx_cleanup_l1d_flush(void) l1tf_vmx_mitigation = VMENTER_L1D_FLUSH_AUTO; } + +static void vmx_exit(void) +{ +#ifdef CONFIG_KEXEC_CORE + RCU_INIT_POINTER(crash_vmclear_loaded_vmcss, NULL); + synchronize_rcu(); +#endif + + kvm_exit(); + + vmx_cleanup_l1d_flush(); +} +module_exit(vmx_exit) + static int __init vmx_init(void) { int r; - r = vmx_setup_l1d_flush(); + r = kvm_init(&vmx_x86_ops, sizeof(struct vcpu_vmx), + __alignof__(struct vcpu_vmx), THIS_MODULE); if (r) return r; - r = kvm_init(&vmx_x86_ops, sizeof(struct vcpu_vmx), - __alignof__(struct vcpu_vmx), THIS_MODULE); + /* + * Must be called after kvm_init() so enable_ept is properly set up + */ + r = vmx_setup_l1d_flush(); if (r) { - vmx_cleanup_l1d_flush(); + vmx_exit(); return r; } @@ -11707,18 +11729,4 @@ static int __init vmx_init(void) return 0; } - -static void __exit vmx_exit(void) -{ -#ifdef CONFIG_KEXEC_CORE - RCU_INIT_POINTER(crash_vmclear_loaded_vmcss, NULL); - synchronize_rcu(); -#endif - - kvm_exit(); - - vmx_cleanup_l1d_flush(); -} - module_init(vmx_init) -module_exit(vmx_exit)