Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8119602imu; Tue, 4 Dec 2018 03:20:18 -0800 (PST) X-Google-Smtp-Source: AFSGD/UChnUj2QJHqOKSocKR5kkpFzPQURYE/Cd6BK0xFVdDVY8M3i0zJqWw61Bgy9B6aixKuR6Y X-Received: by 2002:a63:3287:: with SMTP id y129mr15333104pgy.337.1543922418220; Tue, 04 Dec 2018 03:20:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543922418; cv=none; d=google.com; s=arc-20160816; b=Kodts0e3StMVWgFTHBYgmTqMjKSc8YA5lKvoOFjpV4YszRXaEiHhvptdrkkbO2/Ng9 Oa0cr8pS3DaI6+Mxm3un0hVFQUALwK50FrY9k2LDs/ZaryapygEspmXW2nTnz5XJ0v/U SjUpHHsC3lnSIlIkPN4n7iua5hXfAAl5xS1ujbJFt7yW3+lrI4tVn+N437yUHa97K5lp hKNUKyd/flxVHlgR1x7Q5L+mLzRPnUq6wRZmYIutRnMmYxu6hF1K7NHw3EdX0lqlZCAG e7GcTGCrqzLqBmkqDpYEU660LpNPGxhtQzPqOEerPqa4ygtXHYSQJjumNOobpUEz2x3C o18g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PNSdU1dUsPqUY7z71FwoMwulNvdZ+SPkeX0dO8GLBS0=; b=OhOhKhMvqBaYnZydOtARVLrHa1E9nIrB+yk5GAlXZk7w3VnQSCWDZpoTfq1MlQqDZg 0bxArfrACERtoIxfNdYaimhpHA+xHajBhSG3xUg6bFOnCuzeFXCeXhCnn+mOS5/jV2fx ULPWCNvWmR20Bp7Rf4QYBBagwPunOOe6wkTRU42fyNspZdXizZJ2mkJOPCAlrvWCMZuB CEqdowRGE3/n4CILe+BQmf6URXjKCRN6RJMQRjTE3no7JxUMJrD95dBzI5avExuCYJ2q OOibtZM4gKT+geiSae6+4Iw8XUfJVAwN4YTOneETxWy7wN6YxlCXIlMGXjJwNlglytEf sURw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nBJClcVS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d4si13434899pla.58.2018.12.04.03.20.03; Tue, 04 Dec 2018 03:20:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nBJClcVS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727993AbeLDLSY (ORCPT + 99 others); Tue, 4 Dec 2018 06:18:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:52194 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727464AbeLDLEv (ORCPT ); Tue, 4 Dec 2018 06:04:51 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B8D8621536; Tue, 4 Dec 2018 11:04:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921490; bh=P3DcsHh+YyfBB3j+NwBJeIBpvLF0z6l3doyafipu+BE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nBJClcVSJqUf23cvDibzWUXYwUCK5MIli0EZRApCM+Z87e0DTVmjj4X8r+4zOKPPC YC+88+UP7Ag5C0qf0zWSscgJBM77jIyStCB4AwLpMzqY3h5schfIapkQrc0LYA09eb tVeCcDHD7HAq0/UliUn8IUB2naCqFLuWdINgV7YU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Andy Lutomirski , Linus Torvalds , Jiri Kosina , Tom Lendacky , Josh Poimboeuf , Andrea Arcangeli , David Woodhouse , Tim Chen , Andi Kleen , Dave Hansen , Casey Schaufler , Asit Mallick , Arjan van de Ven , Jon Masters , Waiman Long , Dave Stewart , Kees Cook Subject: [PATCH 4.14 091/146] x86/l1tf: Show actual SMT state Date: Tue, 4 Dec 2018 11:49:37 +0100 Message-Id: <20181204103730.492796584@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103726.750894136@linuxfoundation.org> References: <20181204103726.750894136@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner tglx@linutronix.de commit 130d6f946f6f2a972ee3ec8540b7243ab99abe97 upstream Use the now exposed real SMT state, not the SMT sysfs control knob state. This reflects the state of the system when the mitigation status is queried. This does not change the warning in the VMX launch code. There the dependency on the control knob makes sense because siblings could be brought online anytime after launching the VM. Signed-off-by: Thomas Gleixner Reviewed-by: Ingo Molnar Cc: Peter Zijlstra Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Jiri Kosina Cc: Tom Lendacky Cc: Josh Poimboeuf Cc: Andrea Arcangeli Cc: David Woodhouse Cc: Tim Chen Cc: Andi Kleen Cc: Dave Hansen Cc: Casey Schaufler Cc: Asit Mallick Cc: Arjan van de Ven Cc: Jon Masters Cc: Waiman Long Cc: Greg KH Cc: Dave Stewart Cc: Kees Cook Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/20181125185004.613357354@linutronix.de Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -829,13 +829,14 @@ static ssize_t l1tf_show_state(char *buf if (l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_EPT_DISABLED || (l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_NEVER && - cpu_smt_control == CPU_SMT_ENABLED)) + sched_smt_active())) { return sprintf(buf, "%s; VMX: %s\n", L1TF_DEFAULT_MSG, l1tf_vmx_states[l1tf_vmx_mitigation]); + } return sprintf(buf, "%s; VMX: %s, SMT %s\n", L1TF_DEFAULT_MSG, l1tf_vmx_states[l1tf_vmx_mitigation], - cpu_smt_control == CPU_SMT_ENABLED ? "vulnerable" : "disabled"); + sched_smt_active() ? "vulnerable" : "disabled"); } #else static ssize_t l1tf_show_state(char *buf)