Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp581336imb; Fri, 1 Mar 2019 08:23:06 -0800 (PST) X-Google-Smtp-Source: APXvYqzxV7v6XcJHqK72wtlrnTI7kZ2BJ+pLHH/2vCeDSY4kVR2u2dm7SD70fTPiY9vh2BrtNwSc X-Received: by 2002:a63:6605:: with SMTP id a5mr5611388pgc.372.1551457386817; Fri, 01 Mar 2019 08:23:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551457386; cv=none; d=google.com; s=arc-20160816; b=e70p0V4WqXmhXQszaECxyB3Vrm4VL5VMcUDwkbppvoySs5oNCsL07JrE1LlPHN1VaQ WX/3J5Y3FHDZckBI6fbAaymffGcQNjUQanMZuS27pkLBpXMspoZyw3S2tFA/8bRp1457 txoRH6Q4j9Z38fZvl90JLDb/9+LbBQytcNmTJXPg5xRqaK0AIalUC104yFx7kRe3OpkY 4+ObjGe9KdJL4MaGwliuY4iujt05uozU0FOr+yrCDSLNV4oWrUtpLMCoyks34rfcB1IC Ngr43tXet2RUn9gS8RGkjgMBWkacXFTUZIxoxD+YSX0wqvq9K6M1MdDHwgPIX+PbAnsx YWuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=AHr0LM6u3mbWnuhxkywr3L19ZowymZfSzy1BJzLYxRE=; b=RH38ZqkYlFcB4e4vEau7ezwxoR45hlR8nmmGrwplX4+91//Qkg+z/FzmgPZ6Mj15PZ qE2Ehk07XOpioZsUPZJhc25BmN0RYV/3u6o4EVry1CMRGr59ak/NdPcyFXTi7suV4iO4 GYaQ1+39Mz5Kv6UvL/N1Ji6EnttGxeatX8zBfo5Gu50jx0x6wge/KJMChz2nrg7J9/4v deXFYbvBBWHkNMfBvML7BQ7PS6/1/A3De9d//OVz9z0YtgqEFd5S2ExMDm2GMoFBQieY 081XZJZQMVFE6nA0iP1HqVn/e7Kf0t/eRFQ5hfllIkqB79bh6XRjFeQcnhJnJm06en/9 yt3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a16si19172960pgw.75.2019.03.01.08.22.51; Fri, 01 Mar 2019 08:23:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389002AbfCAQU4 (ORCPT + 99 others); Fri, 1 Mar 2019 11:20:56 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:38308 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725966AbfCAQU4 (ORCPT ); Fri, 1 Mar 2019 11:20:56 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9846F80D; Fri, 1 Mar 2019 08:20:55 -0800 (PST) Received: from arrakis.emea.arm.com (arrakis.cambridge.arm.com [10.1.196.78]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 850033F575; Fri, 1 Mar 2019 08:20:53 -0800 (PST) Date: Fri, 1 Mar 2019 16:20:51 +0000 From: Catalin Marinas To: Jeremy Linton Cc: Andre Przywara , linux-arm-kernel@lists.infradead.org, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, Dave.Martin@arm.com, shankerd@codeaurora.org, julien.thierry@arm.com, mlangsdo@redhat.com, stefan.wahren@i2e.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 03/10] arm64: add sysfs vulnerability show for meltdown Message-ID: <20190301162050.GB28687@arrakis.emea.arm.com> References: <20190227010544.597579-1-jeremy.linton@arm.com> <20190227010544.597579-4-jeremy.linton@arm.com> <9cfb9cff-6a26-fff7-9374-82eea0f63a21@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <9cfb9cff-6a26-fff7-9374-82eea0f63a21@arm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 01, 2019 at 10:12:09AM -0600, Jeremy Linton wrote: > On 3/1/19 1:11 AM, Andre Przywara wrote: > > On 2/26/19 7:05 PM, Jeremy Linton wrote: > > > Display the mitigation status if active, otherwise > > > assume the cpu is safe unless it doesn't have CSV3 > > > and isn't in our whitelist. > > > > > > Signed-off-by: Jeremy Linton > > > --- > > > ? arch/arm64/kernel/cpufeature.c | 47 ++++++++++++++++++++++++++-------- > > > ? 1 file changed, 37 insertions(+), 10 deletions(-) > > > > > > diff --git a/arch/arm64/kernel/cpufeature.c > > > b/arch/arm64/kernel/cpufeature.c > > > index f6d84e2c92fe..d31bd770acba 100644 > > > --- a/arch/arm64/kernel/cpufeature.c > > > +++ b/arch/arm64/kernel/cpufeature.c > > > @@ -944,7 +944,7 @@ has_useable_cnp(const struct > > > arm64_cpu_capabilities *entry, int scope) > > > ????? return has_cpuid_feature(entry, scope); > > > ? } > > > -#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 > > > +static bool __meltdown_safe = true; > > > ? static int __kpti_forced; /* 0: not forced, >0: forced on, <0: > > > forced off */ > > > ? static bool unmap_kernel_at_el0(const struct > > > arm64_cpu_capabilities *entry, > > > @@ -963,6 +963,16 @@ static bool unmap_kernel_at_el0(const struct > > > arm64_cpu_capabilities *entry, > > > ????????? { /* sentinel */ } > > > ????? }; > > > ????? char const *str = "command line option"; > > > +??? bool meltdown_safe; > > > + > > > +??? meltdown_safe = is_midr_in_range_list(read_cpuid_id(), > > > kpti_safe_list); > > > + > > > +??? /* Defer to CPU feature registers */ > > > +??? if (has_cpuid_feature(entry, scope)) > > > +??????? meltdown_safe = true; > > > + > > > +??? if (!meltdown_safe) > > > +??????? __meltdown_safe = false; > > > ????? /* > > > ?????? * For reasons that aren't entirely clear, enabling KPTI on Cavium > > > @@ -974,6 +984,11 @@ static bool unmap_kernel_at_el0(const struct > > > arm64_cpu_capabilities *entry, > > > ????????? __kpti_forced = -1; > > > ????? } > > > +??? if (!IS_ENABLED(CONFIG_UNMAP_KERNEL_AT_EL0)) { > > > +??????? pr_info_once("kernel page table isolation disabled by > > > CONFIG\n"); > > > +??????? return false; > > > +??? } > > > + > > > ????? /* Forced? */ > > > ????? if (__kpti_forced) { > > > ????????? pr_info_once("kernel page table isolation forced %s by %s\n", > > > @@ -985,14 +1000,10 @@ static bool unmap_kernel_at_el0(const struct > > > arm64_cpu_capabilities *entry, > > > ????? if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) > > > ????????? return kaslr_offset() > 0; > > > -??? /* Don't force KPTI for CPUs that are not vulnerable */ > > > -??? if (is_midr_in_range_list(read_cpuid_id(), kpti_safe_list)) > > > -??????? return false; > > > - > > > -??? /* Defer to CPU feature registers */ > > > -??? return !has_cpuid_feature(entry, scope); > > > +??? return !meltdown_safe; > > > ? } > > > +#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 > > > ? static void > > > ? kpti_install_ng_mappings(const struct arm64_cpu_capabilities *__unused) > > > ? { > > > @@ -1022,6 +1033,13 @@ kpti_install_ng_mappings(const struct > > > arm64_cpu_capabilities *__unused) > > > ????? return; > > > ? } > > > +#else > > > +static void > > > +kpti_install_ng_mappings(const struct arm64_cpu_capabilities *__unused) > > > +{ > > > +} > > > +#endif??? /* CONFIG_UNMAP_KERNEL_AT_EL0 */ > > > + > > > ? static int __init parse_kpti(char *str) > > > ? { > > > @@ -1035,7 +1053,6 @@ static int __init parse_kpti(char *str) > > > ????? return 0; > > > ? } > > > ? early_param("kpti", parse_kpti); > > > -#endif??? /* CONFIG_UNMAP_KERNEL_AT_EL0 */ > > > ? #ifdef CONFIG_ARM64_HW_AFDBM > > > ? static inline void __cpu_enable_hw_dbm(void) > > > @@ -1286,7 +1303,6 @@ static const struct arm64_cpu_capabilities > > > arm64_features[] = { > > > ????????? .field_pos = ID_AA64PFR0_EL0_SHIFT, > > > ????????? .min_field_value = ID_AA64PFR0_EL0_32BIT_64BIT, > > > ????? }, > > > -#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 > > > ????? { > > > ????????? .desc = "Kernel page table isolation (KPTI)", > > > ????????? .capability = ARM64_UNMAP_KERNEL_AT_EL0, > > > @@ -1302,7 +1318,6 @@ static const struct arm64_cpu_capabilities > > > arm64_features[] = { > > > ????????? .matches = unmap_kernel_at_el0, > > > ????????? .cpu_enable = kpti_install_ng_mappings, > > > ????? }, > > > -#endif > > > ????? { > > > ????????? /* FP/SIMD is not implemented */ > > > ????????? .capability = ARM64_HAS_NO_FPSIMD, > > > @@ -2063,3 +2078,15 @@ static int __init enable_mrs_emulation(void) > > > ? } > > > ? core_initcall(enable_mrs_emulation); > > > + > > > +ssize_t cpu_show_meltdown(struct device *dev, struct > > > device_attribute *attr, > > > +??????? char *buf) > > > +{ > > > +??? if (arm64_kernel_unmapped_at_el0()) > > > +??????? return sprintf(buf, "Mitigation: KPTI\n"); > > > + > > > +??? if (__meltdown_safe) > > > +??????? return sprintf(buf, "Not affected\n"); > > > > Shall those two checks be swapped? So it doesn't report about a KPTI > > mitigation if the CPU is safe, but we enable KPTI because of KASLR > > having enabled it? Or is that a different knob? > > Hmmm, I think having it this way reflects the fact that the machine is > mitigated independent of whether it needed it. The force on case is similar. > The machine may not have needed the mitigation but it was forced on. So is this patchset about showing vulnerabilities _and_ mitigations or just one of them? -- Catalin