From: "Huang, Kai" <kai.huang@intel.com>
To: "kvm@vger.kernel.org" <kvm@vger.kernel.org>,
"rkrcmar@redhat.com" <rkrcmar@redhat.com>,
"pbonzini@redhat.com" <pbonzini@redhat.com>
Cc: "thomas.lendacky@amd.com" <thomas.lendacky@amd.com>,
"Christopherson, Sean J" <sean.j.christopherson@intel.com>,
"brijesh.singh@amd.com" <brijesh.singh@amd.com>,
"tglx@linutronix.de" <tglx@linutronix.de>,
"junaids@google.com" <junaids@google.com>,
"bp@alien8.de" <bp@alien8.de>, "hpa@zytor.com" <hpa@zytor.com>
Subject: Re: [PATCH] kvm: x86: Fix L1TF mitigation for shadow MMU
Date: Wed, 5 Jun 2019 02:27:21 +0000 [thread overview]
Message-ID: <1559701571.9892.2.camel@intel.com> (raw)
In-Reply-To: <b3bca1c1-ed7d-6027-1e91-12b6a243c2c7@redhat.com>
On Wed, 2019-05-15 at 23:16 +0200, Paolo Bonzini wrote:
> On 03/05/19 10:40, Kai Huang wrote:
> > Currently KVM sets 5 most significant bits of physical address bits
> > reported by CPUID (boot_cpu_data.x86_phys_bits) for nonpresent or
> > reserved bits SPTE to mitigate L1TF attack from guest when using shadow
> > MMU. However for some particular Intel CPUs the physical address bits
> > of internal cache is greater than physical address bits reported by
> > CPUID.
> >
> > Use the kernel's existing boot_cpu_data.x86_cache_bits to determine the
> > five most significant bits. Doing so improves KVM's L1TF mitigation in
> > the unlikely scenario that system RAM overlaps the high order bits of
> > the "real" physical address space as reported by CPUID. This aligns with
> > the kernel's warnings regarding L1TF mitigation, e.g. in the above
> > scenario the kernel won't warn the user about lack of L1TF mitigation
> > if x86_cache_bits is greater than x86_phys_bits.
> >
> > Also initialize shadow_nonpresent_or_rsvd_mask explicitly to make it
> > consistent with other 'shadow_{xxx}_mask', and opportunistically add a
> > WARN once if KVM's L1TF mitigation cannot be applied on a system that
> > is marked as being susceptible to L1TF.
> >
> > Reviewed-by: Sean Christopherson <sean.j.christopherson@intel.com>
> > Signed-off-by: Kai Huang <kai.huang@linux.intel.com>
> > ---
> >
> > This patch was splitted from old patch I sent out around 2 weeks ago:
> >
> > kvm: x86: Fix several SPTE mask calculation errors caused by MKTME
> >
> > After reviewing with Sean Christopherson it's better to split this out,
> > since the logic in this patch is independent. And maybe this patch should
> > also be into stable.
> >
> > ---
> > arch/x86/kvm/mmu.c | 18 +++++++++++++-----
> > 1 file changed, 13 insertions(+), 5 deletions(-)
> >
> > diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
> > index b0899f175db9..1b2380e0060f 100644
> > --- a/arch/x86/kvm/mmu.c
> > +++ b/arch/x86/kvm/mmu.c
> > @@ -511,16 +511,24 @@ static void kvm_mmu_reset_all_pte_masks(void)
> > * If the CPU has 46 or less physical address bits, then set an
> > * appropriate mask to guard against L1TF attacks. Otherwise, it is
> > * assumed that the CPU is not vulnerable to L1TF.
> > + *
> > + * Some Intel CPUs address the L1 cache using more PA bits than are
> > + * reported by CPUID. Use the PA width of the L1 cache when possible
> > + * to achieve more effective mitigation, e.g. if system RAM overlaps
> > + * the most significant bits of legal physical address space.
> > */
> > - low_phys_bits = boot_cpu_data.x86_phys_bits;
> > - if (boot_cpu_data.x86_phys_bits <
> > + shadow_nonpresent_or_rsvd_mask = 0;
> > + low_phys_bits = boot_cpu_data.x86_cache_bits;
> > + if (boot_cpu_data.x86_cache_bits <
> > 52 - shadow_nonpresent_or_rsvd_mask_len) {
> > shadow_nonpresent_or_rsvd_mask =
> > - rsvd_bits(boot_cpu_data.x86_phys_bits -
> > + rsvd_bits(boot_cpu_data.x86_cache_bits -
> > shadow_nonpresent_or_rsvd_mask_len,
> > - boot_cpu_data.x86_phys_bits - 1);
> > + boot_cpu_data.x86_cache_bits - 1);
> > low_phys_bits -= shadow_nonpresent_or_rsvd_mask_len;
> > - }
> > + } else
> > + WARN_ON_ONCE(boot_cpu_has_bug(X86_BUG_L1TF));
> > +
> > shadow_nonpresent_or_rsvd_lower_gfn_mask =
> > GENMASK_ULL(low_phys_bits - 1, PAGE_SHIFT);
> > }
> >
>
> Queued, thanks.
Hi Paolo,
Thanks for taking the patch. I am not quite sure but maybe this patch should also go into stable?
Sean, do you have comments?
Thanks,
-Kai
>
> Paolo
prev parent reply other threads:[~2019-06-05 2:27 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-05-03 8:40 [PATCH] kvm: x86: Fix L1TF mitigation for shadow MMU Kai Huang
2019-05-13 3:31 ` Huang, Kai
2019-05-15 21:16 ` Paolo Bonzini
2019-06-05 2:27 ` Huang, Kai [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1559701571.9892.2.camel@intel.com \
--to=kai.huang@intel.com \
--cc=bp@alien8.de \
--cc=brijesh.singh@amd.com \
--cc=hpa@zytor.com \
--cc=junaids@google.com \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=rkrcmar@redhat.com \
--cc=sean.j.christopherson@intel.com \
--cc=tglx@linutronix.de \
--cc=thomas.lendacky@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox