From: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> To: speck@linutronix.de Subject: [MODERATED] Re: [PATCH v8 3/5] NX 3 Date: Thu, 31 Oct 2019 17:24:21 -0700 [thread overview] Message-ID: <20191101002350.GA26083@guptapadev.amr> (raw) In-Reply-To: <1572564827-26288-4-git-send-email-pbonzini@redhat.com> On Fri, Nov 01, 2019 at 12:33:45AM +0100, speck for Paolo Bonzini wrote: > From: Paolo Bonzini <pbonzini@redhat.com> > Subject: [PATCH v8 3/5] kvm: mmu: ITLB_MULTIHIT mitigation > > + kvm.nx_huge_pages= > + [KVM] Controls the sw workaround for bug > + X86_BUG_ITLB_MULTIHIT. > + force : Always deploy workaround. > + off : Default. Never deploy workaround. off is not the default in the code, so the default should be "auto" here. > + auto : Deploy workaround based on presence of > + X86_BUG_ITLB_MULTIHIT. Also mitigations=off is not disabling this mitigation. Below patch does that when mitigations=off and kvm.nx_huge_pages=auto. --- From: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Date: Wed, 30 Oct 2019 21:28:24 -0700 Subject: [PATCH] kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT Problem: The global mitigation knob mitigations=off does not turn off X86_BUG_ITLB_MULTIHIT mitigation. Fix: Turn off the mitigation when ITLB_MULTIHIT mitigation mode is "auto" and mitigations are turned off globally via cmdline mitigations=off. Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> --- Documentation/admin-guide/kernel-parameters.txt | 6 ++++++ arch/x86/kvm/mmu.c | 10 ++++++++-- 2 files changed, 14 insertions(+), 2 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index c667844c1c42..422da241a4cb 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2653,6 +2653,12 @@ ssbd=force-off [ARM64] l1tf=off [X86] mds=off [X86] + kvm.nx_huge_pages=off [X86]. + + Exceptions: + This does not have any effect on + kvm.nx_huge_pages when + kvm.nx_huge_pages=force. auto (default) Mitigate all CPU vulnerabilities, but leave SMT diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index e6a5748a12d5..529589a42afb 100644 --- a/arch/x86/kvm/mmu.c +++ b/arch/x86/kvm/mmu.c @@ -6250,6 +6250,12 @@ static void kvm_set_mmio_spte_mask(void) kvm_mmu_set_mmio_spte_mask(mask, mask, ACC_WRITE_MASK | ACC_USER_MASK); } +static bool get_nx_auto_mode(void) +{ + /* Return true when CPU has the bug, and mitigations are ON */ + return boot_cpu_has_bug(X86_BUG_ITLB_MULTIHIT) && !cpu_mitigations_off(); +} + static void __set_nx_huge_pages(bool val) { nx_huge_pages = itlb_multihit_kvm_mitigation = val; @@ -6266,7 +6272,7 @@ static int set_nx_huge_pages(const char *val, const struct kernel_param *kp) else if (sysfs_streq(val, "force")) new_val = 1; else if (sysfs_streq(val, "auto")) - new_val = boot_cpu_has_bug(X86_BUG_ITLB_MULTIHIT); + new_val = get_nx_auto_mode(); else if (strtobool(val, &new_val) < 0) return -EINVAL; @@ -6296,7 +6302,7 @@ int kvm_mmu_module_init(void) int ret = -ENOMEM; if (nx_huge_pages == -1) - __set_nx_huge_pages(boot_cpu_has_bug(X86_BUG_ITLB_MULTIHIT)); + __set_nx_huge_pages(get_nx_auto_mode()); /* * MMU roles use union aliasing which is, generally speaking, an -- 2.20.1
next prev parent reply other threads:[~2019-11-01 0:30 UTC|newest] Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-10-31 23:33 [MODERATED] [PATCH v8 0/5] NX 0 Paolo Bonzini 2019-10-31 23:33 ` [MODERATED] [PATCH v8 1/5] NX 1 Paolo Bonzini 2019-10-31 23:33 ` [MODERATED] [PATCH v8 2/5] NX 2 Paolo Bonzini 2019-10-31 23:33 ` [MODERATED] [PATCH v8 3/5] NX 3 Paolo Bonzini 2019-11-01 0:24 ` Pawan Gupta [this message] 2019-11-01 7:07 ` [MODERATED] " Paolo Bonzini 2019-11-01 18:38 ` mark gross 2019-11-01 18:51 ` Tyler Hicks 2019-11-01 20:36 ` mark gross 2019-11-02 7:36 ` Paolo Bonzini 2019-11-01 14:58 ` Tyler Hicks 2019-11-01 15:43 ` [MODERATED] [PATCH] NX build fixup Tyler Hicks 2019-11-01 16:31 ` [MODERATED] " Josh Poimboeuf 2019-11-01 20:39 ` [MODERATED] [PATCH v2] " Tyler Hicks 2019-11-01 21:14 ` [MODERATED] " Josh Poimboeuf 2019-11-01 21:38 ` [MODERATED] Re: [PATCH v2] NX mitigations=off fix Pawan Gupta 2019-10-31 23:33 ` [MODERATED] [PATCH v8 4/5] NX 4 Paolo Bonzini 2019-10-31 23:33 ` [MODERATED] [PATCH v8 5/5] NX 5 Paolo Bonzini
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20191101002350.GA26083@guptapadev.amr \ --to=pawan.kumar.gupta@linux.intel.com \ --cc=speck@linutronix.de \ --subject='[MODERATED] Re: [PATCH v8 3/5] NX 3' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).