]> git.proxmox.com Git - pve-kernel.git/blame - patches/kernel/0198-x86-mm-pti-Share-cpu_entry_area-with-user-space-page.patch
KPTI: add follow-up fixes
[pve-kernel.git] / patches / kernel / 0198-x86-mm-pti-Share-cpu_entry_area-with-user-space-page.patch
CommitLineData
321d628a
FG
1From 0e6d8e0cd5b1439d97f56445aef57d8839580b33 Mon Sep 17 00:00:00 2001
2From: Andy Lutomirski <luto@kernel.org>
3Date: Mon, 4 Dec 2017 15:07:45 +0100
e4cdf2a5 4Subject: [PATCH 198/241] x86/mm/pti: Share cpu_entry_area with user space page
321d628a
FG
5 tables
6MIME-Version: 1.0
7Content-Type: text/plain; charset=UTF-8
8Content-Transfer-Encoding: 8bit
9
10CVE-2017-5754
11
12Share the cpu entry area so the user space and kernel space page tables
13have the same P4D page.
14
15Signed-off-by: Andy Lutomirski <luto@kernel.org>
16Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
17Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
18Cc: Borislav Petkov <bp@alien8.de>
19Cc: Brian Gerst <brgerst@gmail.com>
20Cc: Dave Hansen <dave.hansen@linux.intel.com>
21Cc: David Laight <David.Laight@aculab.com>
22Cc: Denys Vlasenko <dvlasenk@redhat.com>
23Cc: Eduardo Valentin <eduval@amazon.com>
24Cc: Greg KH <gregkh@linuxfoundation.org>
25Cc: H. Peter Anvin <hpa@zytor.com>
26Cc: Josh Poimboeuf <jpoimboe@redhat.com>
27Cc: Juergen Gross <jgross@suse.com>
28Cc: Linus Torvalds <torvalds@linux-foundation.org>
29Cc: Peter Zijlstra <peterz@infradead.org>
30Cc: Will Deacon <will.deacon@arm.com>
31Cc: aliguori@amazon.com
32Cc: daniel.gruss@iaik.tugraz.at
33Cc: hughd@google.com
34Cc: keescook@google.com
35Signed-off-by: Ingo Molnar <mingo@kernel.org>
36(cherry picked from commit f7cfbee91559ca7e3e961a00ffac921208a115ad)
37Signed-off-by: Andy Whitcroft <apw@canonical.com>
38Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
39(cherry picked from commit 6e8142de3a6e84a82a421b66a74ba37976912282)
40Signed-off-by: Fabian Grünbichler <f.gruenbichler@proxmox.com>
41---
42 arch/x86/mm/pti.c | 25 +++++++++++++++++++++++++
43 1 file changed, 25 insertions(+)
44
45diff --git a/arch/x86/mm/pti.c b/arch/x86/mm/pti.c
46index d58bcee470fc..59290356f19f 100644
47--- a/arch/x86/mm/pti.c
48+++ b/arch/x86/mm/pti.c
49@@ -264,6 +264,29 @@ pti_clone_pmds(unsigned long start, unsigned long end, pmdval_t clear)
50 }
51 }
52
53+/*
54+ * Clone a single p4d (i.e. a top-level entry on 4-level systems and a
55+ * next-level entry on 5-level systems.
56+ */
57+static void __init pti_clone_p4d(unsigned long addr)
58+{
59+ p4d_t *kernel_p4d, *user_p4d;
60+ pgd_t *kernel_pgd;
61+
62+ user_p4d = pti_user_pagetable_walk_p4d(addr);
63+ kernel_pgd = pgd_offset_k(addr);
64+ kernel_p4d = p4d_offset(kernel_pgd, addr);
65+ *user_p4d = *kernel_p4d;
66+}
67+
68+/*
69+ * Clone the CPU_ENTRY_AREA into the user space visible page table.
70+ */
71+static void __init pti_clone_user_shared(void)
72+{
73+ pti_clone_p4d(CPU_ENTRY_AREA_BASE);
74+}
75+
76 /*
77 * Initialize kernel page table isolation
78 */
79@@ -273,4 +296,6 @@ void __init pti_init(void)
80 return;
81
82 pr_info("enabled\n");
83+
84+ pti_clone_user_shared();
85 }
86--
872.14.2
88