From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AH8x224oQZUzTq/WElx6o1HeTDLAr4iYF3UPBcxRC1SjKNVLAt5GJiii2jVoc7sWAFmQGipZqUG0 ARC-Seal: i=1; a=rsa-sha256; t=1516896888; cv=none; d=google.com; s=arc-20160816; b=yaVPm6woq2BfiKNCadfN3uRO3rmstgQ7WHUpNG1Vv3QHNlHOnPcnNafuSX74fSff0S G1DH6AYhxNmShsdpPEbaeFJixihm+Mx9iPUpB00fz9vKh/7/vfp7t79KlRiv1IBYeuYE 9KfV8te9zj+7yCNbvFkcegxbYYyB00hYpFgjUcMvbRKN0AJ9pwCTykodHgIZXXam1pgA IAQNXOfj0u/u/EHMfmX+SxsggrVgZSw3mjH6vV85IYmeqADuwGZqAm4qyp22W3GhBrAh fWFMlNGoe4jOYZviVSqpYPlCqEU8ISrB1D03AzWTxa4oA41hJd5fHoxmFjCojHVodRTT GvRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:to:from :dkim-signature:arc-authentication-results; bh=i0PeowlGk0XvN6XSWgsIg/5drQvHp3sZL2ZFPCjjWek=; b=qsz2Daf5ToP75ndUrauIZTvr+fa3WO64eAQUhIiJSQmOiC2+xJr5Hu6gXq97rfYLb/ KCE+mIbVMOuFvc/sfWsC4T0u4KBHoQvrlrEjr7kpkGLiZ1qX913KbWYRIxYQ7JckraKy 2IgvYyqmhjO9Cz0fGJUwOH5DmzIe4sY2vzz9BnrrV7YaXo2M8YT4XTnDMFl+SQxWb76J AqCF4eZMnMlcfbQmF+luGsW5G8KLlpZyZy7/reQYViC60d5PRP3VgwZdMQHmopNZBupv LLdIBYeyhy+C+1yXqDsWNA236iLGlq72vhlGYRFDwvrNeLN37T6524qjN3yO2RLjFPlq AN9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=UR5Lqpub; spf=pass (google.com: domain of prvs=556dd1d58=dwmw@amazon.com designates 207.171.184.29 as permitted sender) smtp.mailfrom=prvs=556dd1d58=dwmw@amazon.com; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=UR5Lqpub; spf=pass (google.com: domain of prvs=556dd1d58=dwmw@amazon.com designates 207.171.184.29 as permitted sender) smtp.mailfrom=prvs=556dd1d58=dwmw@amazon.com; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk X-IronPort-AV: E=Sophos;i="5.46,412,1511827200"; d="scan'208";a="589885255" From: David Woodhouse To: arjan@linux.intel.com, tglx@linutronix.de, karahmed@amazon.de, x86@kernel.org, linux-kernel@vger.kernel.org, tim.c.chen@linux.intel.com, bp@alien8.de, peterz@infradead.org, pbonzini@redhat.com, ak@linux.intel.com, torvalds@linux-foundation.org, gregkh@linux-foundation.org, dave.hansen@intel.com, gnomes@lxorguk.ukuu.org.uk, ashok.raj@intel.com, mingo@kernel.org Subject: [PATCH v5 7/7] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support Date: Thu, 25 Jan 2018 16:14:15 +0000 Message-Id: <1516896855-7642-8-git-send-email-dwmw@amazon.co.uk> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1516896855-7642-1-git-send-email-dwmw@amazon.co.uk> References: <1516896855-7642-1-git-send-email-dwmw@amazon.co.uk> X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: =?utf-8?q?1590581671523311714?= X-GMAIL-MSGID: =?utf-8?q?1590581671523311714?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: Expose indirect_branch_prediction_barrier() for use in subsequent patches. [karahmed: remove the special-casing of skylake for using IBPB (wtf?), switch to using ALTERNATIVES instead of static_cpu_has] [dwmw2: set up ax/cx/dx in the asm too so it gets NOP'd out] Signed-off-by: Thomas Gleixner Signed-off-by: KarimAllah Ahmed Signed-off-by: David Woodhouse --- arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/nospec-branch.h | 13 +++++++++++++ arch/x86/kernel/cpu/bugs.c | 7 +++++++ 3 files changed, 21 insertions(+) diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x86/include/asm/cpufeatures.h index ae3212f..6b988278 100644 --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -207,6 +207,7 @@ #define X86_FEATURE_RETPOLINE_AMD ( 7*32+13) /* AMD Retpoline mitigation for Spectre variant 2 */ #define X86_FEATURE_INTEL_PPIN ( 7*32+14) /* Intel Processor Inventory Number */ +#define X86_FEATURE_IBPB ( 7*32+16) /* Using Indirect Branch Prediction Barrier */ #define X86_FEATURE_MBA ( 7*32+18) /* Memory Bandwidth Allocation */ #define X86_FEATURE_RSB_CTXSW ( 7*32+19) /* Fill RSB on context switches */ diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h index 4ad4108..34e384c 100644 --- a/arch/x86/include/asm/nospec-branch.h +++ b/arch/x86/include/asm/nospec-branch.h @@ -218,5 +218,18 @@ static inline void vmexit_fill_RSB(void) #endif } +static inline void indirect_branch_prediction_barrier(void) +{ + asm volatile(ALTERNATIVE("", + "movl %[msr], %%ecx\n\t" + "movl %[val], %%eax\n\t" + "movl $0, %%edx\n\t" + "wrmsr", + X86_FEATURE_IBPB) + : : [msr] "i" (MSR_IA32_PRED_CMD), + [val] "i" (PRED_CMD_IBPB) + : "eax", "ecx", "edx", "memory"); +} + #endif /* __ASSEMBLY__ */ #endif /* __NOSPEC_BRANCH_H__ */ diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index 390b3dc..96548ff 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -249,6 +249,13 @@ static void __init spectre_v2_select_mitigation(void) setup_force_cpu_cap(X86_FEATURE_RSB_CTXSW); pr_info("Filling RSB on context switch\n"); } + + /* Initialize Indirect Branch Prediction Barrier if supported */ + if (boot_cpu_has(X86_FEATURE_SPEC_CTRL) || + boot_cpu_has(X86_FEATURE_AMD_PRED_CMD)) { + setup_force_cpu_cap(X86_FEATURE_IBPB); + pr_info("Enabling Indirect Branch Prediction Barrier\n"); + } } #undef pr_fmt -- 2.7.4