From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AH8x226GbZnvDiaSVgK1AMXmd4Kfrq0v7yINKUcLLktQRVuPadtAHixAUXAO5JsSfMbK5zYormJn ARC-Seal: i=1; a=rsa-sha256; t=1516528164; cv=none; d=google.com; s=arc-20160816; b=Io+1ahDMLrx38hyrAFLV7t0CptGoQjgqFpPf/VuS8b+RvvzS5IryHKgmAK6d5Rq5de RXlxxFvZ8yaJBlFqCjDbOoZ7QNeHfvHGKICYLMvFPAUkikWwqlOcFNXsAbfpc170x1jf Tqb4fPkQRn/TzyZCGMnNm3T9L/JCIm4SBF+6S6572kqEB2fn+yp3mfJu2ML6tgbUl72q ADWzStxUqfWfs+5IseU5INPDs4szNozBdQsppgP+07HsmfDItgfGPHFujO4bBbb1lB1X Z9xwxZa6cXuEpRPs2w0MwS94FEbL1iLWSVqGUSeKJlwvQ03PyL2shfR1Nv0J8c+0I+Jj aImg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=message-id:date:subject:to:from:dkim-signature :arc-authentication-results; bh=Hy6Z3ssly/69fZB1FWFAVIRyp8kXql76WbQb2qoQiIU=; b=tGTs197JP2sNJV+bzwEDFvQNDT+1locOME3ttUxDOHWg/IFSDENaE/fJD5VQSys8ov Vitz0EiSM/szoFi/V3MSvia3RxqVgxEzbFZw2jOrSmY05RhuRf9nc2XFrbAIarQE5HCA FtUq81GxtQxLfO20HONhm0R9pNspsPL0tEThkHV16du5BdelsIm8jZX6z14bTecCPfYV lESPMjbExWzWGsyVeSor4/s29XBav9OSLqFrnpaA8hH1BxMBAWrgBJRP2MYps7JxRLex hzNEh3t7wCeD0PE27gvdHXgfxXxG3P90455RHaWtBmCpCbdSUpjbbr3neHbAzdNtIRpC hERA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=um+FXYG8; spf=pass (google.com: domain of prvs=552b621e3=dwmw@amazon.com designates 207.171.190.10 as permitted sender) smtp.mailfrom=prvs=552b621e3=dwmw@amazon.com; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=um+FXYG8; spf=pass (google.com: domain of prvs=552b621e3=dwmw@amazon.com designates 207.171.190.10 as permitted sender) smtp.mailfrom=prvs=552b621e3=dwmw@amazon.com; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk X-IronPort-AV: E=Sophos;i="5.46,390,1511827200"; d="scan'208";a="716493962" From: David Woodhouse To: arjan@linux.intel.com, tglx@linutronix.de, karahmed@amazon.de, x86@kernel.org, linux-kernel@vger.kernel.org, tim.c.chen@linux.intel.com, bp@alien8.de, peterz@infradead.org, pbonzini@redhat.com, ak@linux.intel.com, torvalds@linux-foundation.org, gregkh@linux-foundation.org Subject: [PATCH v2 0/8] Speculation Control feature support, IBPB Date: Sun, 21 Jan 2018 09:49:01 +0000 Message-Id: <1516528149-9370-1-git-send-email-dwmw@amazon.co.uk> X-Mailer: git-send-email 2.7.4 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: =?utf-8?q?1590195036762657996?= X-GMAIL-MSGID: =?utf-8?q?1590195036762657996?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: Combining my previous patchset for purely adding the feature and MSR definitions, with the first four patches that Karim sent out which were purely about enabling IBPB. This gives us a full retpoline-based mitigation for Spectre variant 2, and the IBRS option can come later. I expect further discussion of the final patch to tweak precisely when we use IBPB in context switch. --- v2: Fix STIPB/STIBP typo Fix error in AMD CPUID bit definition (0x8000_0008 EBX[12]) Ashok Raj (1): x86/kvm: Add IBPB support David Woodhouse (4): x86/cpufeatures: Add Intel feature bits for Speculation Control x86/cpufeatures: Add AMD feature bits for Prediction Command x86/msr: Add definitions for new speculation control MSRs x86/pti: Do not enable PTI on fixed Intel processors Thomas Gleixner (2): x86/speculation: Add basic support for IBPB x86/speculation: Use Indirect Branch Prediction Barrier in context switch Tim Chen (1): x86/mm: Only flush indirect branches when switching into non dumpable process arch/x86/include/asm/cpufeature.h | 7 +++++-- arch/x86/include/asm/cpufeatures.h | 14 +++++++++++--- arch/x86/include/asm/disabled-features.h | 3 ++- arch/x86/include/asm/msr-index.h | 11 +++++++++++ arch/x86/include/asm/nospec-branch.h | 16 ++++++++++++++++ arch/x86/include/asm/required-features.h | 3 ++- arch/x86/kernel/cpu/bugs.c | 7 +++++++ arch/x86/kernel/cpu/common.c | 10 ++++++++-- arch/x86/kernel/cpu/scattered.c | 3 +-- arch/x86/kvm/svm.c | 14 ++++++++++++++ arch/x86/kvm/vmx.c | 11 +++++++++++ arch/x86/mm/tlb.c | 21 ++++++++++++++++++++- 12 files changed, 108 insertions(+), 12 deletions(-) -- 2.7.4