From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AH8x226n7W4/sQfsyFoBKKnwoStnXog+yhzE0sVoqgiJK+vFQSdzQhicRwSo4kFqivYfXzJbY93+ ARC-Seal: i=1; a=rsa-sha256; t=1517070287; cv=none; d=google.com; s=arc-20160816; b=F1wdbytl4/5NZ0MHVqS81mqUA8RB5Lt7Xc6+KB8rmkpvQaN8chfcFUgSAXGShG8WDB mppfLq1Vs0Wug2AWyc1K/9MtUhseuBbbaWX5uuZbtkrZQrcRLXUygVaScDaOWiMMe94X 1WFEdUgZ7IM9/85easfcgh6KJ7lBYBzCwvCGDpMxtg9kUSquhRC7oNr2jRtHYVRkUcrU hHD7ewd/hj9NV/fyHGVc90dYnwwdhfotPe2UF81BCqU6WVtqDzP4Z6WtYD7Nu6cXT+01 Mo4q9hZOU3h03Gy2ypgCfb+Dple/6HMT/zd/IsIAWRuX1QTo1kgN+8sYKR6cq2381C5T DkMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=message-id:date:subject:to:from:dkim-signature :arc-authentication-results; bh=T9UXqeIlUKCZsdq2nTn8zgZOpamUIkiYxdB1QBuIMpE=; b=uRRhGHcrcmNeQtvZxCWTJ80STDrkPJ7nDDnRkxgJbEqyyvZqG305MHNC5gLzC9oilr x4VRPyp6BnQJ2VRrpGft4yYL3+TFNeH6+ke7ozz+SZcmiPA37L4q8b4xNbpgz32iMtO3 cDM9BcKBoVnm9Rv3ZvZghcoq+sCY3xBJmTkuF63p9F1HX7VFjELqS4XQ/2GswzqRHBR+ kEy1C8ubw2mO73PR2sCEDI1aTdmbLgKfo5TtPhO8+biuEIu8gl4fyRvkKtCLa5gVLm7g d0J4h431QW8qbO5BDcuSwQdy1LA/QzzbTrViuucaBVf0SxodvU6bUYl7KpIMc6OrsPpT JvTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=edf8ISVF; spf=pass (google.com: domain of prvs=558ede6c8=dwmw@amazon.com designates 72.21.198.25 as permitted sender) smtp.mailfrom=prvs=558ede6c8=dwmw@amazon.com; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=edf8ISVF; spf=pass (google.com: domain of prvs=558ede6c8=dwmw@amazon.com designates 72.21.198.25 as permitted sender) smtp.mailfrom=prvs=558ede6c8=dwmw@amazon.com; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk X-IronPort-AV: E=Sophos;i="5.46,422,1511827200"; d="scan'208";a="705555699" From: David Woodhouse To: arjan@linux.intel.com, tglx@linutronix.de, karahmed@amazon.de, x86@kernel.org, linux-kernel@vger.kernel.org, tim.c.chen@linux.intel.com, bp@alien8.de, peterz@infradead.org, pbonzini@redhat.com, ak@linux.intel.com, torvalds@linux-foundation.org, gregkh@linux-foundation.org, dave.hansen@intel.com Subject: [PATCH 0/3] Speculation CPU feature cleanups Date: Sat, 27 Jan 2018 16:24:31 +0000 Message-Id: <1517070274-12128-1-git-send-email-dwmw@amazon.co.uk> X-Mailer: git-send-email 2.7.4 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: =?utf-8?q?1590763494169910921?= X-GMAIL-MSGID: =?utf-8?q?1590763494169910921?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: Fix up the cpufeatures so that only the hardware features are visible in /proc/cpuinfo. as "ibpb", "ibrs" and "stibp". The virtual features, and software flags which are only in X86_FEATURE_* because that's the only way to use alternatives, get masked away. We don't *want* to show that stuff to all users in /proc/cpuinfo; it's available to a more restricted audience in the sysfs vulnerability files instead. (We should probably remove PTI too, but that can be done separately.) Boris also wants to put things out of line to reduce the size of the ALTERNATIVE blocks and simplify backports to older kernels, so tweak and apply his patches for that too. Borislav Petkov (2): x86/retpoline: Simplify vmexit_fill_RSB() x86/speculation: Simplify indirect_branch_prediction_barrier() David Woodhouse (1): x86/cpufeatures: Clean up Spectre v2 related CPUID flags arch/x86/entry/entry_32.S | 3 +- arch/x86/entry/entry_64.S | 3 +- arch/x86/include/asm/asm-prototypes.h | 3 ++ arch/x86/include/asm/cpufeatures.h | 18 ++++---- arch/x86/include/asm/nospec-branch.h | 83 +++++------------------------------ arch/x86/include/asm/processor.h | 3 ++ arch/x86/kernel/cpu/bugs.c | 11 +++-- arch/x86/kernel/cpu/intel.c | 31 ++++++++----- arch/x86/lib/Makefile | 1 + arch/x86/lib/retpoline.S | 56 +++++++++++++++++++++++ 10 files changed, 116 insertions(+), 96 deletions(-) -- 2.7.4