Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753111AbeADTKN (ORCPT + 1 other); Thu, 4 Jan 2018 14:10:13 -0500 Received: from mga06.intel.com ([134.134.136.31]:11730 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751957AbeADTKM (ORCPT ); Thu, 4 Jan 2018 14:10:12 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,315,1511856000"; d="scan'208";a="18248632" Subject: Re: [PATCH 0/7] IBRS patch series To: Justin Forbes Cc: Thomas Gleixner , Andy Lutomirski , Linus Torvalds , Greg KH , Dave Hansen , Andrea Arcangeli , Andi Kleen , Arjan Van De Ven , linux-kernel@vger.kernel.org References: From: Tim Chen Message-ID: <2c1e7299-56ea-07ec-8077-471f17ad3c79@linux.intel.com> Date: Thu, 4 Jan 2018 11:10:10 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On 01/04/2018 11:05 AM, Justin Forbes wrote: > On Thu, Jan 4, 2018 at 11:56 AM, Tim Chen wrote: >> This patch series enables the basic detection and usage of x86 indirect >> branch speculation feature. It enables the indirect branch restricted >> speculation (IBRS) on kernel entry and disables it on exit. >> It enumerates the indirect branch prediction barrier (IBPB). >> >> The x86 IBRS feature requires corresponding microcode support. >> It mitigates the variant 2 vulnerability described in >> https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html >> > > Are there plans to make the corresponding microcode support available? > The microcode patches should be released soon. Tim