Received: by 10.223.148.5 with SMTP id 5csp7698784wrq; Thu, 18 Jan 2018 08:29:52 -0800 (PST) X-Google-Smtp-Source: ACJfBouZMmOuquwwFhwf/hvDgWojU6wD1rT7jkJdyIWyUC+j+y+vA+f0j/zrs2QTRZtdC+PWwpLu X-Received: by 10.98.152.149 with SMTP id d21mr36062852pfk.108.1516292992159; Thu, 18 Jan 2018 08:29:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516292992; cv=none; d=google.com; s=arc-20160816; b=SxGmbdRTL56uuLBZ3GRf5orLZylI1P3HEE57XAmE0hUCK1oip+sJC9P15+i3o5czcI nYskWe79F3yXk1bUShWFqv6pE1L56QabvPDqiCHMVf+NP5JtHtTMDIU2NLMg46tr7R2e EfjgHFaLOi2u4rtXe/Wn9+5B1bOxK5RmHU5hzwB9XsbydogD/hm5dXIoU8iPeksDG7KK nimiorA7TXBfl0vxm4IOcEps394Ng2uxEdlx4KOcotJYWMXGNOttKNw9VvWJAW1WER+G Ae69R1wS6S+7wvNgHKAhrEOta1Vun7okZoes3V7tlPQJUYZZIGTouztpCpTlJ8zIFh5U D33A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=IvBkEyejATqW43q5ciBbuq834n7pZ1uwemXejTJOeT0=; b=T8HQkWjIYNREtO+1AQ4AzMgnD+Yz7t69ralk+oJgzsXDa6AA6A5oxuJITl4kPpg248 jqza4JzXGTp6itUezMvJs5sAlQqOViN0jorEN0d7IyB2RXxtr+z3FbDtbiMYZqBINYyr rabbFPTICQZ5GdtLVtZF01nxzig48INSOWnnHtHFcL8geTy/10t/xCZQvUUWcPFvHteX iC2XjId9hNGHiTdU3qjm2EatAyLhpFjtIiIBH4FmHDZr73cZAUpUjl2NoO6u2zNLai/S LH0Oe4g6mm8I6PeTf6G0EC4Wd4rYmsaMxsZfPfH7QfBk83G/wo3iVJM4Nu3P80XFtglZ JTKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u14si6577185pgo.179.2018.01.18.08.29.38; Thu, 18 Jan 2018 08:29:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933017AbeARPyc (ORCPT + 99 others); Thu, 18 Jan 2018 10:54:32 -0500 Received: from mail.skyhub.de ([5.9.137.197]:59364 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932855AbeARPxv (ORCPT ); Thu, 18 Jan 2018 10:53:51 -0500 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Rc6pUVENCLMO; Thu, 18 Jan 2018 16:53:50 +0100 (CET) Received: from pd.tnic (p200300EC2BD5BA00B5C826ACEDBFE2F7.dip0.t-ipconnect.de [IPv6:2003:ec:2bd5:ba00:b5c8:26ac:edbf:e2f7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 05A111EC0116; Thu, 18 Jan 2018 16:53:50 +0100 (CET) Date: Thu, 18 Jan 2018 16:53:46 +0100 From: Borislav Petkov To: Thomas Gleixner Cc: LKML , x86@kernel.org, Peter Zijlstra , David Woodhouse Subject: Re: [PATCH] x86/mce: Make machine check speculation protected Message-ID: <20180118155346.ilukgmnqvhtr2pfz@pd.tnic> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 18, 2018 at 04:28:26PM +0100, Thomas Gleixner wrote: > The machine check idtentry uses an indirect branch directly from the low > level code. This evades the speculation protection. > > Replace it by a direct call into C code and issue the indirect call there > so the compiler can apply the proper speculation protection. > > Signed-off-by: Thomas Gleixner > --- > arch/x86/entry/entry_64.S | 2 +- > arch/x86/include/asm/traps.h | 1 + > arch/x86/kernel/cpu/mcheck/mce.c | 5 +++++ > 3 files changed, 7 insertions(+), 1 deletion(-) > > --- a/arch/x86/entry/entry_64.S > +++ b/arch/x86/entry/entry_64.S > @@ -1264,7 +1264,7 @@ idtentry async_page_fault do_async_page_ > #endif > > #ifdef CONFIG_X86_MCE > -idtentry machine_check has_error_code=0 paranoid=1 do_sym=*machine_check_vector(%rip) > +idtentry machine_check do_mce has_error_code=0 paranoid=1 > #endif > > /* > --- a/arch/x86/include/asm/traps.h > +++ b/arch/x86/include/asm/traps.h > @@ -88,6 +88,7 @@ dotraplinkage void do_simd_coprocessor_e > #ifdef CONFIG_X86_32 > dotraplinkage void do_iret_error(struct pt_regs *, long); > #endif > +dotraplinkage void do_mce(struct pt_regs *, long); > > static inline int get_si_code(unsigned long condition) > { > --- a/arch/x86/kernel/cpu/mcheck/mce.c > +++ b/arch/x86/kernel/cpu/mcheck/mce.c > @@ -1785,6 +1785,11 @@ static void unexpected_machine_check(str > void (*machine_check_vector)(struct pt_regs *, long error_code) = > unexpected_machine_check; > > +dotraplinkage void do_mce(struct pt_regs *regs, long error_code) > +{ > + machine_check_vector(regs, error_code); > +} > + > /* > * Called for each booted CPU to set up machine checks. > * Must be called with preempt off: Reviewed-by: Borislav Petkov -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.