Received: by 10.223.176.46 with SMTP id f43csp1882480wra; Sun, 21 Jan 2018 06:33:50 -0800 (PST) X-Google-Smtp-Source: AH8x225xqGGGMc5kpiiJX1XNfsIXQ7xADsc1kOWsYWURjK25AkjtT7I/+IIaYUwb+Yt6rOKS4Yox X-Received: by 10.98.1.199 with SMTP id 190mr5491113pfb.124.1516545230332; Sun, 21 Jan 2018 06:33:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516545230; cv=none; d=google.com; s=arc-20160816; b=XNfC13I54ddg2PRV3+TvkTQPtI5ifgHekkMfQYIqixAwLZRYkdYowQML0K7EW/urGS Fe70qPy4yuzskgTKQKcgmnIven5dm7dqtxox021SofaGZU33JwhBwK30fx5ABa3W+fjH wNzd4Z2atBLlli6gjX1lIcXNyx82CQjiNUjlJhPKTE6ODdz4KzTuXF3ZF+vWsVS1xL4g O4wRAkfQAVBzS9bgC5OTNdXaRk9oEhl7gDSpQwEGt+WcZhBXRsAoGXRm1w/Ci+MzS8U+ GgiNppSfEqnMfOKVNPSTxW/JayglhBSLcBJ1B2MM/T+n5Ai6D61rVWxXiDVSJoj6W1jP IQ+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=u4gf6E6tqR+0gkiJZTFYWoqKibU+lnZk/mVDcBRSGOg=; b=LF0hVNmgTdQBKsPI7V5sNHxWfKo6OdFSo4vTLs/8kNbRiYW9MpsQqgktKXS+RY16Bh FOXrJ4pHTu59pk1tO8ToyvNbgYVUlgLxxSvWjNU7iG0o2OgdT7BK4682j3pR03owhxCa xJt0hZWYiLdkNG/t3AE+vTraPpZA9WmHAwAmnO0xqfRlQoHc1jby2L3o185Kx45JfpGW juCkaM4InQ9JH3qjZo8JjCzUIhyJ9b4FRKjj48ZQ7Cy3clgu0cWnjlqaCCKqqBR1KPxe cBB6rcVMmzh4Ud7a26Yf1SEnH1zAYx8kYTSb6aoQLij4x+MJ0TByZo/RATSkP78FuVlQ H1SQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j10si12364564pgs.467.2018.01.21.06.33.20; Sun, 21 Jan 2018 06:33:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751144AbeAUOcq (ORCPT + 99 others); Sun, 21 Jan 2018 09:32:46 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:54026 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750817AbeAUOcp (ORCPT ); Sun, 21 Jan 2018 09:32:45 -0500 Received: from p4fea5f09.dip0.t-ipconnect.de ([79.234.95.9] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1edGcA-0000eI-4n; Sun, 21 Jan 2018 15:28:54 +0100 Date: Sun, 21 Jan 2018 15:31:28 +0100 (CET) From: Thomas Gleixner To: KarimAllah Ahmed cc: linux-kernel@vger.kernel.org, Andi Kleen , Andrea Arcangeli , Andy Lutomirski , Arjan van de Ven , Ashok Raj , Asit Mallick , Borislav Petkov , Dan Williams , Dave Hansen , David Woodhouse , Greg Kroah-Hartman , "H . Peter Anvin" , Ingo Molnar , Janakarajan Natarajan , Joerg Roedel , Jun Nakajima , Laura Abbott , Linus Torvalds , Masami Hiramatsu , Paolo Bonzini , Peter Zijlstra , =?ISO-8859-2?Q?Radim_Kr=E8m=E1=F8?= , Tim Chen , Tom Lendacky , kvm@vger.kernel.org, x86@kernel.org Subject: Re: [RFC 05/10] x86/speculation: Add basic IBRS support infrastructure In-Reply-To: <1516476182-5153-6-git-send-email-karahmed@amazon.de> Message-ID: References: <1516476182-5153-1-git-send-email-karahmed@amazon.de> <1516476182-5153-6-git-send-email-karahmed@amazon.de> User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 20 Jan 2018, KarimAllah Ahmed wrote: > From: David Woodhouse > > Not functional yet; just add the handling for it in the Spectre v2 > mitigation selection, and the X86_FEATURE_IBRS flag which will control > the code to be added in later patches. > > Also take the #ifdef CONFIG_RETPOLINE from around the RSB-stuffing; IBRS > mode will want that too. > > For now we are auto-selecting IBRS on Skylake. We will probably end up > changing that but for now let's default to the safest option. > > XX: Do we want a microcode blacklist? Oh yes, we want a microcode blacklist. Ideally we refuse to load the affected microcode in the first place and if its already loaded then at least avoid to use the borked features. PR texts promising that Intel is committed to transparency in this matter are not sufficient. Intel, please provide the facts, i.e. a proper list of micro codes and affected SKUs, ASAP. Thanks, tglx