Received: by 10.223.185.116 with SMTP id b49csp641527wrg; Sat, 10 Feb 2018 15:44:15 -0800 (PST) X-Google-Smtp-Source: AH8x227stDLCs/U6RocAI57Z3BgcU+CMakiadPYjeXHemE84hUAzJqzFvco/vGVj3AgsYXgMWacX X-Received: by 10.99.126.75 with SMTP id o11mr5891112pgn.97.1518306255470; Sat, 10 Feb 2018 15:44:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518306255; cv=none; d=google.com; s=arc-20160816; b=B0mG+HcMInexU8WzPDW6z+JxV/32AExDVgnQafunf8W0VfWeI1NTpe2MxMhrrSu8YA pnbrl6vI4WVlgQNMBTHY7kjZVx+vBaIdioTwzE0iCU02WRDPbV1dADs+XeAyjmwNpJ5K pvMPG1+lNQ+Rdz9rv2PvSx2oPCRH4g0KC9xn84jPMv9+XU8MMF0YqrZSg2l7j9iKFkgY vdlZ8ThoGa0mKw420G6JxSkLJmCRzmMWE4rlv/WQ3bKk+QfYTkXbJYzZ3pq0AqV8EuNS jvQHX/zzBSKEMELmi8DbVnfXfVV8DbR4i7VCMqIZcLST63NKyeDfhrUj9wt/TtN1UsTh w/lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:dkim-signature:arc-authentication-results; bh=eiesSkDvbOoh6MdGMNFXh6Tp7K0m5TWycPXl9EURyx4=; b=pVyaqoa5rneT7LZ6kM1MjnNgWeL/VTXDlav6/labSFOlB2b6YvsIdCBl9PvvVluEUk +56ne8AzTa49YB5xBluOuGqlj5E2uWL/d227ezx5vJ1/+xDMGk12LcjlsglPsHYai4cu vr575gc0IScTyxAnxtFLRREj0t7NMPdG6rFwZlx8z4z7WSRe8XeqTB0vOMdTabAeJr20 2uD6S0xVloSn/Pe3n0BZVxOcaX7ZT/XRlOqFW71bpDRIPUTId/0joVtqSaIXfxmXatfG C1q1o/xURZsSgbP6xlD3LegWgLd25bcj45AleiZfg4AchSak5LYa2v1bDlUHzZIDCUPH G1NA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=gzKAhUDU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m8si3233267pgn.343.2018.02.10.15.44.01; Sat, 10 Feb 2018 15:44:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=gzKAhUDU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753191AbeBJXlV (ORCPT + 99 others); Sat, 10 Feb 2018 18:41:21 -0500 Received: from smtp-fw-33001.amazon.com ([207.171.190.10]:60670 "EHLO smtp-fw-33001.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752926AbeBJXjs (ORCPT ); Sat, 10 Feb 2018 18:39:48 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.co.uk; i=@amazon.co.uk; q=dns/txt; s=amazon201209; t=1518305988; x=1549841988; h=from:to:subject:date:message-id:in-reply-to:references; bh=eiesSkDvbOoh6MdGMNFXh6Tp7K0m5TWycPXl9EURyx4=; b=gzKAhUDUo8bExA2cBeXU2rXuJQ3WZlL6sL3dLThrYfW0lOy5JnRty/4U nZD3wWbmVZO2YwFpvBV145Z5g0AW/QRJbLHIWwcFsgvUtLm4PjKCRRnqe hqYw1nTD19CdhrarMTtwqOkV8/zTG+6HMGtvwBVjW+Kjxcn+sUW1uP3vQ M=; X-IronPort-AV: E=Sophos;i="5.46,492,1511827200"; d="scan'208";a="719069391" Received: from sea3-co-svc-lb6-vlan2.sea.amazon.com (HELO email-inbound-relay-2b-a7fdc47a.us-west-2.amazon.com) ([10.47.22.34]) by smtp-border-fw-out-33001.sea14.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 10 Feb 2018 23:39:46 +0000 Received: from uc8d3ff76b9bc5848a9cc.ant.amazon.com (pdx2-ws-svc-lb17-vlan3.amazon.com [10.247.140.70]) by email-inbound-relay-2b-a7fdc47a.us-west-2.amazon.com (8.14.7/8.14.7) with ESMTP id w1ANdfCc021330 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 10 Feb 2018 23:39:43 GMT Received: from uc8d3ff76b9bc5848a9cc.ant.amazon.com (localhost [127.0.0.1]) by uc8d3ff76b9bc5848a9cc.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTP id w1ANdeWi031601; Sat, 10 Feb 2018 23:39:40 GMT Received: (from dwmw@localhost) by uc8d3ff76b9bc5848a9cc.ant.amazon.com (8.15.2/8.15.2/Submit) id w1ANddnb031584; Sat, 10 Feb 2018 23:39:39 GMT From: David Woodhouse To: tglx@linutronix.de, karahmed@amazon.de, sironi@amazon.de, x86@kernel.org, kvm@vger.kernel.org, torvalds@linux-foundation.org, pbonzini@redhat.com, linux-kernel@vger.kernel.org, bp@alien8.de, peterz@infradead.org, jmattson@google.com, rkrcmar@redhat.com, arjan.van.de.ven@intel.com, dave.hansen@intel.com Subject: [PATCH v2 2/6] Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()" Date: Sat, 10 Feb 2018 23:39:23 +0000 Message-Id: <1518305967-31356-3-git-send-email-dwmw@amazon.co.uk> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1518305967-31356-1-git-send-email-dwmw@amazon.co.uk> References: <1518305967-31356-1-git-send-email-dwmw@amazon.co.uk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 64e16720ea0879f8ab4547e3b9758936d483909b. We cannot call C functions like that, without marking all the call-clobbered registers as, well, clobbered. We might have got away with it for now because the __ibp_barrier() function was *fairly* unlikely to actually use any other registers. But no. Just no. Signed-off-by: David Woodhouse --- arch/x86/include/asm/nospec-branch.h | 13 +++++++++---- arch/x86/include/asm/processor.h | 3 --- arch/x86/kernel/cpu/bugs.c | 6 ------ 3 files changed, 9 insertions(+), 13 deletions(-) diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h index 4d57894..300cc15 100644 --- a/arch/x86/include/asm/nospec-branch.h +++ b/arch/x86/include/asm/nospec-branch.h @@ -164,10 +164,15 @@ static inline void vmexit_fill_RSB(void) static inline void indirect_branch_prediction_barrier(void) { - alternative_input("", - "call __ibp_barrier", - X86_FEATURE_USE_IBPB, - ASM_NO_INPUT_CLOBBER("eax", "ecx", "edx", "memory")); + asm volatile(ALTERNATIVE("", + "movl %[msr], %%ecx\n\t" + "movl %[val], %%eax\n\t" + "movl $0, %%edx\n\t" + "wrmsr", + X86_FEATURE_USE_IBPB) + : : [msr] "i" (MSR_IA32_PRED_CMD), + [val] "i" (PRED_CMD_IBPB) + : "eax", "ecx", "edx", "memory"); } #endif /* __ASSEMBLY__ */ diff --git a/arch/x86/include/asm/processor.h b/arch/x86/include/asm/processor.h index 513f960..99799fb 100644 --- a/arch/x86/include/asm/processor.h +++ b/arch/x86/include/asm/processor.h @@ -969,7 +969,4 @@ bool xen_set_default_idle(void); void stop_this_cpu(void *dummy); void df_debug(struct pt_regs *regs, long error_code); - -void __ibp_barrier(void); - #endif /* _ASM_X86_PROCESSOR_H */ diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index 71949bf..61152aa 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -337,9 +337,3 @@ ssize_t cpu_show_spectre_v2(struct device *dev, spectre_v2_module_string()); } #endif - -void __ibp_barrier(void) -{ - __wrmsr(MSR_IA32_PRED_CMD, PRED_CMD_IBPB, 0); -} -EXPORT_SYMBOL_GPL(__ibp_barrier); -- 2.7.4