Received: by 10.223.185.116 with SMTP id b49csp3280750wrg; Tue, 13 Feb 2018 00:01:28 -0800 (PST) X-Google-Smtp-Source: AH8x226+f/NSBlRFX22tjiGHYD5V/0+SEfuAFpySYOu3+dYSregs+P1f4WedxBL7UaBxP0moJHys X-Received: by 2002:a17:902:bf01:: with SMTP id bi1-v6mr345882plb.254.1518508888408; Tue, 13 Feb 2018 00:01:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518508888; cv=none; d=google.com; s=arc-20160816; b=eWjwxzQEFCpuAVS7mss85tCEYJTT9UUh9IQYI+vfW5bXgpWcqB47YbwsFOKtaPvqOr BdAiTWSiNaC0k2+BGygHCAdihoFO17FyPUFd8CG+O+IDylRbm+RBLvegNQOOTmlY9VqX A65OnL7TLSJVXRReKywQPduBQRHWmAVhpHVjO9p3wKRRHFIxKVsGDaqjbAcMyz1fXPIb ahL+XyNZyMQWLu42KhP2qo21hM91d1nn2NRe7hrbbmPvvwWvoMUzcB/wtzjZ+e+jJ66U Ef+f/oW8LUMv+cmqJ/5AA2NqLFdRB7y0EkJh+ylTjG+GwszB2OsBjIZh7/Vfj1fDm/Ub m3Rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=nZrSYDMyCeDwSK1LtC6kT1C14amgCipOfVKrt3Xs8H8=; b=HoNx1poKwYegusCJ115++jW96COnEUrXXHMlQ3IWoSxJ9yrBmH0kn2SrRVje/911u2 1pBHWR5KY0jhEBC6aMD+4Y4UcGIso1VmeAiNiRkWTf54ldCLQOVbdL31e0rFQtLG2ZAd 4AroxadgsWh7ykhBTQ0zPcIoOvXNS/PR2pVnfqwu5+DogWj5xM5YkmoA9uyGReB4Wgkm 1VGlFp5yIL8ZhsCkmi4nG398gVYdwLm3wSb6ta9uGEeRv9NvM1nYzGEDS7gCme5z4erw nda5N7zx/4qrURnhTY8D70dKzztJ8ixb4onDQCf7LXhdUJtFtsdI7ZuZ4d5DleLZjhNN i1/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=MSBIKsyS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z12si4436180pgs.167.2018.02.13.00.01.13; Tue, 13 Feb 2018 00:01:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=MSBIKsyS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933733AbeBMH7u (ORCPT + 99 others); Tue, 13 Feb 2018 02:59:50 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:50199 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933550AbeBMH7s (ORCPT ); Tue, 13 Feb 2018 02:59:48 -0500 Received: by mail-wm0-f68.google.com with SMTP id f71so14151631wmf.0; Mon, 12 Feb 2018 23:59:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=nZrSYDMyCeDwSK1LtC6kT1C14amgCipOfVKrt3Xs8H8=; b=MSBIKsySWwKAAo2MOuBl0m27zcA/PO+8fkDqTl7LYLe6AhGohRzWGzDAh/VYq7PhRz /KJGV3oBx0QHP8q2+gi5Z5k2uL+6ezTDJl6mtKH9vOYCi92hrE82zCe0T7bP4CRrhezx k1/raS/p1wW5VnKQ6OyqkHcuA8vBD82/4Ljp9+HS+Tb/t2+7JNproKtLWI9zQ7wUhQ/N 06PaR3FvA/RglOll16/1gcUpdkJJjSk4TdeGOZe2epZMSpFA6AMLvHLi1dqAyqxZI9n6 rGruVtzPdD1aXE8VxmnVNl6eQYbBP+zPtSZ35BNoze6oEv+NzlgKnFRsPOCdpTkN3+bU +gEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition :content-transfer-encoding:in-reply-to:user-agent; bh=nZrSYDMyCeDwSK1LtC6kT1C14amgCipOfVKrt3Xs8H8=; b=aOjlr/8K3PFUGGgOV5Txn6b4MWKQVBpYCAG83QPkVpZiPa6pTUc3uixtxdPpqhl0cb fC5NxGBUlCd4KUqhjLUPG9alk9srZ3G1LHbdOhyVAtW6nN9C/YB4/rs7gNSVNZ4EHvn2 EnaIMe7uCb6/ues8488YxezHqCA3GsZE08X+u2F2jA5Lqtxunch9rxKn5N2HEZy8mKj4 Jd2H8dGHkbEa3rORFSHCUPYxFM92GHijUeWPVTsx1lBZAeZaCjVJfVG8bOM+QlDswv6v yfCWH9kxDhdrJCBvPlEoPR0RwEOrM9Sjw41+gcxf4Jk3Hym+8fg4HLZfdFu7mmev8f96 H++g== X-Gm-Message-State: APf1xPB4Yy3RZOhN/0UiQ5dGLD9CreDVKbpuy4G4ojpyxHDy4xcNa2GX 9q7DtGAZOwFx5sqpdhzioS8= X-Received: by 10.28.209.206 with SMTP id i197mr429360wmg.102.1518508786787; Mon, 12 Feb 2018 23:59:46 -0800 (PST) Received: from gmail.com (2E8B0CD5.catv.pool.telekom.hu. [46.139.12.213]) by smtp.gmail.com with ESMTPSA id v191sm5940082wmf.25.2018.02.12.23.59.45 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 12 Feb 2018 23:59:46 -0800 (PST) Date: Tue, 13 Feb 2018 08:59:43 +0100 From: Ingo Molnar To: Paolo Bonzini Cc: David Woodhouse , tglx@linutronix.de, karahmed@amazon.de, sironi@amazon.de, x86@kernel.org, kvm@vger.kernel.org, torvalds@linux-foundation.org, linux-kernel@vger.kernel.org, bp@alien8.de, peterz@infradead.org, jmattson@google.com, rkrcmar@redhat.com, arjan.van.de.ven@intel.com, dave.hansen@intel.com Subject: Re: [PATCH v2 0/6] Spectre v2 updates Message-ID: <20180213075943.55em5k6ofg3bfebi@gmail.com> References: <1518305967-31356-1-git-send-email-dwmw@amazon.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Paolo Bonzini wrote: > On 11/02/2018 00:39, David Woodhouse wrote: > > Using retpoline ensures the kernel is safe because it doesn't contain > > any indirect branches, but firmware still can — and we make calls into > > firmware at runtime. Where the IBRS microcode support is available, use > > that before calling into firmware. > > > > While doing that, I noticed that we were calling C functions without > > telling the compiler about the call-clobbered registers. Stop that. > > > > This also contains the always_inline fix for the performance problem > > introduced by retpoline in KVM code, and fixes some other issues with > > the per-vCPU KVM handling for the SPEC_CTRL MSR. > > > > Finally, update the microcode blacklist to reflect the latest > > information from Intel. > > > > v2: Drop IBRS_ALL patch for the time being > > Add KVM MSR fixes (karahmed) > > Update microcode blacklist > > > > > > > > David Woodhouse (4): > > x86/speculation: Update Speculation Control microcode blacklist > > Revert "x86/speculation: Simplify > > indirect_branch_prediction_barrier()" > > KVM: x86: Reduce retpoline performance impact in > > slot_handle_level_range() > > x86/speculation: Use IBRS if available before calling into firmware > > > > KarimAllah Ahmed (2): > > X86/nVMX: Properly set spec_ctrl and pred_cmd before merging MSRs > > KVM/nVMX: Set the CPU_BASED_USE_MSR_BITMAPS if we have a valid L02 MSR > > bitmap > > > > arch/x86/include/asm/apm.h | 6 ++++++ > > arch/x86/include/asm/cpufeatures.h | 1 + > > arch/x86/include/asm/efi.h | 17 +++++++++++++++-- > > arch/x86/include/asm/nospec-branch.h | 32 ++++++++++++++++++++++++++++---- > > arch/x86/include/asm/processor.h | 3 --- > > arch/x86/kernel/cpu/bugs.c | 18 +++++++++++------- > > arch/x86/kernel/cpu/intel.c | 4 ---- > > arch/x86/kvm/mmu.c | 10 +++++----- > > arch/x86/kvm/vmx.c | 7 ++++--- > > drivers/watchdog/hpwdt.c | 3 +++ > > 10 files changed, 73 insertions(+), 28 deletions(-) > > > > Acked-by: Paolo Bonzini Thanks - I've added your Ack to the three KVM patches. Thanks, Ingo