Received: by 10.223.185.116 with SMTP id b49csp3737352wrg; Tue, 13 Feb 2018 07:02:51 -0800 (PST) X-Google-Smtp-Source: AH8x2241NW5tC6hjjdnsPIYqWBFzh6QS7XHaNYx3fpI+OMrDvgbOYZZNXVSlZZezodg9FdkScWHB X-Received: by 2002:a17:902:f:: with SMTP id 15-v6mr1358917pla.419.1518534171442; Tue, 13 Feb 2018 07:02:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518534171; cv=none; d=google.com; s=arc-20160816; b=cpq8Xg8vgyJQ48m8H5UmNFjfAhbJKLr3J13meULWu4/+w6EcXrrKWoJ8/zAn9nkDME hc8GOhqCBlObWy8kXHaLA8IEL46j2WRsLVyAIBB+gjtwnU0uqq6WrmZkM50ZsqdoPLWK 6T+3jsrlvYUmxMugSiZg/Yczn0dCNfZ6yk3KpXEhlBwYYJbnLasXUMRBb3C+ReR78Owy VY2+9btLXDoZCk2qvN519j3BoLA/Ds+AVjUFt6W0yffeNCNmFugAa97lNmUtWSyMn/Mw xOLA6U8AAIHMQhpLIiH25GuXj08X2bNj4tFzXn1faJnp8xpHJbrgAhWnDsaFavFeJcNG OCUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=uqOqDPT107L8Ke48yVrauwRF3M4VNBVIrTlaaHaU0Mg=; b=G2tAcGyBbb2YDE2+zQsF9PZwbaYpq82LvScWaOZtqzR19B9l6R5V/dwxy+3XgD8/XK pgWev+0cMMHBXoszy5w2763tzbc/O3Qw9DRGSxQvsAVQ0sEssxZHZtg+GupFV9Mfq9T8 z+AEbmecJkgpFbmiNCbiiFkWwXIhbJMCTYtLT1Rk0IqzKFByCaN/LxbmWXy9agWoV2Jn oGV2BMj4gPGqT1H1zpcYk+QcvTg//QnYVOKvbfRuelt87vCsasuFCMf9nWyCwqin8L7n GHU5VLXomms9pe8fM+Cln95XFwEp5y5mt7gaMMfP+z925D5FYAN0t1v5SJiKMkg3IEip uLAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f8si6557950pgq.761.2018.02.13.07.02.11; Tue, 13 Feb 2018 07:02:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965158AbeBMPAH (ORCPT + 99 others); Tue, 13 Feb 2018 10:00:07 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:45758 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965029AbeBMPAG (ORCPT ); Tue, 13 Feb 2018 10:00:06 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 5F899F32; Tue, 13 Feb 2018 15:00:05 +0000 (UTC) Date: Tue, 13 Feb 2018 16:00:07 +0100 From: Greg Kroah-Hartman To: Nick Lowe Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, David Woodhouse , Thomas Gleixner , Borislav Petkov , Dave Hansen , gnomes@lxorguk.ukuu.org.uk, ak@linux.intel.com, ashok.raj@intel.com, karahmed@amazon.de, arjan@linux.intel.com, torvalds@linux-foundation.org, peterz@infradead.org, Borislav Petkov , pbonzini@redhat.com, tim.c.chen@linux.intel.com Subject: Re: [PATCH 4.9 43/92] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown Message-ID: <20180213150007.GJ26982@kroah.com> References: <20180209133931.211869118@linuxfoundation.org> <20180209133934.259299920@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.3 (2018-01-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 13, 2018 at 01:34:07PM +0000, Nick Lowe wrote: > Hi, > > This does not seem to have subsumed the AMD specific code in > > x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown > Commit a8799fd14d9f7f385a5a5c86cde247caf4bb0320 > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?h=v4.9.81&id=a8799fd14d9f7f385a5a5c86cde247caf4bb0320 > > x86/kaiser: Check boottime cmdline params > Commit 8018307a45a90ab2eecfd03d48b7efb31707df37 > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/arch/x86/mm/kaiser.c?h=v4.9.75&id=8018307a45a90ab2eecfd03d48b7efb31707df37 > > Here, we can see: > > +skip: > + if (boot_cpu_data.x86_vendor == X86_VENDOR_AMD) > + goto disable; > > Refer to 4.9.81's kaiser.c > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/tree/arch/x86/mm/kaiser.c?h=v4.9.81 > > Also 4.4.115's kaiser.c > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/tree/arch/x86/mm/kaiser.c?h=v4.4.115 So, any hints on what you think should be the correct fix here? thanks, greg k-h