Received: by 10.223.185.116 with SMTP id b49csp3826071wrg; Tue, 13 Feb 2018 08:19:15 -0800 (PST) X-Google-Smtp-Source: AH8x225debDnWya7lYvaF/PPSL3Kaive8H8bqxR7wveKrYNak6cYs5qcMbaP8BhAg+Stg/sNjBUV X-Received: by 10.98.98.194 with SMTP id w185mr1757834pfb.9.1518538754992; Tue, 13 Feb 2018 08:19:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518538754; cv=none; d=google.com; s=arc-20160816; b=xjG5QuWJ6OyA6f7ooby4I7uvDvko51cYzhsSVFGax0tkGgEJET3Uf95ChskhAPtfo9 rxjL1J008su+o8EVGnqFNTatd6s/e24n33ZS1ItCxAyJOJ56UiZXbT+VWKcFM7FEu1g6 pvyhAHOcsdcV46bcr4rle3CXGb4nSNDWmQlSqDZOJmbdAyx2BarLwksgqVmXwpGX7sIQ MWDezsk6LRhM4pkvfVnP3YaRd8IiIQjhZE+fmonUKiGV/q8RxrZ0nwwN/CF1DIMI0e/0 uOT1X6so7hA+ItKoBCuT5o7boRGdqSydOYHXUiSBzxlb7l2zeNdULn7d4MwTWsdnNXyv jK9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:cc:references:to:subject:arc-authentication-results; bh=IvYg9PghR3Bb4dPvGZv512dge0G9bdkhTRswGm6tie8=; b=a0HOz1YVjicBF+PkwEwFCxGxx6iZuofe07wBL2gRPzo+6/cTjmkJGqEIPFsvm3nwmL C0vz4e7Aq2eqnfcQKGO3vyDHdNGalysehMnp7aa3fk7yRNT8BybRF/elnYC7Dl6oH7j1 GwWj1r8tBqcjlAIvyrL67p5RQFS2A1OKxmQmKtcFWkloN5UB+umaKbeMknRQr8boSkSM sH6n1MFlQ5ktBZLvOtmXwWVEk5jjIpEshhVHgJpBcFELscI8hAIUyFWDJb9kPyDIazjs Lju9WdXT1BrTGV0sxERA4foXTH82DrSN7E2VSU53yIi6gq67/VVeakIzbzn0DbHWC0PS pPBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k193si5511931pge.377.2018.02.13.08.19.00; Tue, 13 Feb 2018 08:19:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934657AbeBMQSW (ORCPT + 99 others); Tue, 13 Feb 2018 11:18:22 -0500 Received: from mga03.intel.com ([134.134.136.65]:44621 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933927AbeBMQSU (ORCPT ); Tue, 13 Feb 2018 11:18:20 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Feb 2018 08:18:19 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,507,1511856000"; d="scan'208";a="26965983" Received: from unknown (HELO [10.24.9.14]) ([10.24.9.14]) by FMSMGA003.fm.intel.com with ESMTP; 13 Feb 2018 08:18:19 -0800 Subject: Re: [PATCH 4.9 43/92] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown To: Andi Kleen , Arjan van de Ven References: <20180209133931.211869118@linuxfoundation.org> <20180209133934.259299920@linuxfoundation.org> <20180213150007.GJ26982@kroah.com> <20180213155603.GK10945@tassilo.jf.intel.com> Cc: Greg Kroah-Hartman , Nick Lowe , linux-kernel@vger.kernel.org, stable@vger.kernel.org, David Woodhouse , Thomas Gleixner , Borislav Petkov , gnomes@lxorguk.ukuu.org.uk, ashok.raj@intel.com, karahmed@amazon.de, torvalds@linux-foundation.org, peterz@infradead.org, Borislav Petkov , pbonzini@redhat.com, tim.c.chen@linux.intel.com From: Dave Hansen Message-ID: <0dfbc8c1-87a4-ae51-2fac-bd4c2f674f83@intel.com> Date: Tue, 13 Feb 2018 08:18:17 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180213155603.GK10945@tassilo.jf.intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/13/2018 07:56 AM, Andi Kleen wrote: > On Tue, Feb 13, 2018 at 07:09:44AM -0800, Arjan van de Ven wrote: >>> So, any hints on what you think should be the correct fix here? >> the patch sure looks correct to me, it now has a nice table for CPU IDs >> including all of AMD (and soon hopefully the existing Intel ones that are not exposed to meltdown) > I don't think the table is nice, it's a white list that would need > to be maintained forever. On Intel, we have that RDCL_NO bit in the ARCH_CAPABILITIES MSR going forward to show that we are not vulnerable. So, at least for Intel we don't need to add new models forever.