Received: by 10.213.65.68 with SMTP id h4csp496263imn; Fri, 23 Mar 2018 09:01:52 -0700 (PDT) X-Google-Smtp-Source: AG47ELsV7Bar5REyY/UbGsS/jC0mNSr19vvwQfU4WNmid5bv2nI8RqgoJXEVD7NSGw03etmx/xPX X-Received: by 10.101.99.149 with SMTP id h21mr19086150pgv.345.1521820912074; Fri, 23 Mar 2018 09:01:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521820912; cv=none; d=google.com; s=arc-20160816; b=csKYb+fXgu5RfPn2pDIUr2tyybiPP3XpgGnI0HrVsni7OjHPlKS9cDnni99IK0C5Rv gURDymieyO1bgQvC+n8WXiHyQL+a/ZuA8WWfqx6LPwFBecbQYEKi74S5AhuOqzZp+dLe z7n6WlMhMiiRrftGKLxXL9EAW2KvQ1gB2zsLLlpb4WeASaE4tCgBCyDT0OCig8up2peu towdZVw9vQyYJhw2sUiHSPC2+hMYMKDQEIVecyeLIkTfwGzhHIFsCGcubufqN9uS2z5E bb8TeN5ciUzhtXRwK9YnKK+CAdrFx44Gzbtd3nxRkGeZVnDDu5EIvwABSj6fYSrPvKTU mKEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :spamdiagnosticmetadata:spamdiagnosticoutput:content-language :accept-language:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=6xYqw4b0zbDeqeqfNnL7JOKdWTD68BHLHEVBbY+jLQ0=; b=I58VoseGi1NgLv8GXsue0d4D5VC5tVOlPL4d70EcGKjw0EyvhhvB/8FijQE4jVXMbU 24Oa2Pk2IAsJOhaG+IP5Y5CC1L3ESZIVl1tHciCC2O/ohOuevTcuBZUOjX1DDotUCc6p uv9SLnFoFepG1nDFqZbT6DDXZqd1Nkawp/Wy4r4ObeQA8DxbFNocRIV9RAWHGs5mxela SZLiaVCSoD9uIOAN2ngu8sapBFp0Va1w/+zrjIaf23k9Uq2EG4rpoimG2+aU6TqH1MiH b3HK6g0jaDkwMxhF/8I/WtehfXPz7Q0tAy5E7F5dZgwz0dbJpbOj9fDTR7JafjL3Xh3R qKNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nxp.com header.s=selector1 header.b=DvEH8A3H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k6-v6si8578492pll.391.2018.03.23.09.01.18; Fri, 23 Mar 2018 09:01:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nxp.com header.s=selector1 header.b=DvEH8A3H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752120AbeCWP75 (ORCPT + 99 others); Fri, 23 Mar 2018 11:59:57 -0400 Received: from mail-eopbgr20051.outbound.protection.outlook.com ([40.107.2.51]:64495 "EHLO EUR02-VE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751471AbeCWP7z (ORCPT ); Fri, 23 Mar 2018 11:59:55 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=6xYqw4b0zbDeqeqfNnL7JOKdWTD68BHLHEVBbY+jLQ0=; b=DvEH8A3HjvWe6pBKRoVVF3xUWIXAzB/yHfwPg/IVQGzOT8u84mYCVh5vMPB3zkejKzN7oHeEBIXmwcZVvZR0Poq6Jdfd1d98aYewXVfnS3rlhVK7hTqZeR4ylY7NVTmM5Ijxm5SHEC4wtl/tba1VBsJb9Km18fbndkl2kEjlR1s= Received: from HE1PR0401MB2634.eurprd04.prod.outlook.com (10.168.148.139) by HE1PR0401MB1804.eurprd04.prod.outlook.com (10.169.118.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.588.14; Fri, 23 Mar 2018 15:59:50 +0000 Received: from HE1PR0401MB2634.eurprd04.prod.outlook.com ([fe80::a1ea:96eb:737c:3b02]) by HE1PR0401MB2634.eurprd04.prod.outlook.com ([fe80::a1ea:96eb:737c:3b02%17]) with mapi id 15.20.0588.017; Fri, 23 Mar 2018 15:59:50 +0000 From: Diana Madalina Craciun To: Michal Suchanek , "linuxppc-dev@lists.ozlabs.org" CC: Kate Stewart , Madhavan Srinivasan , Mahesh Salgaonkar , Al Viro , Paul Mackerras , Michael Neuling , "Bryant G. Ly" , "Naveen N. Rao" , Daniel Axtens , Nicholas Piggin , =?iso-8859-1?Q?C=E9dric_Le_Goater?= , David Gibson , Greg Kroah-Hartman , "linux-kernel@vger.kernel.org" , Sergey Senozhatsky , Masami Hiramatsu , Andrew Donnellan , Philippe Ombredanne , Joe Perches , Oliver O'Halloran , Andrew Morton , "Tobin C. Harding" Subject: Re: [PATCH RFC rebase 9/9] powerpc/64: barrier_nospec: Add commandline trigger Thread-Topic: [PATCH RFC rebase 9/9] powerpc/64: barrier_nospec: Add commandline trigger Thread-Index: AQHTvJSv3hggio9YDU6ISyDW5QYSAw== Date: Fri, 23 Mar 2018 15:59:50 +0000 Message-ID: References: <1dcf7403042daddcdb8109f6b852b9bb9d768f89.1521141122.git.msuchanek@suse.de> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=diana.craciun@nxp.com; x-originating-ip: [86.34.165.90] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;HE1PR0401MB1804;7:DCLFSuULG85RZ+uIWOHOPMkDwINBACKwTZe5VaeN+F3TRn2Mxk1GL3e2/M13T976MBXjQ+/f66ub7TypEfKAWOKy7npgz7Zsm1qadv4mb8n756k5qKmLKZZuah2IbUtSCaAEgH3EYnWUXLBaU0PmqiVIoPAaFYNY6zXBbHSwSDNAPsXsADWJGAPzn0/Vk8yJnEw9vGRbMzP6CQRkMU4XUz9AWGrOQPsxPUYZPsRA8iIhDzqnDS3c1T1jSl/aiMJY x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 174cb0f9-0746-4f6e-c988-08d590d71c41 x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);SRVR:HE1PR0401MB1804; x-ms-traffictypediagnostic: HE1PR0401MB1804: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(3002001)(93006095)(93001095)(3231221)(944501327)(52105095)(6055026)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123558120)(20161123560045)(6072148)(201708071742011);SRVR:HE1PR0401MB1804;BCL:0;PCL:0;RULEID:;SRVR:HE1PR0401MB1804; x-forefront-prvs: 0620CADDF3 x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(396003)(376002)(39380400002)(366004)(39860400002)(346002)(189003)(199004)(66066001)(2900100001)(3280700002)(97736004)(305945005)(33656002)(68736007)(74316002)(6436002)(55016002)(9686003)(4326008)(446003)(26005)(53546011)(102836004)(6506007)(25786009)(39060400002)(7736002)(186003)(229853002)(14454004)(110136005)(81166006)(8676002)(3660700001)(8936002)(478600001)(76176011)(5250100002)(2906002)(86362001)(81156014)(54906003)(53936002)(7696005)(6246003)(316002)(5660300001)(7416002)(106356001)(99286004)(2501003)(6116002)(105586002)(3846002)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:HE1PR0401MB1804;H:HE1PR0401MB2634.eurprd04.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: O8+OllKFiiDbIhZT+GTJMaJBozzvJZgNUsM1s2w8R4eeV97LfErUWVj/QJoAbwidWxcupoqjfhamyhSv54sPFi7mzvUFSUQ4p2eKlYwTT2H6+PnIuiESY+ZmMtJ0M4ebQiQ+ZN3Xu48YFZuypEr65+p58UNBbuhC3r2mBtcoqYtFaOWYO3vt/yn4fkE9QqlBrOzwp16xG3evhC4ujcjngPDIQVwrVOHDRpxqhgqeXnvHIPHlk2NHeFKxZBOhqtCxnDykpIKojJV/8sWlCBBR+ezgFXYoRy54wwqKdBFKV5A3uLMi23bWVzAVW6eOo5taLqWe3SrVVH24tP/PU5qJzw== spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 174cb0f9-0746-4f6e-c988-08d590d71c41 X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Mar 2018 15:59:50.6735 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB1804 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/15/2018 9:34 PM, Michal Suchanek wrote:=0A= > Add commandline options spectre_v2 and nospectre_v2=0A= >=0A= > These are named same as similar x86 options regardless of actual effect= =0A= > to not require platform-specific configuration.=0A= >=0A= > Supported options:=0A= > nospectre_v2 or spectre_v2=3Doff - speculation barrier not used=0A= > spectre_v2=3Don or spectre_v2=3Dauto - speculation barrier used=0A= =0A= Why the barrier is enabled only for spectre variant 2 mitigations? It=0A= can be used as well for variant 1 mitigations. In fact I am not sure=0A= that the places where it is used fall under spectre 2 at all.=0A= =0A= >=0A= > Changing the settings after boot is not supported and VM migration may=0A= > change requirements so auto is same as on.=0A= >=0A= > Based on s390 implementation=0A= >=0A= > Signed-off-by: Michal Suchanek =0A= > ---=0A= > arch/powerpc/kernel/setup_64.c | 22 ++++++++++++++++++++++=0A= > 1 file changed, 22 insertions(+)=0A= >=0A= > diff --git a/arch/powerpc/kernel/setup_64.c b/arch/powerpc/kernel/setup_6= 4.c=0A= > index f6678a7b6114..c74e656265df 100644=0A= > --- a/arch/powerpc/kernel/setup_64.c=0A= > +++ b/arch/powerpc/kernel/setup_64.c=0A= > @@ -840,6 +840,28 @@ static int __init handle_no_pti(char *p)=0A= > }=0A= > early_param("nopti", handle_no_pti);=0A= > =0A= > +static int __init nospectre_v2_setup_early(char *str)=0A= > +{=0A= > + no_nospec =3D true;=0A= > + return 0;=0A= > +}=0A= > +early_param("nospectre_v2", nospectre_v2_setup_early);=0A= > +=0A= > +static int __init spectre_v2_setup_early(char *str)=0A= > +{=0A= > + if (str && !strncmp(str, "on", 2))=0A= > + no_nospec =3D false;=0A= > +=0A= > + if (str && !strncmp(str, "off", 3))=0A= > + no_nospec =3D true;=0A= > +=0A= > + if (str && !strncmp(str, "auto", 4))=0A= > + no_nospec =3D false;=0A= > +=0A= > + return 0;=0A= > +}=0A= > +early_param("spectre_v2", spectre_v2_setup_early);=0A= > +=0A= > static void do_nothing(void *unused)=0A= > {=0A= > /*=0A= =0A= Thanks,=0A= =0A= Diana=0A= =0A=