Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5176211imm; Wed, 12 Sep 2018 02:10:06 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZSXuAXB1GTa3+jyJhIrLIA1SaZr0e9z39SPfiVyEvnHwgUoANuCYk3FZ9pDoE2Q+eHlqm3 X-Received: by 2002:a62:1a8f:: with SMTP id a137-v6mr1123401pfa.190.1536743406060; Wed, 12 Sep 2018 02:10:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536743406; cv=none; d=google.com; s=arc-20160816; b=Qso+O/Id6PQwXkz++uaJ4GwAD8T8Hogc9MBG/x+/XuP6Z0tg8GWApoveABW3A1e+a2 nA+46Y6t2U8oH93sdWWyZTjPYuQQWaA4MgCHUeiIsGITae7iDbhw8qjgNVmQlbcJWjR+ zWL6luoqJb/HvJJjcaW/DUhjwai0wivYTxcjl9XwPQnHf+m1gkleBY3+i1zZF4nKfPad Wvhq/exl27jWmXBTm943WlnMGBCRnCiVCfmIZe2LcHXnWAffkCrdZA9rYX1T6PXvjp+5 P33ymoHFkhu1x4ykB5qILcROT8l3slkgWEuja/7FiJ8oj6qcfzHnKjdiL+wOVFLSdRtj uqqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=LuXT8QdB3A88nAhsN/VRkrUZXameHJIav59CNrLNcRQ=; b=kgaM8YLbT3MO4AqAfwoxPWk8fHY+atjXs1JBJF92JKGvcs6ayslYhqo7OPB5gXumJ1 C4LYzP44c9cbja+NI3sJfuLm80VbobzrWVw/lfM9E6ncrwyxvjSCNZTysi4JbT+fYyM8 1zHbQHDDFlX+Jloe1C7kzL3YE/NeExMxDe5KN35F9+M0qJnw+BGKXUY2Urm7Nk7C4oUw H2pWQoKm1i9WSQTJwrddCXwHxevLZwD4XEhHFoqDJhGDFkwUq9G0uZNNKIGUJxCOAs+Q J3/L7fE7sZvLGz5ZFrqPiDcXlhJJeiAvY6ZmlvcRYgYQfKcVurR4QzHbmPRr5xkPMC+N O20Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5-v6si464238pgd.400.2018.09.12.02.09.50; Wed, 12 Sep 2018 02:10:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727838AbeILOLm (ORCPT + 99 others); Wed, 12 Sep 2018 10:11:42 -0400 Received: from mx2.suse.de ([195.135.220.15]:49158 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727051AbeILOLm (ORCPT ); Wed, 12 Sep 2018 10:11:42 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D8EA0AE78; Wed, 12 Sep 2018 09:08:04 +0000 (UTC) Date: Wed, 12 Sep 2018 11:08:04 +0200 (CEST) From: Jiri Kosina To: Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , "Woodhouse, David" , Andi Kleen , Tim Chen , "Schaufler, Casey" cc: linux-kernel@vger.kernel.org, x86@kernel.org Subject: [PATCH v6 3/3] x86/speculation: Propagate information about RSB filling mitigation to sysfs In-Reply-To: Message-ID: References: User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jiri Kosina If spectrev2 mitigation has been enabled, we're filling RSB on context switch in order to protect from various classess of spectrev2 attacks. If this mitigation is enabled, say so in sysfs for spectrev2. Signed-off-by: Jiri Kosina --- arch/x86/kernel/cpu/bugs.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index 6bc76bdf5a0a..ee46dcbae5fa 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -875,10 +875,11 @@ static ssize_t cpu_show_common(struct device *dev, struct device_attribute *attr case X86_BUG_SPECTRE_V2: mutex_lock(&spec_ctrl_mutex); - ret = sprintf(buf, "%s%s%s%s%s\n", spectre_v2_strings[spectre_v2_enabled], + ret = sprintf(buf, "%s%s%s%s%s%s\n", spectre_v2_strings[spectre_v2_enabled], boot_cpu_has(X86_FEATURE_USE_IBPB) ? ", IBPB" : "", boot_cpu_has(X86_FEATURE_USE_IBRS_FW) ? ", IBRS_FW" : "", (x86_spec_ctrl_base & SPEC_CTRL_STIBP) ? ", STIBP" : "", + boot_cpu_has(X86_FEATURE_RSB_CTXSW) ? ", RSB filling" : "", spectre_v2_module_string()); mutex_unlock(&spec_ctrl_mutex); return ret; -- Jiri Kosina SUSE Labs