Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8097763imu; Tue, 4 Dec 2018 02:58:44 -0800 (PST) X-Google-Smtp-Source: AFSGD/U8sJ+e0SI+ozaHMe7USEchqI8FwSD6GmBpVJinP9OhtmAxlTKG+dsT+1Pexp2BQxS2FXr9 X-Received: by 2002:a63:f615:: with SMTP id m21mr16814445pgh.428.1543921124378; Tue, 04 Dec 2018 02:58:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543921124; cv=none; d=google.com; s=arc-20160816; b=XLHeeDUMYJ8I8+egqmpnor3KO24XRHsqkQdZnrSJ7/9B++br1aP2K6ZuTUUfxE63l6 5M8IqhaXmR/u+RJGhPLISDmtO+5IrWQQQgR2kghzSxCPILECDuk/iFXEIu/x+7Lkm6cL SDfpvKIKUGfb4RQXykb/huqI3nJH00RLIPtX6Ft5eyDcVdLjxnZSKlEUalMQ9UIEAHLG 9jtvhnCebtWK7sgcRAmR55WBoaZxLwDxZOqS6pvm8oDxijk04foxfF3SRE0akO8cbml8 1S2N6H+2990BFHqZ8vNyOMLvXCtkLwsrqdsXNz5lsUxIQ53giXBmYCLXyzeS9Oi6nCu7 3UQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FkekfnQDDOIlClJwv5TIv5douD/1pfkJZbIRoiP6Nks=; b=mUzrHlpgiFcPhfGiP3A5WIiVYQcODeOHwr9Hc2T+fKGhqLMhFD2NfiBEnJYI6FdE93 lBdhnKAuU4UCRnuKaoIZ/6IFPo7491CkCEFa1SLL+ALF4c6QvIprK5t6tTpzaZRqoJHx W4Zp37ljjML8Uh6bIENKDpMG8OCIQkcCmjYMrkGGPVIQcDpr7HBqw8XPd1o4uWyGwwI3 eWy7/jcaxwE7T7l5bG+njb0YBta1GwvefwzhiUmiDWoypAhmd/VUN8iQTVG0oItTh7R+ gzbwWYq7NNgsGFDwZd7ctZcfDHxf3dzkGWTUURYXDsrP4vlbK8g6//gMEhsXIG1m9qJN 9kLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="iP/6vE5/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e6si15014760pgk.201.2018.12.04.02.58.29; Tue, 04 Dec 2018 02:58:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="iP/6vE5/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726427AbeLDK4M (ORCPT + 99 others); Tue, 4 Dec 2018 05:56:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:39222 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726410AbeLDK4I (ORCPT ); Tue, 4 Dec 2018 05:56:08 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 63BCC214D9; Tue, 4 Dec 2018 10:56:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543920967; bh=99y3VNfRYbL0cUwOBe2txZZqdDWKJCEPVD5LN7SCzEM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iP/6vE5/Pd4rnV8jrJmXHzeIvpzxpO1taiG2SLvEbtEm52dkze09s15UO9bJKng69 u5mYkqVd6IYy9ZZZX28Oo0cd+nRDjVw/FfvCDq2P2202WswUmIYxLKi4/0BZB0uy7o s3SEQrf89fGaWxQ1zRxpGgAfqEXPAaHWAEIASz+4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Kosina , Thomas Gleixner , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , "WoodhouseDavid" , Andi Kleen , Tim Chen , "SchauflerCasey" Subject: [PATCH 4.19 029/139] x86/speculation: Propagate information about RSB filling mitigation to sysfs Date: Tue, 4 Dec 2018 11:48:30 +0100 Message-Id: <20181204103651.176340024@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103649.950154335@linuxfoundation.org> References: <20181204103649.950154335@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jiri Kosina jkosina@suse.cz commit bb4b3b7762735cdaba5a40fd94c9303d9ffa147a upstream If spectrev2 mitigation has been enabled, RSB is filled on context switch in order to protect from various classes of spectrev2 attacks. If this mitigation is enabled, say so in sysfs for spectrev2. Signed-off-by: Jiri Kosina Signed-off-by: Thomas Gleixner Cc: Peter Zijlstra Cc: Josh Poimboeuf Cc: Andrea Arcangeli Cc: "WoodhouseDavid" Cc: Andi Kleen Cc: Tim Chen Cc: "SchauflerCasey" Link: https://lkml.kernel.org/r/nycvar.YFH.7.76.1809251438580.15880@cbobk.fhfr.pm Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -874,10 +874,11 @@ static ssize_t cpu_show_common(struct de return sprintf(buf, "Mitigation: __user pointer sanitization\n"); case X86_BUG_SPECTRE_V2: - ret = sprintf(buf, "%s%s%s%s%s\n", spectre_v2_strings[spectre_v2_enabled], + ret = sprintf(buf, "%s%s%s%s%s%s\n", spectre_v2_strings[spectre_v2_enabled], boot_cpu_has(X86_FEATURE_USE_IBPB) ? ", IBPB" : "", boot_cpu_has(X86_FEATURE_USE_IBRS_FW) ? ", IBRS_FW" : "", (x86_spec_ctrl_base & SPEC_CTRL_STIBP) ? ", STIBP" : "", + boot_cpu_has(X86_FEATURE_RSB_CTXSW) ? ", RSB filling" : "", spectre_v2_module_string()); return ret;