Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8120703imu; Tue, 4 Dec 2018 03:21:27 -0800 (PST) X-Google-Smtp-Source: AFSGD/Xb2FNY3VqogT6Ohq1RYyCDIJndiIVqwiPkyw9ARmqz8oBRxPBiITyyYPEGduFyQQ9WSwz+ X-Received: by 2002:a62:99dd:: with SMTP id t90mr14850441pfk.179.1543922487720; Tue, 04 Dec 2018 03:21:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543922487; cv=none; d=google.com; s=arc-20160816; b=jjngqzMe9a9EuoetQmQTO2gmTstwu1dZGb74NiCEbFVeidnppmDj6OhXjt7eKdllDr vw5LkdcaniYvqrHbU7fY/tCg65IWyVfE4DoyVeMEU7AmAHDT+hzpcndS/+NfUosjJ0Wg jcUbwPX911Eb/u5WczilbeW7u0MPSAg6ylIahBErOplgbktO2a2xTOaugkEO08S3Isiw htbQ5+6zNRdNMrX9evNhzKlqidYMWuB//OJGhwI2zBSv1jNijmS1hnSPQ78SwxdEp2Xt HagTOs0yR/iDx0iKIiYlK3qRQpW+4ogTKHmSwY+GObHctWjU+63GRWuN21IJAMSyPqh4 sM8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fwc+MEFthySRlRI9tGl72pIZHZsAWJrkUs16u5H+7jc=; b=VTFWXoKrAZccXe8AWmZegEpdTv6RcVr4UN0lFsGZW3hAxI1AWnyj90hwTQ9NxZUJ/j w+V2QOYR/CXVfM4VQJS95nIp8L3kg+Rtd0N58Sy8pjEWDjCxXeOy8WINzL2eyGVSEU6X Z8Nsw+69hIJrkNFCBwVivdKAxNvJncokktg4tOqq8Hl4rarIOPcfLCOSxnjqdz/gtZQh 2g7j+Z77YBb7JpNPi4ok9gusrofuRDOhzT9vvdMZsNW0yxj4ex3tIkXq4gNYRdiexs88 Z2rx0JIsTGnc/2VEw4Prj2rGehZ3XGS1mz0aP9yCb+MDYhpOkbYLTF+z+pmfAh23hK03 WSlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ffcVVkqb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f11si17183425plr.341.2018.12.04.03.21.13; Tue, 04 Dec 2018 03:21:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ffcVVkqb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727935AbeLDLEL (ORCPT + 99 others); Tue, 4 Dec 2018 06:04:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:50996 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727471AbeLDLEK (ORCPT ); Tue, 4 Dec 2018 06:04:10 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C46D3214E0; Tue, 4 Dec 2018 11:04:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921449; bh=FLxvqEQOo+tgKHoFFB4uIEc30dhILFzdGNe8yCK8I9s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ffcVVkqbBjcMJeNhpAMHTyc+gdQXLPKLHDr2Gu9+AmtxumorMZV4tdxGuxQPMD+yp XyAaXSs/k8vsGRyFSZe9+F1M88KI7EqzN8i7oNoH0Ub+Zx+Xga7wTEevHXHu3aqofN iceUiGFoRJIL787AoIkdHvPyOV7BdpL0jfMAThis= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Kosina , Thomas Gleixner , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , "WoodhouseDavid" , Andi Kleen , Tim Chen , "SchauflerCasey" Subject: [PATCH 4.14 076/146] x86/speculation: Propagate information about RSB filling mitigation to sysfs Date: Tue, 4 Dec 2018 11:49:22 +0100 Message-Id: <20181204103729.894851248@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103726.750894136@linuxfoundation.org> References: <20181204103726.750894136@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jiri Kosina jkosina@suse.cz commit bb4b3b7762735cdaba5a40fd94c9303d9ffa147a upstream If spectrev2 mitigation has been enabled, RSB is filled on context switch in order to protect from various classes of spectrev2 attacks. If this mitigation is enabled, say so in sysfs for spectrev2. Signed-off-by: Jiri Kosina Signed-off-by: Thomas Gleixner Cc: Peter Zijlstra Cc: Josh Poimboeuf Cc: Andrea Arcangeli Cc: "WoodhouseDavid" Cc: Andi Kleen Cc: Tim Chen Cc: "SchauflerCasey" Link: https://lkml.kernel.org/r/nycvar.YFH.7.76.1809251438580.15880@cbobk.fhfr.pm Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -870,10 +870,11 @@ static ssize_t cpu_show_common(struct de return sprintf(buf, "Mitigation: __user pointer sanitization\n"); case X86_BUG_SPECTRE_V2: - ret = sprintf(buf, "%s%s%s%s%s\n", spectre_v2_strings[spectre_v2_enabled], + ret = sprintf(buf, "%s%s%s%s%s%s\n", spectre_v2_strings[spectre_v2_enabled], boot_cpu_has(X86_FEATURE_USE_IBPB) ? ", IBPB" : "", boot_cpu_has(X86_FEATURE_USE_IBRS_FW) ? ", IBRS_FW" : "", (x86_spec_ctrl_base & SPEC_CTRL_STIBP) ? ", STIBP" : "", + boot_cpu_has(X86_FEATURE_RSB_CTXSW) ? ", RSB filling" : "", spectre_v2_module_string()); return ret;