Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp691980pxx; Wed, 28 Oct 2020 14:39:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCFHdSWVtj5Wj7Jelxj4MZ3eAyJJvZTThEQIjpISFs47FcYtB6509mImcjMvjYZ2byEoak X-Received: by 2002:a05:6402:1245:: with SMTP id l5mr1029102edw.78.1603921185546; Wed, 28 Oct 2020 14:39:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603921185; cv=none; d=google.com; s=arc-20160816; b=zqG7PtTC6JVkBZWzk4RWQ9HtattHQExLXrvIgAn2mXaD19IdH7VoT46lifQ/LgKZP8 dv6W9PNtMmbTiN7aBtOz74+cX01Nqx6x66qSZ+s2DLsmIQpOHc9ph1I0ylM/KfoaGnR2 BVHX+v+VAZjNNu6LiS0it/o2KfY1QWrYlz7KlcNj7oJx3eS2o3+P8UkhjO+yvhqySAgZ bPoeZw9RNywS61fcNVfEtKm20pHXULdTKCRAXTQlxkp/OAqcZuv4QSQOTKae/YGQuucy R4pWE9BQZe4lo1FJ03ADzTFkVmGecbTYrQqbVJYpX7js+4QjHEReZaKmm7HBLkcCUhwg dMVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=pmmNMalVq36mHkBQ0+wl1qiG8br55QNMzsgCb1hJNxw=; b=jzXSAkzBDfRKLvz4agK5ip/X4E5m13rC4vaf/olUtB3w2QC4RKsAy8CY09qL/LP9Z7 YqzlTmmCKtvqvoeVv1fjT+2YzXnTpwH6byVnWhArVEtUWrlm4ImVj+A03V8QshWKS4ZE vb5HEW2lLnrV1BYaNXhzPJt3Znd+YbeDju+OKpCih/k53tp8x2CeNzRHoY8pXXqxds5K chigYqDtzHyj9xeQrIDNuefUpbui3IbnQLXGBKrcu/jrVmpcCeW3ox5dHDDkW77IcknA w+/jZeNMPy+LX1iIFdTBhONVcjYr2F5uNr/HD0V0wMb4zxOCEw8wdXeXzMtpdj7Oiq/+ pDNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m5si358262eje.723.2020.10.28.14.39.23; Wed, 28 Oct 2020 14:39:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2505374AbgJ0Vpg (ORCPT + 99 others); Tue, 27 Oct 2020 17:45:36 -0400 Received: from mga07.intel.com ([134.134.136.100]:64054 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2442558AbgJ0Vpg (ORCPT ); Tue, 27 Oct 2020 17:45:36 -0400 IronPort-SDR: G3l3hjlDKDCO5D0js167JyXc/jUfVNS1BmMmYByH4OfO1T5AGGDb+i8rySqZMbAfNNtjqJfphG cYNh4TgEgxKQ== X-IronPort-AV: E=McAfee;i="6000,8403,9787"; a="232351165" X-IronPort-AV: E=Sophos;i="5.77,424,1596524400"; d="scan'208";a="232351165" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Oct 2020 14:45:35 -0700 IronPort-SDR: RkGFTuST7nnifjeRYaoyh9qYMXMI337t5xZ2s1iFzCtu1Hp4R+Xl8tTlElpp2VdqtR3fvL3zDa nK4INudzzjcw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,424,1596524400"; d="scan'208";a="303897794" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by fmsmga008.fm.intel.com with ESMTP; 27 Oct 2020 14:45:35 -0700 From: Sean Christopherson To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org Cc: "H. Peter Anvin" , linux-kernel@vger.kernel.org, Sean Christopherson Subject: [PATCH] x86: Drop RDPID macro to discourage use of RDPID in the kernel Date: Tue, 27 Oct 2020 14:45:32 -0700 Message-Id: <20201027214532.1792-1-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Drop the GAS-compatible RDPID macro as RDPID shouldn't be used in the kernel, excepting the vDSO, which handcodes RDPID in inline asm. RDPID is unsafe in the kernel because KVM loads guest's TSC_AUX on VM-entry and may not restore the host's value until the CPU returns to userspace. See commit 6a3ea3e68b8a ("x86/entry/64: Do not use RDPID in paranoid entry to accomodate KVM") for details. Signed-off-by: Sean Christopherson --- arch/x86/include/asm/inst.h | 15 --------------- 1 file changed, 15 deletions(-) diff --git a/arch/x86/include/asm/inst.h b/arch/x86/include/asm/inst.h index bd7f02480ca1..438ccd4f3cc4 100644 --- a/arch/x86/include/asm/inst.h +++ b/arch/x86/include/asm/inst.h @@ -143,21 +143,6 @@ .macro MODRM mod opd1 opd2 .byte \mod | (\opd1 & 7) | ((\opd2 & 7) << 3) .endm - -.macro RDPID opd - REG_TYPE rdpid_opd_type \opd - .if rdpid_opd_type == REG_TYPE_R64 - R64_NUM rdpid_opd \opd - .else - R32_NUM rdpid_opd \opd - .endif - .byte 0xf3 - .if rdpid_opd > 7 - PFX_REX rdpid_opd 0 - .endif - .byte 0x0f, 0xc7 - MODRM 0xc0 rdpid_opd 0x7 -.endm #endif #endif -- 2.28.0