Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp5658097rwb; Wed, 9 Aug 2023 07:28:54 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFhM04nc8xCoPozA0eCyPugGCw+ZyMCZy0ix3OP66fxDtkjajsOCUiQGz61Ubjlc9n8yzxN X-Received: by 2002:a17:906:3185:b0:99c:44fd:87d7 with SMTP id 5-20020a170906318500b0099c44fd87d7mr2188505ejy.58.1691591334160; Wed, 09 Aug 2023 07:28:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691591334; cv=none; d=google.com; s=arc-20160816; b=g3eHAeWMllhzh3zQDViAxY1M9kvWeZuClNP0EU74TGhFsRy4EOByrlHKwfmLrq0V/S dXyLqCD4o7s7Ivb4Ud2ls2qFL+qnjWQW7YfPfkKoNedGDyOhPzTk0V0gjNVv3AZZpS/e TdaOaA5vdA6cRZ0fCw9jRHwvuOuYlWPUlPMZoYGDr+oRUdb6/zABgXAsDX2QsF1keoDP IzH9nrvr2mczUKeIeASjFFkVV8uKklZJIDJVE3rEDU3uD1+vVoFm5dz24sjMqa8N9HYQ hHgKX1mtlVGCWUfZA3GwVxe0eMwrcxClgadfL/MvuQKEdXYGRT+8nO9z9KLogscTM0nV FS0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=FFFq2vF3xposwpg3za+Aa3dLhjF3RIj+STzD9sOz56c=; fh=nIqJPQrB4V45MOdRoOCBABHD990j3QSMCgsf+X0qIaI=; b=W3kXJue0NsqpSFj+Hse29oG65cFyiq/2F+E9fVpQhPEzkcOl8d4uDDeHGvlsJfy06F n5juUFW/Lz1TGTJs4T+pqGRO2Le7WvK9ok8+99SqqnwKNKACkYhbtXxmr/bbhJQGz+ti OJWHVfju/G6Yt0Cm3tY6HC2s1YVDyN2uwNw2+ssaIt0hPQ0yYsQ2rLPJwPu7B3AToXRN flBY4bPKLHcnaMHojaH1GM6jVAhPU3ulQWVCCaKeiJ+u6gpYiIvYArrBRsNlgVmQTssm WjjKWLGDbYekuJ3YrS1Lj3a2XxtkwWFu0kLFtEkSKr1Wo/ZiHmZ9N395L4VBGQFhB3wH beXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IRS+cZPw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z6-20020a170906240600b0099bd00f8f73si8566742eja.742.2023.08.09.07.28.28; Wed, 09 Aug 2023 07:28:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IRS+cZPw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233100AbjHIOFg (ORCPT + 99 others); Wed, 9 Aug 2023 10:05:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50204 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229722AbjHIOFf (ORCPT ); Wed, 9 Aug 2023 10:05:35 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 27E5C1FCC for ; Wed, 9 Aug 2023 07:05:35 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id BBD1A62FDC for ; Wed, 9 Aug 2023 14:05:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5E4AEC433C8; Wed, 9 Aug 2023 14:05:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1691589934; bh=C4vGr9VtQ1uJZ1AEXz3WxHMpY3hLIOJDo+mTGMKQeJg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IRS+cZPwvkKV+8bca4C1LLK2tmCojpzDB4Ip4t7A+qZ7wDMplRv3TwyfY5WwIvaj+ lAwpzLlufCQJnGT4z46peHy1lfbCICNv+XikWaeYHxPD37O+DS272hxGqDwvJU/PnE L7XpmjAqvHO+RBMfq85PFJTzRw1iYmm5TjYYdoGO33bb4PhUunjvdCoWsCggEueplE cP7M0i7blFe4I3hrYEJWLnpambzQSxZikkGu+HWs16wmaG3TpBmeQ5+E2DhaT4LQoQ SZTjqE4IlXmp55z13/PxqId91Rfyoz53Av+T66B2yCylXcXlnM4WtuqcPGdwQm8m6i H6FJNgDwovy8Q== Date: Wed, 9 Aug 2023 10:05:30 -0400 From: Josh Poimboeuf To: Peter Zijlstra Cc: x86@kernel.org, linux-kernel@vger.kernel.org, David.Kaplan@amd.com, Andrew.Cooper3@citrix.com, gregkh@linuxfoundation.org Subject: Re: [RFC][PATCH 11/17] x86/cpu: Remove all SRSO interface nonsense Message-ID: <20230809140530.bijq3asl26d2pu7u@treble> References: <20230809071218.000335006@infradead.org> <20230809072201.192502969@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20230809072201.192502969@infradead.org> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 09, 2023 at 09:12:29AM +0200, Peter Zijlstra wrote: > @@ -2607,26 +2447,26 @@ static ssize_t srbds_show_state(char *bu > static ssize_t retbleed_show_state(char *buf) > { > if (retbleed_mitigation == RETBLEED_MITIGATION_UNRET || > + retbleed_mitigation == RETBLEED_MITIGATION_UNRET_SRSO || > + retbleed_mitigation == RETBLEED_MITIGATION_UNRET_SRSO_ALIAS || > retbleed_mitigation == RETBLEED_MITIGATION_IBPB) { These retbleed_show_state() changes probably belong in that other patch which adds the retbleed= cmdline options. > + > if (boot_cpu_data.x86_vendor != X86_VENDOR_AMD && > boot_cpu_data.x86_vendor != X86_VENDOR_HYGON) > return sysfs_emit(buf, "Vulnerable: untrained return thunk / IBPB on non-AMD based uarch\n"); > > - return sysfs_emit(buf, "%s; SMT %s\n", retbleed_strings[retbleed_mitigation], > + return sysfs_emit(buf, "%s; SMT %s%s\n", retbleed_strings[retbleed_mitigation], > !sched_smt_active() ? "disabled" : > spectre_v2_user_stibp == SPECTRE_V2_USER_STRICT || > spectre_v2_user_stibp == SPECTRE_V2_USER_STRICT_PREFERRED ? > - "enabled with STIBP protection" : "vulnerable"); > - } > + "enabled with STIBP protection" : "vulnerable", > + cpu_has_ibpb_brtype_microcode() ? "" : ", no SRSO microcode"); Hm? What does missing microcode have to do with SMT? -- Josh