Received: by 2002:ab2:6991:0:b0:1f7:f6c3:9cb1 with SMTP id v17csp282253lqo; Tue, 7 May 2024 22:20:06 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUc4CRhinsrP9Wi4tY2RyAimjHnKzsRojOuLl2RKz5XfA3/2HaqxEvxcKUxaazzXU94ilP/vRTDpwehAwYpENcPFh4YRueV/hap3zuIgA== X-Google-Smtp-Source: AGHT+IEp6xo/DvwKYlaGPqX2A1PcYve86D0sStfh+LQXPticAVwu/jeRRiMj6RiLnCmI+PXINszW X-Received: by 2002:a17:906:1552:b0:a59:cd46:fe89 with SMTP id a640c23a62f3a-a59fb9cf80amr76448566b.59.1715145606265; Tue, 07 May 2024 22:20:06 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715145606; cv=pass; d=google.com; s=arc-20160816; b=cZQwMIkYnQhJXALmuTM8p5g/gX5x07jqZ5Pa5VQIgFRS6JAhVy3T9jr9fYbU2xqQXy RJe+6YQbnIviYYXp+3rGBwxJE1ay5tWn1HiiAAr7lrYq64XFUN1luRvHStxUPVcrZbDq 5Fgv0EuLZnc6FaKuXtgyDdzYNMhfXH5G5bxAxvxCqqkkLcBCz42cTF/ofBzw9wyZstXJ 40n0txINfb0/gD0qwYgV4FnNsRDHtjuHu9j8/KGQExqKIDNoSC2+F0kdxSd1HXucXjjq akNEIKyBSxkO2/+y7K1/DP6rbSHoSMCmkPJ2J5atoAuyjGS6jaY1boiZM0h6sNYzp+n1 cigQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=5+dFu11sYRWgUP27U/5svOqbw3NAh86423o4uyOojg8=; fh=ZAOdmGypZNxKdwUnLBOp5ej6UZKtSdd6nrVM9gNXdxo=; b=k9CbxgzyonOSrDno01hkZnIFdm+C38xXOaktWLOoCvkJIgWeEeBItqRqNNOoK1GXPA mVQTK83peucYRjezI9KZTqkl7ZuSG7zdK72O/TyEohNXzuzLOExROzA0vpxBmedOw3ty P1zdNP0Gc6oFn1wtOjDgPPzjkGLVdiwu5vilXfSThJi4SYrAe1F0HYgtCo7AR2fI21UO NY2mZr5hENUhj9keLBotvkYknm9n1t2L2qw9uHdVX8S6OioJQnlmF/rBLb6+NzA8Hwpz HwGhPbxyN+VbapYHUmKNdcoUUgxxG7EHr2S2YuzASJyn6UCUMWTqnTwaKM2j6Zsgzple BQuA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YiWRAWhY; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-172696-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-172696-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id dt7-20020a170907728700b00a59f6c4a00fsi838071ejc.410.2024.05.07.22.20.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 May 2024 22:20:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-172696-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YiWRAWhY; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-172696-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-172696-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 03EC91F26010 for ; Wed, 8 May 2024 05:20:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5730517BA5; Wed, 8 May 2024 05:19:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="YiWRAWhY" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8046617597 for ; Wed, 8 May 2024 05:19:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715145596; cv=none; b=KbfekmQ5NrOEV+fctjtlIIPBDsKaqfTmfONq4zOlUnHQBcRBQc5M17zZTqCdGVfLaDcVeeyS1yfrYK6Zj/tlIv0xymdWcrNxqUNddtO0AvS2+l4v+V8a4fHYLVyzNd8JvWqPwc63wKjwyAgGaM3ECNdhwyNT+RiOaGLGawAaCmI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715145596; c=relaxed/simple; bh=uTA5DvevSWIwMkF+/JsuZ+DF8dql4scWS+lC4mf41Fc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=LrcN51damYUDxOU2rQV19/OBFHniPHhmSFYYpdklrGHSE7i2LWLrIxB/2JMzaJHPvX3qQE5DQvbYvz7/vNiSFn+fb/MRixS0ykPZvXMae6FWrfy81jJMMIyA7mpvOTl1KQehrDT+/LvR1uO7nXd8RrDk7Qe+SOtnz4cUJCMAU2I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=YiWRAWhY; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4BBB1C4AF18; Wed, 8 May 2024 05:19:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1715145596; bh=uTA5DvevSWIwMkF+/JsuZ+DF8dql4scWS+lC4mf41Fc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YiWRAWhY5I47cemKIyLaIawi4aNds6sw8ApKknON0Nb+qKW100VXDnvXNcRL6mu6A b78nRpVJPxrJDj5WZdfgkooyZBjWlY3YJR0g19DXDk9bwf64FkQ/8axd/JG6b106yt 2YoeFCpN0sUmJ5ilve+aPgwbo14ujNZX8j4pbolnUmmRjXRbH8gVswD44wwHjZabmF EpVUkmtri0S8Qh1FKqekI1sDMEjWHqodCu9eArHEXQ8FaA+cmcx4J4It9LOfPfLDjT nHERt7jpId8BNMMxJyqw2yd0GHL6FSKt8/wSQVIjSggNfB+jVXFQYp0yIDk2SfrX5C 8OTit/JzmRL7A== Date: Tue, 7 May 2024 22:19:53 -0700 From: Josh Poimboeuf To: Daniel Sneddon Cc: x86@kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds , Pawan Gupta , Thomas Gleixner , Alexandre Chartre , Konrad Rzeszutek Wilk , Peter Zijlstra , Greg Kroah-Hartman , Sean Christopherson , Andrew Cooper , Dave Hansen , Nikolay Borisov , KP Singh , Waiman Long , Borislav Petkov , Ingo Molnar , Maksim Davydov Subject: Re: [PATCH v5 3/3] x86/bugs: Add 'spectre_bhi=vmexit' cmdline option Message-ID: <20240508051953.oz3q3hdvifo6lb7o@treble> References: <66327dcf87284a09ed17ac24227695ea3ba1f287.1715059256.git.jpoimboe@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: On Tue, May 07, 2024 at 07:58:07AM -0700, Daniel Sneddon wrote: > On 5/6/24 22:30, Josh Poimboeuf wrote: > > In cloud environments it can be useful to *only* enable the vmexit > > mitigation and leave syscalls vulnerable. Add that as an option. > > > > This is similar to the old spectre_bhi=auto option which was removed > > with the following commit: > > > > 36d4fe147c87 ("x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto") > > > > with the main difference being that this has a more descriptive name and > > is disabled by default. > > > > Requested-by: Maksim Davydov > > Signed-off-by: Josh Poimboeuf > > --- > > Does the KConfig option need to be updated to support this as well? In general we don't provide a config option for every possible mitigation cmdline option. If someone requests it we could add it later. > Reviewed-by: Daniel Sneddon Thanks! -- Josh