All of lore.kernel.org
 help / color / mirror / Atom feed
From: <gregkh@linuxfoundation.org>
To: 413a91c24dab3ed0caa5f4e4d017d87b0857f920.1498751203.git.luto@kernel.org,
	akpm@linux-foundation.org, amakhalov@vmware.com,
	arjan@linux.intel.com, bp@alien8.de, dave.hansen@intel.com,
	ganb@vmware.com, gregkh@linuxfoundation.org,
	linux-mm@kvack.orgluto@kernel.org, matt.helsley@gmail.com,
	mgorman@suse.de, mingo@kernel.org, nadav.amit@gmail.com,
	peterz@infradead.org, riel@redhat.com, rostedt@goodmis.org,
	srivatsa@csail.mit.edu, srivatsab@vmware.com, tglx@linutronix.de,
	tim.c.chen@linux.intel.com, torvalds@linux-foundation.org
Cc: stable-commits@vger.kernel.org
Subject: Patch "x86/mm: Give each mm TLB flush generation a unique ID" has been added to the 4.4-stable tree
Date: Mon, 23 Jul 2018 11:22:48 +0200	[thread overview]
Message-ID: <1532337768155131@kroah.com> (raw)
In-Reply-To: <153156072694.10043.1719994417190491710.stgit@srivatsa-ubuntu>


This is a note to let you know that I've just added the patch titled

    x86/mm: Give each mm TLB flush generation a unique ID

to the 4.4-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     x86-mm-give-each-mm-tlb-flush-generation-a-unique-id.patch
and it can be found in the queue-4.4 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@vger.kernel.org> know about it.


>From foo@baz Mon Jul 23 10:04:05 CEST 2018
From: "Srivatsa S. Bhat" <srivatsa@csail.mit.edu>
Date: Sat, 14 Jul 2018 02:32:07 -0700
Subject: x86/mm: Give each mm TLB flush generation a unique ID
To: gregkh@linuxfoundation.org, stable@vger.kernel.org
Cc: Andy Lutomirski <luto@kernel.org>, Nadav Amit <nadav.amit@gmail.com>, Thomas Gleixner <tglx@linutronix.de>, Andrew Morton <akpm@linux-foundation.org>, Arjan van de Ven <arjan@linux.intel.com>, Borislav Petkov <bp@alien8.de>, Dave Hansen <dave.hansen@intel.com>, Linus Torvalds <torvalds@linux-foundation.org>, Mel Gorman <mgorman@suse.de>, Peter Zijlstra <peterz@infradead.org>, Rik van Riel <riel@redhat.com>, linux-mm@kvack.org, Ingo Molnar <mingo@kernel.org>, Tim Chen <tim.c.chen@linux.intel.com>, "Matt Helsley \(VMware\)" <matt.helsley@gmail.com>, Alexey Makhalov <amakhalov@vmware.com>, Bo Gan <ganb@vmware.com>, matt.helsley@gmail.com, rostedt@goodmis.org, amakhalov@vmware.com, ganb@vmware.com, srivatsa@csail.mit.edu, srivatsab@vmware.com
Message-ID: <153156072694.10043.1719994417190491710.stgit@srivatsa-ubuntu>

From: Andy Lutomirski <luto@kernel.org>

commit f39681ed0f48498b80455095376f11535feea332 upstream.

This adds two new variables to mmu_context_t: ctx_id and tlb_gen.
ctx_id uniquely identifies the mm_struct and will never be reused.
For a given mm_struct (and hence ctx_id), tlb_gen is a monotonic
count of the number of times that a TLB flush has been requested.
The pair (ctx_id, tlb_gen) can be used as an identifier for TLB
flush actions and will be used in subsequent patches to reliably
determine whether all needed TLB flushes have occurred on a given
CPU.

This patch is split out for ease of review.  By itself, it has no
real effect other than creating and updating the new variables.

Signed-off-by: Andy Lutomirski <luto@kernel.org>
Reviewed-by: Nadav Amit <nadav.amit@gmail.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Arjan van de Ven <arjan@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Mel Gorman <mgorman@suse.de>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rik van Riel <riel@redhat.com>
Cc: linux-mm@kvack.org
Link: http://lkml.kernel.org/r/413a91c24dab3ed0caa5f4e4d017d87b0857f920.1498751203.git.luto@kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Tim Chen <tim.c.chen@linux.intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
Reviewed-by: Matt Helsley (VMware) <matt.helsley@gmail.com>
Reviewed-by: Alexey Makhalov <amakhalov@vmware.com>
Reviewed-by: Bo Gan <ganb@vmware.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---

 arch/x86/include/asm/mmu.h         |   15 +++++++++++++--
 arch/x86/include/asm/mmu_context.h |    4 ++++
 arch/x86/mm/tlb.c                  |    2 ++
 3 files changed, 19 insertions(+), 2 deletions(-)

--- a/arch/x86/include/asm/mmu.h
+++ b/arch/x86/include/asm/mmu.h
@@ -3,12 +3,18 @@
 
 #include <linux/spinlock.h>
 #include <linux/mutex.h>
+#include <linux/atomic.h>
 
 /*
- * The x86 doesn't have a mmu context, but
- * we put the segment information here.
+ * x86 has arch-specific MMU state beyond what lives in mm_struct.
  */
 typedef struct {
+	/*
+	 * ctx_id uniquely identifies this mm_struct.  A ctx_id will never
+	 * be reused, and zero is not a valid ctx_id.
+	 */
+	u64 ctx_id;
+
 #ifdef CONFIG_MODIFY_LDT_SYSCALL
 	struct ldt_struct *ldt;
 #endif
@@ -24,6 +30,11 @@ typedef struct {
 	atomic_t perf_rdpmc_allowed;	/* nonzero if rdpmc is allowed */
 } mm_context_t;
 
+#define INIT_MM_CONTEXT(mm)						\
+	.context = {							\
+		.ctx_id = 1,						\
+	}
+
 void leave_mm(int cpu);
 
 #endif /* _ASM_X86_MMU_H */
--- a/arch/x86/include/asm/mmu_context.h
+++ b/arch/x86/include/asm/mmu_context.h
@@ -11,6 +11,9 @@
 #include <asm/tlbflush.h>
 #include <asm/paravirt.h>
 #include <asm/mpx.h>
+
+extern atomic64_t last_mm_ctx_id;
+
 #ifndef CONFIG_PARAVIRT
 static inline void paravirt_activate_mm(struct mm_struct *prev,
 					struct mm_struct *next)
@@ -105,6 +108,7 @@ static inline void enter_lazy_tlb(struct
 static inline int init_new_context(struct task_struct *tsk,
 				   struct mm_struct *mm)
 {
+	mm->context.ctx_id = atomic64_inc_return(&last_mm_ctx_id);
 	init_new_context_ldt(tsk, mm);
 	return 0;
 }
--- a/arch/x86/mm/tlb.c
+++ b/arch/x86/mm/tlb.c
@@ -29,6 +29,8 @@
  *	Implement flush IPI by CALL_FUNCTION_VECTOR, Alex Shi
  */
 
+atomic64_t last_mm_ctx_id = ATOMIC64_INIT(1);
+
 struct flush_tlb_info {
 	struct mm_struct *flush_mm;
 	unsigned long flush_start;


Patches currently in stable-queue which might be from srivatsa@csail.mit.edu are

queue-4.4/x86-bugs-rename-_rds-to-_ssbd.patch
queue-4.4/x86-speculation-remove-skylake-c2-from-speculation-control-microcode-blacklist.patch
queue-4.4/documentation-spec_ctrl-do-some-minor-cleanups.patch
queue-4.4/x86-speculation-handle-ht-correctly-on-amd.patch
queue-4.4/x86-cpufeatures-add-x86_feature_rds.patch
queue-4.4/x86-speculation-fix-up-array_index_nospec_mask-asm-constraint.patch
queue-4.4/x86-bugs-remove-x86_spec_ctrl_set.patch
queue-4.4/x86-speculation-add-asm-msr-index.h-dependency.patch
queue-4.4/x86-cpu-intel-add-knights-mill-to-intel-family.patch
queue-4.4/x86-bugs-concentrate-bug-detection-into-a-separate-function.patch
queue-4.4/x86-bugs-fix-the-parameters-alignment-and-missing-void.patch
queue-4.4/x86-bugs-whitelist-allowed-spec_ctrl-msr-values.patch
queue-4.4/prctl-add-force-disable-speculation.patch
queue-4.4/x86-cpufeatures-add-intel-feature-bits-for-speculation-control.patch
queue-4.4/x86-speculation-use-synthetic-bits-for-ibrs-ibpb-stibp.patch
queue-4.4/x86-cpuid-fix-up-virtual-ibrs-ibpb-stibp-feature-bits-on-intel.patch
queue-4.4/x86-nospec-simplify-alternative_msr_write.patch
queue-4.4/x86-bugs-intel-set-proper-cpu-features-and-setup-rds.patch
queue-4.4/x86-speculation-use-indirect-branch-prediction-barrier-in-context-switch.patch
queue-4.4/x86-process-correct-and-optimize-tif_blockstep-switch.patch
queue-4.4/x86-speculation-use-ibrs-if-available-before-calling-into-firmware.patch
queue-4.4/x86-speculation-rework-speculative_store_bypass_update.patch
queue-4.4/x86-asm-entry-32-simplify-pushes-of-zeroed-pt_regs-regs.patch
queue-4.4/x86-bugs-make-cpu_show_common-static.patch
queue-4.4/seccomp-use-pr_spec_force_disable.patch
queue-4.4/x86-cpufeatures-disentangle-ssbd-enumeration.patch
queue-4.4/x86-cpu-amd-fix-erratum-1076-cpb-bit.patch
queue-4.4/x86-speculation-correct-speculation-control-microcode-blacklist-again.patch
queue-4.4/x86-cpu-rename-merrifield2-to-moorefield.patch
queue-4.4/x86-cpu-make-alternative_msr_write-work-for-32-bit-code.patch
queue-4.4/x86-cpufeatures-disentangle-msr_spec_ctrl-enumeration-from-ibrs.patch
queue-4.4/x86-cpufeatures-add-cpuid_7_edx-cpuid-leaf.patch
queue-4.4/x86-bugs-fix-__ssb_select_mitigation-return-type.patch
queue-4.4/x86-cpufeatures-add-feature_zen.patch
queue-4.4/xen-set-cpu-capabilities-from-xen_start_kernel.patch
queue-4.4/x86-bugs-rename-ssbd_no-to-ssb_no.patch
queue-4.4/x86-speculation-add-prctl-for-speculative-store-bypass-mitigation.patch
queue-4.4/x86-msr-add-definitions-for-new-speculation-control-msrs.patch
queue-4.4/seccomp-enable-speculation-flaw-mitigations.patch
queue-4.4/x86-spectre_v2-don-t-check-microcode-versions-when-running-under-hypervisors.patch
queue-4.4/selftest-seccomp-fix-the-seccomp-2-signature.patch
queue-4.4/proc-use-underscores-for-ssbd-in-status.patch
queue-4.4/x86-bugs-amd-add-support-to-disable-rds-on-famh-if-requested.patch
queue-4.4/x86-cpufeature-blacklist-spec_ctrl-pred_cmd-on-early-spectre-v2-microcodes.patch
queue-4.4/x86-bugs-rework-spec_ctrl-base-and-mask-logic.patch
queue-4.4/seccomp-add-filter-flag-to-opt-out-of-ssb-mitigation.patch
queue-4.4/x86-speculation-make-seccomp-the-default-mode-for-speculative-store-bypass.patch
queue-4.4/x86-bugs-kvm-support-the-combination-of-guest-and-host-ibrs.patch
queue-4.4/selftest-seccomp-fix-the-flag-name-seccomp_filter_flag_tsync.patch
queue-4.4/x86-mm-factor-out-ldt-init-from-context-init.patch
queue-4.4/x86-speculation-create-spec-ctrl.h-to-avoid-include-hell.patch
queue-4.4/x86-cpufeatures-clean-up-spectre-v2-related-cpuid-flags.patch
queue-4.4/x86-bugs-expose-sys-..-spec_store_bypass.patch
queue-4.4/nospec-allow-getting-setting-on-non-current-task.patch
queue-4.4/x86-speculation-clean-up-various-spectre-related-details.patch
queue-4.4/x86-bugs-concentrate-bug-reporting-into-a-separate-function.patch
queue-4.4/x86-pti-mark-constant-arrays-as-__initconst.patch
queue-4.4/x86-cpufeatures-add-amd-feature-bits-for-speculation-control.patch
queue-4.4/x86-pti-do-not-enable-pti-on-cpus-which-are-not-vulnerable-to-meltdown.patch
queue-4.4/x86-mm-give-each-mm-tlb-flush-generation-a-unique-id.patch
queue-4.4/seccomp-move-speculation-migitation-control-to-arch-code.patch
queue-4.4/x86-speculation-move-firmware_restrict_branch_speculation_-from-c-to-cpp.patch
queue-4.4/x86-xen-zero-msr_ia32_spec_ctrl-before-suspend.patch
queue-4.4/x86-amd-don-t-set-x86_bug_sysret_ss_attrs-when-running-under-xen.patch
queue-4.4/x86-bugs-kvm-extend-speculation-control-for-virt_spec_ctrl.patch
queue-4.4/prctl-add-speculation-control-prctls.patch
queue-4.4/x86-process-optimize-tif_notsc-switch.patch
queue-4.4/x86-process-allow-runtime-control-of-speculative-store-bypass.patch
queue-4.4/x86-bugs-unify-x86_spec_ctrl_-set_guest-restore_host.patch
queue-4.4/x86-bugs-expose-x86_spec_ctrl_base-directly.patch
queue-4.4/x86-bugs-provide-boot-parameters-for-the-spec_store_bypass_disable-mitigation.patch
queue-4.4/x86-speculation-update-speculation-control-microcode-blacklist.patch
queue-4.4/proc-provide-details-on-speculation-flaw-mitigations.patch
queue-4.4/x86-speculation-add-basic-ibpb-indirect-branch-prediction-barrier-support.patch
queue-4.4/x86-speculation-kvm-implement-support-for-virt_spec_ctrl-ls_cfg.patch
queue-4.4/x86-entry-64-compat-clear-registers-for-compat-syscalls-to-reduce-speculation-attack-surface.patch
queue-4.4/x86-process-optimize-tif-checks-in-__switch_to_xtra.patch
queue-4.4/x86-speculation-add-virtualized-speculative-store-bypass-disable-support.patch
queue-4.4/x86-bugs-read-spec_ctrl-msr-during-boot-and-re-use-reserved-bits.patch

  reply	other threads:[~2018-07-23  9:25 UTC|newest]

Thread overview: 143+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-07-14  9:25 [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 001/101] x86/cpufeature: Move some of the scattered feature bits to x86_capability Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 002/101] x86/cpufeature: Cleanup get_cpu_cap() Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 003/101] x86/cpu: Provide a config option to disable static_cpu_has Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 004/101] x86/fpu: Add an XSTATE_OP() macro Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 005/101] x86/fpu: Get rid of xstate_fault() Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 006/101] x86/headers: Don't include asm/processor.h in asm/atomic.h Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 007/101] x86/cpufeature: Carve out X86_FEATURE_* Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 008/101] x86/cpufeature: Replace the old static_cpu_has() with safe variant Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 009/101] x86/cpufeature: Get rid of the non-asm goto variant Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 010/101] x86/alternatives: Add an auxilary section Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 011/101] x86/alternatives: Discard dynamic check after init Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 012/101] x86/vdso: Use static_cpu_has() Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 013/101] x86/boot: Simplify kernel load address alignment check Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 014/101] x86/cpufeature: Speed up cpu_feature_enabled() Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 015/101] x86/cpufeature, x86/mm/pkeys: Add protection keys related CPUID definitions Srivatsa S. Bhat
2018-07-14  9:28   ` Srivatsa S. Bhat
2018-07-15 11:04   ` Patch "[PATCH 4.4.y 015/101] x86/cpufeature, x86/mm/pkeys: Add protection keys related CPUID definitions" has been added to the 4.4-stable tree gregkh
2018-07-14  9:28 ` [PATCH 4.4.y 016/101] x86/mm/pkeys: Fix mismerge of protection keys CPUID bits Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 018/101] x86/cpufeature, x86/mm/pkeys: Fix broken compile-time disabling of pkeys Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 019/101] x86/cpufeature: Update cpufeaure macros Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 020/101] x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 021/101] x86/cpufeature: Add helper macro for mask check macros Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 022/101] x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 023/101] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 024/101] x86/cpufeatures: Add Intel feature bits for Speculation Control Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 025/101] x86/cpufeatures: Add AMD " Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 026/101] x86/msr: Add definitions for new speculation control MSRs Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 027/101] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 028/101] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 029/101] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 030/101] x86/cpufeatures: Clean up Spectre v2 related CPUID flags Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 031/101] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 032/101] x86/pti: Mark constant arrays as __initconst Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 033/101] x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 034/101] x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 035/101] x86/speculation: Update Speculation Control microcode blacklist Srivatsa S. Bhat
2018-07-14  9:31   ` Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 036/101] x86/speculation: Correct Speculation Control microcode blacklist again Srivatsa S. Bhat
2018-07-14  9:31   ` Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 037/101] x86/speculation: Clean up various Spectre related details Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 038/101] x86/speculation: Fix up array_index_nospec_mask() asm constraint Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 039/101] x86/speculation: Add <asm/msr-index.h> dependency Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 040/101] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend Srivatsa S. Bhat
2018-07-14  9:31 ` Srivatsa S. Bhat
2018-07-23  9:22   ` Patch "x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend" has been added to the 4.4-stable tree gregkh
2018-07-14  9:31 ` [PATCH 4.4.y 041/101] x86/mm: Factor out LDT init from context init Srivatsa S. Bhat
2018-07-14  9:31   ` Srivatsa S. Bhat
2018-07-23  9:22   ` Patch "x86/mm: Factor out LDT init from context init" has been added to the 4.4-stable tree gregkh
2018-07-14  9:32 ` [PATCH 4.4.y 042/101] x86/mm: Give each mm TLB flush generation a unique ID Srivatsa S. Bhat
2018-07-14  9:32   ` Srivatsa S. Bhat
2018-07-23  9:22   ` gregkh [this message]
2018-07-14  9:32 ` [PATCH 4.4.y 043/101] x86/speculation: Use Indirect Branch Prediction Barrier in context switch Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 044/101] x86/spectre_v2: Don't check microcode versions when running under hypervisors Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 045/101] x86/speculation: Use IBRS if available before calling into firmware Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 046/101] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 047/101] x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 048/101] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 049/101] selftest/seccomp: Fix the seccomp(2) signature Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 050/101] xen: set cpu capabilities from xen_start_kernel() Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 051/101] x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen Srivatsa S. Bhat
2018-07-14 14:15   ` Juergen Gross
2018-07-16 19:59     ` Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 052/101] x86/nospec: Simplify alternative_msr_write() Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 053/101] x86/bugs: Concentrate bug detection into a separate function Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 054/101] x86/bugs: Concentrate bug reporting " Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 055/101] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 056/101] x86/bugs, KVM: Support the combination of guest and host IBRS Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 057/101] x86/cpu: Rename Merrifield2 to Moorefield Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 058/101] x86/cpu/intel: Add Knights Mill to Intel family Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 059/101] x86/bugs: Expose /sys/../spec_store_bypass Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 060/101] x86/cpufeatures: Add X86_FEATURE_RDS Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 061/101] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 062/101] x86/bugs/intel: Set proper CPU features and setup RDS Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 063/101] x86/bugs: Whitelist allowed SPEC_CTRL MSR values Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 064/101] x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 065/101] x86/speculation: Create spec-ctrl.h to avoid include hell Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 066/101] prctl: Add speculation control prctls Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 067/101] x86/process: Optimize TIF checks in __switch_to_xtra() Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 068/101] x86/process: Correct and optimize TIF_BLOCKSTEP switch Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 069/101] x86/process: Optimize TIF_NOTSC switch Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 070/101] x86/process: Allow runtime control of Speculative Store Bypass Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 071/101] x86/speculation: Add prctl for Speculative Store Bypass mitigation Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 072/101] nospec: Allow getting/setting on non-current task Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 073/101] proc: Provide details on speculation flaw mitigations Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 074/101] seccomp: Enable " Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 075/101] prctl: Add force disable speculation Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 076/101] seccomp: Use PR_SPEC_FORCE_DISABLE Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 077/101] seccomp: Add filter flag to opt-out of SSB mitigation Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 078/101] seccomp: Move speculation migitation control to arch code Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 079/101] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 081/101] proc: Use underscores for SSBD in 'status' Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 082/101] Documentation/spec_ctrl: Do some minor cleanups Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 083/101] x86/bugs: Fix __ssb_select_mitigation() return type Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 084/101] x86/bugs: Make cpu_show_common() static Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 085/101] x86/bugs: Fix the parameters alignment and missing void Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 086/101] x86/cpu: Make alternative_msr_write work for 32-bit code Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 087/101] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 088/101] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 089/101] x86/cpufeatures: Disentangle SSBD enumeration Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 090/101] x86/cpu/AMD: Fix erratum 1076 (CPB bit) Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 091/101] x86/cpufeatures: Add FEATURE_ZEN Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 092/101] x86/speculation: Handle HT correctly on AMD Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 093/101] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 094/101] x86/speculation: Add virtualized speculative store bypass disable support Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 095/101] x86/speculation: Rework speculative_store_bypass_update() Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 096/101] x86/bugs: Unify x86_spec_ctrl_{set_guest, restore_host} Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 097/101] x86/bugs: Expose x86_spec_ctrl_base directly Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 098/101] x86/bugs: Remove x86_spec_ctrl_set() Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 099/101] x86/bugs: Rework spec_ctrl base and mask logic Srivatsa S. Bhat
2018-07-14  9:40 ` [PATCH 4.4.y 100/101] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG Srivatsa S. Bhat
2018-07-14  9:40 ` [PATCH 4.4.y 101/101] x86/bugs: Rename SSBD_NO to SSB_NO Srivatsa S. Bhat
2018-07-15 11:26 ` [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y Greg KH
2018-07-15 11:26   ` Greg KH
2018-07-16  8:02   ` Srivatsa S. Bhat
2018-07-16  8:02     ` Srivatsa S. Bhat
2018-07-23 11:26 ` Greg KH
2018-07-23 11:26   ` Greg KH
2018-07-23 17:27   ` Srivatsa S. Bhat
2018-07-23 17:27     ` Srivatsa S. Bhat
2018-07-23 22:06 ` Jiri Kosina
2018-07-24 20:13   ` Srivatsa S. Bhat
2018-07-24 20:13     ` Srivatsa S. Bhat
2018-07-24 22:02     ` Jiri Kosina
2018-07-24 22:02       ` Jiri Kosina
2018-07-26 23:09       ` Kees Cook
2018-07-26 23:09         ` Kees Cook
2018-08-02 19:22         ` Srivatsa S. Bhat
2018-08-02 19:22           ` Srivatsa S. Bhat
2018-08-02 22:22           ` Kees Cook
2018-08-02 22:22             ` Kees Cook
2018-08-03 23:20             ` Srivatsa S. Bhat
2018-08-03 23:20               ` Srivatsa S. Bhat
2018-08-07 13:49               ` Greg KH
2018-08-07 13:49                 ` Greg KH
2018-08-07 19:08                 ` Srivatsa S. Bhat
2018-08-07 19:08                   ` Srivatsa S. Bhat
2018-08-07 19:15                   ` Greg KH
2018-08-07 19:15                     ` Greg KH
2018-08-07 19:19                     ` Srivatsa S. Bhat
2018-08-07 19:19                       ` Srivatsa S. Bhat
  -- strict thread matches above, loose matches on Subject: below --
2018-07-14  9:28 [4.4.y,017/101] x86/cpu: Add detection of AMD RAS Capabilities Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 017/101] " Srivatsa S. Bhat

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1532337768155131@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=413a91c24dab3ed0caa5f4e4d017d87b0857f920.1498751203.git.luto@kernel.org \
    --cc=akpm@linux-foundation.org \
    --cc=amakhalov@vmware.com \
    --cc=arjan@linux.intel.com \
    --cc=bp@alien8.de \
    --cc=dave.hansen@intel.com \
    --cc=ganb@vmware.com \
    --cc=linux-mm@kvack.orgluto \
    --cc=stable-commits@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.