* [PATCH v3 0/2] CALL_NOSPEC fixes
@ 2025-03-01 2:35 Pawan Gupta
2025-03-01 2:35 ` [PATCH v3 1/2] x86/speculation: Simplify and make CALL_NOSPEC consistent Pawan Gupta
2025-03-01 2:35 ` [PATCH v3 2/2] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC Pawan Gupta
0 siblings, 2 replies; 7+ messages in thread
From: Pawan Gupta @ 2025-03-01 2:35 UTC (permalink / raw)
To: x86, Josh Poimboeuf, Andrew Cooper; +Cc: linux-kernel
v3:
- Split the CS prefix change into a separate patch. (Ingo)
v2: https://lore.kernel.org/r/20250227-call-nospec-v2-1-895a30dceaac@linux.intel.com
- Fixed the inconsistency in the use of "\" in __CS_PREFIX. (Andrew)
- Fixed the comment to reflect that __CS_PREFIX only emits the prefix and
not the JMP/CALL. (Andrew)
v1: https://lore.kernel.org/r/20250226-call-nospec-v1-1-4dde04a5c7a7@linux.intel.com
Patch 1 simplifies CALL_NOSPEC and mimics the behavior of compiler induced
thunks.
Patch 2 adds a missing CS prefix in CALL_NOSPEC for inline asm.
---
Pawan Gupta (2):
x86/speculation: Simplify and make CALL_NOSPEC consistent
x86/speculation: Add a conditional CS prefix to CALL_NOSPEC
arch/x86/include/asm/nospec-branch.h | 32 +++++++++++++++++++-------------
1 file changed, 19 insertions(+), 13 deletions(-)
---
base-commit: d082ecbc71e9e0bf49883ee4afd435a77a5101b6
change-id: 20250226-call-nospec-b94808f0dc75
Best regards,
--
Pawan
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v3 1/2] x86/speculation: Simplify and make CALL_NOSPEC consistent
2025-03-01 2:35 [PATCH v3 0/2] CALL_NOSPEC fixes Pawan Gupta
@ 2025-03-01 2:35 ` Pawan Gupta
2025-03-03 11:12 ` [tip: x86/urgent] " tip-bot2 for Pawan Gupta
2025-03-04 10:26 ` [tip: x86/cpu] " tip-bot2 for Pawan Gupta
2025-03-01 2:35 ` [PATCH v3 2/2] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC Pawan Gupta
1 sibling, 2 replies; 7+ messages in thread
From: Pawan Gupta @ 2025-03-01 2:35 UTC (permalink / raw)
To: x86, Josh Poimboeuf, Andrew Cooper; +Cc: linux-kernel
CALL_NOSPEC macro is used to generate Spectre-v2 mitigation friendly
indirect branches. At compile time the macro defaults to indirect branch,
and at runtime those can be patched to thunk based mitigations.
This approach is opposite of what is done for the rest of the kernel, where
the compile time default is to replace indirect calls with retpoline thunk
calls.
Make CALL_NOSPEC consistent with the rest of the kernel, default to
retpoline thunk at compile time when CONFIG_MITIGATION_RETPOLINE is
enabled.
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
---
arch/x86/include/asm/nospec-branch.h | 15 +++++----------
1 file changed, 5 insertions(+), 10 deletions(-)
diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
index 7e8bf78c03d5..1e6b915ce956 100644
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -424,16 +424,11 @@ static inline void call_depth_return_thunk(void) {}
* Inline asm uses the %V modifier which is only in newer GCC
* which is ensured when CONFIG_MITIGATION_RETPOLINE is defined.
*/
-# define CALL_NOSPEC \
- ALTERNATIVE_2( \
- ANNOTATE_RETPOLINE_SAFE \
- "call *%[thunk_target]\n", \
- "call __x86_indirect_thunk_%V[thunk_target]\n", \
- X86_FEATURE_RETPOLINE, \
- "lfence;\n" \
- ANNOTATE_RETPOLINE_SAFE \
- "call *%[thunk_target]\n", \
- X86_FEATURE_RETPOLINE_LFENCE)
+#ifdef CONFIG_MITIGATION_RETPOLINE
+#define CALL_NOSPEC "call __x86_indirect_thunk_%V[thunk_target]\n"
+#else
+#define CALL_NOSPEC "call *%[thunk_target]\n"
+#endif
# define THUNK_TARGET(addr) [thunk_target] "r" (addr)
--
2.34.1
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH v3 2/2] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC
2025-03-01 2:35 [PATCH v3 0/2] CALL_NOSPEC fixes Pawan Gupta
2025-03-01 2:35 ` [PATCH v3 1/2] x86/speculation: Simplify and make CALL_NOSPEC consistent Pawan Gupta
@ 2025-03-01 2:35 ` Pawan Gupta
2025-03-03 11:12 ` [tip: x86/urgent] " tip-bot2 for Pawan Gupta
2025-03-04 10:26 ` [tip: x86/cpu] " tip-bot2 for Pawan Gupta
1 sibling, 2 replies; 7+ messages in thread
From: Pawan Gupta @ 2025-03-01 2:35 UTC (permalink / raw)
To: x86, Josh Poimboeuf, Andrew Cooper; +Cc: linux-kernel
Retpoline mitigation for spectre-v2 uses thunks for indirect branches. To
support this mitigation compilers add a CS prefix with
-mindirect-branch-cs-prefix. For an indirect branch in asm, this needs to
be added manually.
CS prefix is already being added to indirect branches in asm files, but not
in inline asm. Add CS prefix to CALL_NOSPEC for inline asm as well. There
is no JMP_NOSPEC for inline asm.
Reported-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
---
arch/x86/include/asm/nospec-branch.h | 19 +++++++++++++++----
1 file changed, 15 insertions(+), 4 deletions(-)
diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
index 1e6b915ce956..aee26bb8230f 100644
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -198,9 +198,8 @@
.endm
/*
- * Equivalent to -mindirect-branch-cs-prefix; emit the 5 byte jmp/call
- * to the retpoline thunk with a CS prefix when the register requires
- * a RAX prefix byte to encode. Also see apply_retpolines().
+ * Emits a conditional CS prefix that is compatible with
+ * -mindirect-branch-cs-prefix.
*/
.macro __CS_PREFIX reg:req
.irp rs,r8,r9,r10,r11,r12,r13,r14,r15
@@ -420,12 +419,24 @@ static inline void call_depth_return_thunk(void) {}
#ifdef CONFIG_X86_64
+/*
+ * Emits a conditional CS prefix that is compatible with
+ * -mindirect-branch-cs-prefix.
+ */
+#define __CS_PREFIX(reg) \
+ ".irp rs,r8,r9,r10,r11,r12,r13,r14,r15\n" \
+ ".ifc \\rs," reg "\n" \
+ ".byte 0x2e\n" \
+ ".endif\n" \
+ ".endr\n"
+
/*
* Inline asm uses the %V modifier which is only in newer GCC
* which is ensured when CONFIG_MITIGATION_RETPOLINE is defined.
*/
#ifdef CONFIG_MITIGATION_RETPOLINE
-#define CALL_NOSPEC "call __x86_indirect_thunk_%V[thunk_target]\n"
+#define CALL_NOSPEC __CS_PREFIX("%V[thunk_target]") \
+ "call __x86_indirect_thunk_%V[thunk_target]\n"
#else
#define CALL_NOSPEC "call *%[thunk_target]\n"
#endif
--
2.34.1
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [tip: x86/urgent] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC
2025-03-01 2:35 ` [PATCH v3 2/2] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC Pawan Gupta
@ 2025-03-03 11:12 ` tip-bot2 for Pawan Gupta
2025-03-04 10:26 ` [tip: x86/cpu] " tip-bot2 for Pawan Gupta
1 sibling, 0 replies; 7+ messages in thread
From: tip-bot2 for Pawan Gupta @ 2025-03-03 11:12 UTC (permalink / raw)
To: linux-tip-commits
Cc: Josh Poimboeuf, Pawan Gupta, Ingo Molnar, Andrew Cooper,
Linus Torvalds, Peter Zijlstra, x86, linux-kernel
The following commit has been merged into the x86/urgent branch of tip:
Commit-ID: 9af9ad85ac44cb754e526d468c3006b48db5dfd8
Gitweb: https://git.kernel.org/tip/9af9ad85ac44cb754e526d468c3006b48db5dfd8
Author: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
AuthorDate: Fri, 28 Feb 2025 18:35:58 -08:00
Committer: Ingo Molnar <mingo@kernel.org>
CommitterDate: Mon, 03 Mar 2025 12:04:43 +01:00
x86/speculation: Add a conditional CS prefix to CALL_NOSPEC
Retpoline mitigation for spectre-v2 uses thunks for indirect branches. To
support this mitigation compilers add a CS prefix with
-mindirect-branch-cs-prefix. For an indirect branch in asm, this needs to
be added manually.
CS prefix is already being added to indirect branches in asm files, but not
in inline asm. Add CS prefix to CALL_NOSPEC for inline asm as well. There
is no JMP_NOSPEC for inline asm.
Reported-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250228-call-nospec-v3-2-96599fed0f33@linux.intel.com
---
arch/x86/include/asm/nospec-branch.h | 19 +++++++++++++++----
1 file changed, 15 insertions(+), 4 deletions(-)
diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
index 1e6b915..aee26bb 100644
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -198,9 +198,8 @@
.endm
/*
- * Equivalent to -mindirect-branch-cs-prefix; emit the 5 byte jmp/call
- * to the retpoline thunk with a CS prefix when the register requires
- * a RAX prefix byte to encode. Also see apply_retpolines().
+ * Emits a conditional CS prefix that is compatible with
+ * -mindirect-branch-cs-prefix.
*/
.macro __CS_PREFIX reg:req
.irp rs,r8,r9,r10,r11,r12,r13,r14,r15
@@ -421,11 +420,23 @@ static inline void call_depth_return_thunk(void) {}
#ifdef CONFIG_X86_64
/*
+ * Emits a conditional CS prefix that is compatible with
+ * -mindirect-branch-cs-prefix.
+ */
+#define __CS_PREFIX(reg) \
+ ".irp rs,r8,r9,r10,r11,r12,r13,r14,r15\n" \
+ ".ifc \\rs," reg "\n" \
+ ".byte 0x2e\n" \
+ ".endif\n" \
+ ".endr\n"
+
+/*
* Inline asm uses the %V modifier which is only in newer GCC
* which is ensured when CONFIG_MITIGATION_RETPOLINE is defined.
*/
#ifdef CONFIG_MITIGATION_RETPOLINE
-#define CALL_NOSPEC "call __x86_indirect_thunk_%V[thunk_target]\n"
+#define CALL_NOSPEC __CS_PREFIX("%V[thunk_target]") \
+ "call __x86_indirect_thunk_%V[thunk_target]\n"
#else
#define CALL_NOSPEC "call *%[thunk_target]\n"
#endif
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [tip: x86/urgent] x86/speculation: Simplify and make CALL_NOSPEC consistent
2025-03-01 2:35 ` [PATCH v3 1/2] x86/speculation: Simplify and make CALL_NOSPEC consistent Pawan Gupta
@ 2025-03-03 11:12 ` tip-bot2 for Pawan Gupta
2025-03-04 10:26 ` [tip: x86/cpu] " tip-bot2 for Pawan Gupta
1 sibling, 0 replies; 7+ messages in thread
From: tip-bot2 for Pawan Gupta @ 2025-03-03 11:12 UTC (permalink / raw)
To: linux-tip-commits
Cc: Pawan Gupta, Ingo Molnar, Andrew Cooper, Linus Torvalds,
Peter Zijlstra, x86, linux-kernel
The following commit has been merged into the x86/urgent branch of tip:
Commit-ID: 010c4a461c1dbf3fa75ddea8df018a6128b700c6
Gitweb: https://git.kernel.org/tip/010c4a461c1dbf3fa75ddea8df018a6128b700c6
Author: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
AuthorDate: Fri, 28 Feb 2025 18:35:43 -08:00
Committer: Ingo Molnar <mingo@kernel.org>
CommitterDate: Mon, 03 Mar 2025 12:04:42 +01:00
x86/speculation: Simplify and make CALL_NOSPEC consistent
CALL_NOSPEC macro is used to generate Spectre-v2 mitigation friendly
indirect branches. At compile time the macro defaults to indirect branch,
and at runtime those can be patched to thunk based mitigations.
This approach is opposite of what is done for the rest of the kernel, where
the compile time default is to replace indirect calls with retpoline thunk
calls.
Make CALL_NOSPEC consistent with the rest of the kernel, default to
retpoline thunk at compile time when CONFIG_MITIGATION_RETPOLINE is
enabled.
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250228-call-nospec-v3-1-96599fed0f33@linux.intel.com
---
arch/x86/include/asm/nospec-branch.h | 15 +++++----------
1 file changed, 5 insertions(+), 10 deletions(-)
diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
index 7e8bf78..1e6b915 100644
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -424,16 +424,11 @@ static inline void call_depth_return_thunk(void) {}
* Inline asm uses the %V modifier which is only in newer GCC
* which is ensured when CONFIG_MITIGATION_RETPOLINE is defined.
*/
-# define CALL_NOSPEC \
- ALTERNATIVE_2( \
- ANNOTATE_RETPOLINE_SAFE \
- "call *%[thunk_target]\n", \
- "call __x86_indirect_thunk_%V[thunk_target]\n", \
- X86_FEATURE_RETPOLINE, \
- "lfence;\n" \
- ANNOTATE_RETPOLINE_SAFE \
- "call *%[thunk_target]\n", \
- X86_FEATURE_RETPOLINE_LFENCE)
+#ifdef CONFIG_MITIGATION_RETPOLINE
+#define CALL_NOSPEC "call __x86_indirect_thunk_%V[thunk_target]\n"
+#else
+#define CALL_NOSPEC "call *%[thunk_target]\n"
+#endif
# define THUNK_TARGET(addr) [thunk_target] "r" (addr)
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [tip: x86/cpu] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC
2025-03-01 2:35 ` [PATCH v3 2/2] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC Pawan Gupta
2025-03-03 11:12 ` [tip: x86/urgent] " tip-bot2 for Pawan Gupta
@ 2025-03-04 10:26 ` tip-bot2 for Pawan Gupta
1 sibling, 0 replies; 7+ messages in thread
From: tip-bot2 for Pawan Gupta @ 2025-03-04 10:26 UTC (permalink / raw)
To: linux-tip-commits
Cc: Josh Poimboeuf, Pawan Gupta, Ingo Molnar, Andrew Cooper,
Linus Torvalds, Peter Zijlstra, x86, linux-kernel
The following commit has been merged into the x86/cpu branch of tip:
Commit-ID: 052040e34c08428a5a388b85787e8531970c0c67
Gitweb: https://git.kernel.org/tip/052040e34c08428a5a388b85787e8531970c0c67
Author: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
AuthorDate: Fri, 28 Feb 2025 18:35:58 -08:00
Committer: Ingo Molnar <mingo@kernel.org>
CommitterDate: Tue, 04 Mar 2025 11:14:42 +01:00
x86/speculation: Add a conditional CS prefix to CALL_NOSPEC
Retpoline mitigation for spectre-v2 uses thunks for indirect branches. To
support this mitigation compilers add a CS prefix with
-mindirect-branch-cs-prefix. For an indirect branch in asm, this needs to
be added manually.
CS prefix is already being added to indirect branches in asm files, but not
in inline asm. Add CS prefix to CALL_NOSPEC for inline asm as well. There
is no JMP_NOSPEC for inline asm.
Reported-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250228-call-nospec-v3-2-96599fed0f33@linux.intel.com
---
arch/x86/include/asm/nospec-branch.h | 19 +++++++++++++++----
1 file changed, 15 insertions(+), 4 deletions(-)
diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
index 1e6b915..aee26bb 100644
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -198,9 +198,8 @@
.endm
/*
- * Equivalent to -mindirect-branch-cs-prefix; emit the 5 byte jmp/call
- * to the retpoline thunk with a CS prefix when the register requires
- * a RAX prefix byte to encode. Also see apply_retpolines().
+ * Emits a conditional CS prefix that is compatible with
+ * -mindirect-branch-cs-prefix.
*/
.macro __CS_PREFIX reg:req
.irp rs,r8,r9,r10,r11,r12,r13,r14,r15
@@ -421,11 +420,23 @@ static inline void call_depth_return_thunk(void) {}
#ifdef CONFIG_X86_64
/*
+ * Emits a conditional CS prefix that is compatible with
+ * -mindirect-branch-cs-prefix.
+ */
+#define __CS_PREFIX(reg) \
+ ".irp rs,r8,r9,r10,r11,r12,r13,r14,r15\n" \
+ ".ifc \\rs," reg "\n" \
+ ".byte 0x2e\n" \
+ ".endif\n" \
+ ".endr\n"
+
+/*
* Inline asm uses the %V modifier which is only in newer GCC
* which is ensured when CONFIG_MITIGATION_RETPOLINE is defined.
*/
#ifdef CONFIG_MITIGATION_RETPOLINE
-#define CALL_NOSPEC "call __x86_indirect_thunk_%V[thunk_target]\n"
+#define CALL_NOSPEC __CS_PREFIX("%V[thunk_target]") \
+ "call __x86_indirect_thunk_%V[thunk_target]\n"
#else
#define CALL_NOSPEC "call *%[thunk_target]\n"
#endif
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [tip: x86/cpu] x86/speculation: Simplify and make CALL_NOSPEC consistent
2025-03-01 2:35 ` [PATCH v3 1/2] x86/speculation: Simplify and make CALL_NOSPEC consistent Pawan Gupta
2025-03-03 11:12 ` [tip: x86/urgent] " tip-bot2 for Pawan Gupta
@ 2025-03-04 10:26 ` tip-bot2 for Pawan Gupta
1 sibling, 0 replies; 7+ messages in thread
From: tip-bot2 for Pawan Gupta @ 2025-03-04 10:26 UTC (permalink / raw)
To: linux-tip-commits
Cc: Pawan Gupta, Ingo Molnar, Andrew Cooper, Linus Torvalds,
Peter Zijlstra, x86, linux-kernel
The following commit has been merged into the x86/cpu branch of tip:
Commit-ID: cfceff8526a426948b53445c02bcb98453c7330d
Gitweb: https://git.kernel.org/tip/cfceff8526a426948b53445c02bcb98453c7330d
Author: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
AuthorDate: Fri, 28 Feb 2025 18:35:43 -08:00
Committer: Ingo Molnar <mingo@kernel.org>
CommitterDate: Tue, 04 Mar 2025 11:14:35 +01:00
x86/speculation: Simplify and make CALL_NOSPEC consistent
CALL_NOSPEC macro is used to generate Spectre-v2 mitigation friendly
indirect branches. At compile time the macro defaults to indirect branch,
and at runtime those can be patched to thunk based mitigations.
This approach is opposite of what is done for the rest of the kernel, where
the compile time default is to replace indirect calls with retpoline thunk
calls.
Make CALL_NOSPEC consistent with the rest of the kernel, default to
retpoline thunk at compile time when CONFIG_MITIGATION_RETPOLINE is
enabled.
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250228-call-nospec-v3-1-96599fed0f33@linux.intel.com
---
arch/x86/include/asm/nospec-branch.h | 15 +++++----------
1 file changed, 5 insertions(+), 10 deletions(-)
diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
index 7e8bf78..1e6b915 100644
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -424,16 +424,11 @@ static inline void call_depth_return_thunk(void) {}
* Inline asm uses the %V modifier which is only in newer GCC
* which is ensured when CONFIG_MITIGATION_RETPOLINE is defined.
*/
-# define CALL_NOSPEC \
- ALTERNATIVE_2( \
- ANNOTATE_RETPOLINE_SAFE \
- "call *%[thunk_target]\n", \
- "call __x86_indirect_thunk_%V[thunk_target]\n", \
- X86_FEATURE_RETPOLINE, \
- "lfence;\n" \
- ANNOTATE_RETPOLINE_SAFE \
- "call *%[thunk_target]\n", \
- X86_FEATURE_RETPOLINE_LFENCE)
+#ifdef CONFIG_MITIGATION_RETPOLINE
+#define CALL_NOSPEC "call __x86_indirect_thunk_%V[thunk_target]\n"
+#else
+#define CALL_NOSPEC "call *%[thunk_target]\n"
+#endif
# define THUNK_TARGET(addr) [thunk_target] "r" (addr)
^ permalink raw reply related [flat|nested] 7+ messages in thread
end of thread, other threads:[~2025-03-04 10:26 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-01 2:35 [PATCH v3 0/2] CALL_NOSPEC fixes Pawan Gupta
2025-03-01 2:35 ` [PATCH v3 1/2] x86/speculation: Simplify and make CALL_NOSPEC consistent Pawan Gupta
2025-03-03 11:12 ` [tip: x86/urgent] " tip-bot2 for Pawan Gupta
2025-03-04 10:26 ` [tip: x86/cpu] " tip-bot2 for Pawan Gupta
2025-03-01 2:35 ` [PATCH v3 2/2] x86/speculation: Add a conditional CS prefix to CALL_NOSPEC Pawan Gupta
2025-03-03 11:12 ` [tip: x86/urgent] " tip-bot2 for Pawan Gupta
2025-03-04 10:26 ` [tip: x86/cpu] " tip-bot2 for Pawan Gupta
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox