Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751888AbeADB3e (ORCPT + 1 other); Wed, 3 Jan 2018 20:29:34 -0500 Received: from twin.jikos.cz ([91.219.245.39]:41612 "EHLO twin.jikos.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751593AbeADB3d (ORCPT ); Wed, 3 Jan 2018 20:29:33 -0500 Date: Thu, 4 Jan 2018 02:27:54 +0100 (CET) From: Jiri Kosina To: Alan Cox cc: Linus Torvalds , Dan Williams , Linux Kernel Mailing List , Mark Rutland , linux-arch@vger.kernel.org, Peter Zijlstra , Greg KH , Thomas Gleixner , Elena Reshetova , Alan Cox Subject: Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier In-Reply-To: <20180104010754.22ca6a74@alans-desktop> Message-ID: References: <20180103223827.39601-1-mark.rutland@arm.com> <151502463248.33513.5960736946233335087.stgit@dwillia2-desk3.amr.corp.intel.com> <20180104010754.22ca6a74@alans-desktop> User-Agent: Alpine 2.00 (LRH 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Thu, 4 Jan 2018, Alan Cox wrote: > There are people trying to tune coverity and other tool rules to identify > cases, Yeah, but that (and *especially* Coverity) is so inconvenient to be applied to each and every patch ... that this is not the way to go. If the CPU speculation can cause these kinds of side-effects, it just must not happen, full stop. OS trying to work it around is just a whack-a-mole (which we can apply for old silicon, sure ... but not something that becomes a new standard) that's never going to lead to any ultimate solution. -- Jiri Kosina SUSE Labs