Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751468AbeAGFVc (ORCPT + 1 other); Sun, 7 Jan 2018 00:21:32 -0500 Received: from merlin.infradead.org ([205.233.59.134]:42764 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751025AbeAGFV3 (ORCPT ); Sun, 7 Jan 2018 00:21:29 -0500 Subject: Re: [RFCv2 2/4] Documentation: document nospec helpers To: Mark Rutland , linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org Cc: dan.j.williams@intel.com, elena.reshetova@intel.com, corbet@lwn.net, alan@linux.intel.com, peterz@infradead.org, will.deacon@arm.com, gregkh@linuxfoundation.org, tglx@linutronix.de, Paul Turner References: <20180105145750.53294-1-mark.rutland@arm.com> <20180105145750.53294-3-mark.rutland@arm.com> From: Randy Dunlap Message-ID: Date: Sat, 6 Jan 2018 21:20:59 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20180105145750.53294-3-mark.rutland@arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On 01/05/18 06:57, Mark Rutland wrote: > Document the rationale and usage of the new nospec*() helpers. > > Signed-off-by: Mark Rutland > Signed-off-by: Will Deacon > Cc: Dan Williams > Cc: Jonathan Corbet > Cc: Peter Zijlstra > --- > Documentation/speculation.txt | 166 ++++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 166 insertions(+) > create mode 100644 Documentation/speculation.txt > > diff --git a/Documentation/speculation.txt b/Documentation/speculation.txt > new file mode 100644 > index 000000000000..748fcd4dcda4 > --- /dev/null > +++ b/Documentation/speculation.txt > @@ -0,0 +1,166 @@ > + > +Typically speculative execution cannot be observed from architectural state, > +such as the contents of registers. However, in some cases it is possible to > +observe its impact on microarchitectural state, such as the presence or > +absence of data in caches. Such state may form side-channels which can be > +observed to extract secret information. I'm curious about what it takes to observe this... or is that covered in the exploit papers? thanks, -- ~Randy