Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754235AbeAGRXI (ORCPT + 1 other); Sun, 7 Jan 2018 12:23:08 -0500 Received: from lang.hm ([66.167.227.134]:49097 "EHLO bifrost.lang.hm" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754161AbeAGRXH (ORCPT ); Sun, 7 Jan 2018 12:23:07 -0500 Date: Sun, 7 Jan 2018 09:21:44 -0800 (PST) From: David Lang X-X-Sender: dlang@dlang-laptop To: Borislav Petkov cc: Willy Tarreau , Dave Hansen , Thomas Gleixner , Jon Masters , "Woodhouse, David" , Paolo Bonzini , Alan Cox , Linus Torvalds , Andi Kleen , Greg Kroah-Hartman , Tim Chen , Linux Kernel Mailing List , Jeff Law , Nick Clifton Subject: Re: Avoid speculative indirect calls in kernel In-Reply-To: <20180107141410.d6xd573s436ma5kz@pd.tnic> Message-ID: References: <20180104015920.1ad7b9d3@alans-desktop> <1515054014.12987.75.camel@amazon.co.uk> <403e65be-cfd1-fd08-0401-2e26470b63d4@redhat.com> <4dde456c-fd15-e768-8876-5844c8b7c455@redhat.com> <20180105064946.GA4007@1wt.eu> <44f1b753-47d3-82e3-9401-256b4beadd4f@intel.com> <20180105071333.GA4029@1wt.eu> <20180107141410.d6xd573s436ma5kz@pd.tnic> User-Agent: Alpine 2.21.1 (DEB 209 2017-03-23) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: The point is that in many cases, if someone explits the "trusted" process, they already have everything that the machine is able to do anyway.