Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754545AbeAGTZV convert rfc822-to-8bit (ORCPT + 1 other); Sun, 7 Jan 2018 14:25:21 -0500 Received: from www.llwyncelyn.cymru ([82.70.14.225]:58550 "EHLO fuzix.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754312AbeAGTZT (ORCPT ); Sun, 7 Jan 2018 14:25:19 -0500 Date: Sun, 7 Jan 2018 19:24:18 +0000 From: Alan Cox To: James Bottomley Cc: David Miller , w@1wt.eu, alexei.starovoitov@gmail.com, torvalds@linux-foundation.org, dan.j.williams@intel.com, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, ak@linux.intel.com, arnd@arndb.de, gregkh@linuxfoundation.org, peterz@infradead.org, netdev@vger.kernel.org, mingo@redhat.com, hpa@zytor.com, tglx@linutronix.de Subject: Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok Message-ID: <20180107192418.0f0b66a8@alans-desktop> In-Reply-To: <1515345560.3075.7.camel@HansenPartnership.com> References: <20180106181331.mmrqwwbu2jcjj2si@ast-mbp> <20180106183859.1ad9ae37@alans-desktop> <20180106204229.GD9075@1wt.eu> <20180106.203654.731754766847198456.davem@davemloft.net> <1515345560.3075.7.camel@HansenPartnership.com> Organization: Intel Corporation X-Mailer: Claws Mail 3.15.1-dirty (GTK+ 2.24.31; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: > everyone.  I'm not saying this always happens, but it is reasonable to > let the iterative pushback see if we can get to better code in this > case rather than trying to cut it of with the "because *security*" > argument. > I'm not arguing otherwise - I'd just prefer most users machines are secure while we have the discussion and while we see what other architectural tricks people can come up with Alan