Received: by 10.223.176.46 with SMTP id f43csp1105379wra; Wed, 24 Jan 2018 10:42:26 -0800 (PST) X-Google-Smtp-Source: AH8x2246Uw5KWWaN90523VbLM7XahP+r6R4RyvClR3fKdQk8mcRvdePvbE8NWBX6zpxgvvHojNF1 X-Received: by 10.99.152.10 with SMTP id q10mr2423700pgd.212.1516819346031; Wed, 24 Jan 2018 10:42:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516819346; cv=none; d=google.com; s=arc-20160816; b=E4A9CYvQGi3tpMCeaUAliQhnqm/9b3uy3ddbvgSeqekoK2XSO3b6ojpkSbskMqC1Oa lZVmYsLvtfoNM+E6rmp4h/EQrLnLfqLo3Wj7FYniPBXMrIH4QgiiBmKdLkX1xQZiWKSr P0bX/dRKkQ0Fj6b2xZiKAvamos53gK3+sTHIDpcmVSdu7agH2pR0lx+oT/9W837UaFz0 iVyEmxf1I1X/NM8uQ35f2cbYjA0B/G1AGN4XFzQZtIpJpbR9wKY5+sZwjKhx7sxemsPT xO4d049i1II1cDLCFMxdeqFskd8kRPOq7VOZpw12RnxDKbM1rgSlj/R0pOFg6hZ8a2ap XyyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=9uRNfUuWH/72ZTeRUpgMZ9HgVI3WuBpktkWdCJRfv5k=; b=gjoHHTPjgtAxePmBrT/orbImn71UO/OZE6awu+/fASgqp7kvR7fdMZl6DZoOCQUCGY B0UotoNqmt+DfWcPtpSH26XA62q7Ro/NVyF7O4w5xzW8dm0awz0vY507bfM3ONc2DSov KLFryTa67zvwdg0xs8D23+m50Cw1sBe/nupKuzqaHC86D693H9tK4pul6v+/1iwLJFga InEuFVlWgTMYEMQmoZlPj1aoPhri55x6KZLacCjMjoH/FhRLaM/PShaiKujTQEc5gmuJ TwWffBcidOpqFu+UwglsS6j118VtSwoX07yEt2z0ZPk6jD6pFtmJ2D7wiRbvhUFXo8Dd 2CgQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b1-v6si562162pld.281.2018.01.24.10.42.11; Wed, 24 Jan 2018 10:42:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965190AbeAXSkx convert rfc822-to-8bit (ORCPT + 99 others); Wed, 24 Jan 2018 13:40:53 -0500 Received: from www.llwyncelyn.cymru ([82.70.14.225]:36554 "EHLO fuzix.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964982AbeAXSkv (ORCPT ); Wed, 24 Jan 2018 13:40:51 -0500 Received: from alans-desktop (82-70-14-226.dsl.in-addr.zen.co.uk [82.70.14.226]) by fuzix.org (8.15.2/8.15.2) with ESMTP id w0OIeZ85014047; Wed, 24 Jan 2018 18:40:35 GMT Date: Wed, 24 Jan 2018 18:40:35 +0000 From: Alan Cox To: David Woodhouse Cc: Dave Hansen , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors Message-ID: <20180124183958.267e405b@alans-desktop> In-Reply-To: <1516815723.13558.164.camel@infradead.org> References: <1516726375-25168-1-git-send-email-dwmw@amazon.co.uk> <1516726375-25168-6-git-send-email-dwmw@amazon.co.uk> <20180123173312.1d8cf02f@alans-desktop> <1516811127.13558.150.camel@infradead.org> <20180124170652.4c78ca17@alans-desktop> <1516815723.13558.164.camel@infradead.org> Organization: Intel Corporation X-Mailer: Claws Mail 3.15.1-dirty (GTK+ 2.24.31; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > > AND K5 speculates, Cyrix 6x86 speculates, IDT WinChip does not. I think > > this should be > > > > X86_VENDOR_ANY, 4 > > X86_VENDOR_INTEL, 5, > > X86_VENDOR_CENTAUR, 5, > > Hm, for the specific case of controlling X86_BUG_CPU_MELTDOWN it's not > just "speculates" which is the criterion. It's "optimises away the > permissions checks while speculating, on the assumption that it'll be > fixed up before retiring the instruction". Nobody has published official statements on Cyrix or AMD 32bit processors so we don't know if they are vulnerable to meltdown. One problem I suspect is that as with things like Alpha 21264 - the people who knew are probably long retired. We do know the Intel ones I listed are OK and the Centaur. If someone can figure out the Cyrix and AMD cases that would be great. > By the time the dust settles we might end up with a bunch of different > match tables, *one* of which is "does not speculate at all". And the > conditions for the different bugs will each use different sets of match > tables. For example > >  if (!x86_match_cpu(cpu_no_speculation_at_all) && >      !x86_match_cpu(speculation_but_no_meltdown) && >      !cpu_sets_rdcl_no()) > setup_force_cpu_bug(X86_BUG_CPU_MELTDOWN); > >  if (!x86_match_cpu(cpu_no_speculation_at_all) && >      !x86_match_cpu(no_branch_target_buffer)) > setup_force_cpu_bug(X86_BUG_SPECTRE_V2); There are afaik no x86 processors that speculate and don't have a BTB. It's a bit like building a racing car with no gearbox. Alan