Received: by 10.223.176.5 with SMTP id f5csp2783109wra; Mon, 29 Jan 2018 04:01:27 -0800 (PST) X-Google-Smtp-Source: AH8x224dckAGKOETOVGIY1539vgYJJ633R6MFpdfBHa7DJXHoJe2Fp62PE0yZ2S0JoXhCgc4sfwe X-Received: by 10.98.73.157 with SMTP id r29mr26993804pfi.41.1517227287665; Mon, 29 Jan 2018 04:01:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517227287; cv=none; d=google.com; s=arc-20160816; b=Yr26Are2t101eyNLR5dFT/N0rCdRRyV5VUJGS4NLQaTBhFDJSMoStRP8pkoKLC+7JA uhwxtjl3wndBCmk3W6bUd0brSeq5xv7Rj9yn7e7A6k9EkPF+PoJ5l0uN3/vBcK39mbtc cVmjhhBsxE9ViDMRH9EPwdRicShkt8jQGhbfG16O/ji2SwuV4bZK4klyktHeOy5UzUVP zzoZmyFAkjuu3d8NA8blJMUjuuxOluEd+J+tU+8W7MWDbB0QUaB0COkXT5wbV3r9NHwV Om4bCYd4e6lHoxwnKH/IOQQRYHlw14FhZ1ef83jdkzjMTZU0CJmZ5GpkXZpWSp54ZIya ZqmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject:arc-authentication-results; bh=+arcH67Kejum2H+j7FbgH3zAyrP4NvU+EHU3y2Hzuuc=; b=OJA/NAFXthI51oChljyV4kTM/VMLCnCo85ybBl7/JNMCBVoBOZpx6AURp2nEn1gPNS OHd3NBISXEbjsytj9wqgkFNGeG5b6Kh5AZOJ8WMhTFad60bVHa85S+n/EXukmfOIFtTx fiwjxfHdubu7LQirxcfPV4eTSv0VvG4GdviiMYeKWbCB0Fg2o85m2irx3FQAWQDOACEa s1yxUUkr7kouwCq5JeuLyprqNP+XWlgBzay8z1dY5CuAZozbtymgqDR6HGlss2UQGviU 1M9V4pBzPADKhFD5vvga1HuaxcHWRWkh0Pn9VmabpbulLEsnbmwKfZ7Wg2G6+kz+tGwN q4pg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w15-v6si9620020pll.160.2018.01.29.04.01.12; Mon, 29 Jan 2018 04:01:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751804AbeA2MAN (ORCPT + 99 others); Mon, 29 Jan 2018 07:00:13 -0500 Received: from smtp5-g21.free.fr ([212.27.42.5]:29614 "EHLO smtp5-g21.free.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751702AbeA2MAM (ORCPT ); Mon, 29 Jan 2018 07:00:12 -0500 Received: from [172.27.0.114] (unknown [92.154.11.170]) (Authenticated sender: slash.tmp) by smtp5-g21.free.fr (Postfix) with ESMTPSA id D54FA5FFCD; Mon, 29 Jan 2018 12:59:57 +0100 (CET) Subject: Re: [RFC 09/10] x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation To: Greg Kroah-Hartman Cc: LKML , Linux ARM , Marc Zyngier , Will Deacon , Arnd Bergmann References: <1516566497.9814.78.camel@infradead.org> <1516572013.9814.109.camel@infradead.org> <1516638426.9521.20.camel@infradead.org> <20180123072930.soz25cyky3u4hpgv@gmail.com> <20180123075358.nztpyxympwfkyi2a@gmail.com> <1516699832.9521.123.camel@infradead.org> <20180125171616.GA25130@kroah.com> From: Mason Message-ID: <1b430c16-2090-41e3-82d7-ef3d9b63fe2b@free.fr> Date: Mon, 29 Jan 2018 12:59:46 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.1 MIME-Version: 1.0 In-Reply-To: <20180125171616.GA25130@kroah.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Dropping large CC list ] On 25/01/2018 18:16, Greg Kroah-Hartman wrote: > On Thu, Jan 25, 2018 at 05:19:04PM +0100, Mason wrote: > >> On 23/01/2018 10:30, David Woodhouse wrote: >> >>> Skylake takes predictions from the generic branch target buffer when >>> the RSB underflows. >> >> Adding LAKML. >> >> AFAIU, some ARM Cortex cores have the same optimization. >> (A9 maybe, A17 probably, some recent 64-bit cores) >> >> Are there software work-arounds for Spectre planned for arm32 and arm64? > > Yes, I think they are currently buried in one of the arm64 trees, and > they have been posted to the mailing list a few times in the past. Found the burial ground, thanks Greg. https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti Via https://developer.arm.com/support/security-update "For Cortex-R8, Cortex-A8, Cortex-A9, and Cortex-A17, invalidate the branch predictor using a BPIALL instruction." The latest arm32 patch series was submitted recently: https://www.spinics.net/lists/arm-kernel/msg630892.html Regards.