Received: by 10.223.176.5 with SMTP id f5csp1362300wra; Wed, 31 Jan 2018 05:25:30 -0800 (PST) X-Google-Smtp-Source: AH8x225/j1nB7LD409OcsOFxSljdKk+eJguVRi/C0P4AuUNigGMIki8iv5q4TbuB4ECXckVwvC01 X-Received: by 10.99.186.18 with SMTP id k18mr9452005pgf.7.1517405130660; Wed, 31 Jan 2018 05:25:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517405130; cv=none; d=google.com; s=arc-20160816; b=WF3mx0OnhZt8f78UinHz7V/oY8s2d/zQMERY7O7XqcEktn3cHyprPZRYhmAaTWnaQR X0DM86ZP6o23v1wNzF1j9EQJ8qhewWod137mWVuQvwjerTCORyIdsROm+2d+AcSr5v7w /2qAhZbvNMttiYSXN+CR/7PK5uub8+NCpa379pBBT4xy72AZ5aqXEtORVVShtV7nSM6f UgutkV7AEOr500pZjFhlqiJMSsmn5tlC0fEwB24N4XvmD0ZE9q7R2l/fhD/ymlKIFfTb 58Z/o0Aw+6qUWuMutV3c6Pl2bUeW5NXhQoXEoAramzREv+YIw6Ev/iTL7sX0fMjKN4f1 e03w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=Tvy67Fti/qHft4DTnpkUwoNpHR4AjFozv/dj36PKRb0=; b=iyfFEVR4oF5iFtMoASg3/UpyYeu8iOAMbUoYVZYvJxK33ZJkVbw+QWFSGvjykXp5BA EC10UqHprpTY5D31aitMCIrifh8m8VHhRjJftw5IEMy6R4VmJgEN8v8xNrfROKOoyBnl h1hrKm4HpE0pgEqx6U++7V4oHKyTC5QsQcgR/4AC+pU5NTxrr0Wds4s6lMEprS8Xsnt+ J4d7mFWl2fvJmHosthMWZPEbrdfUQP4HnS0MWOaKxZeL/pRNuv3cHToq8Z+WWCM5sfAh egWb+XxCF2WbDTVo4Jn7NeJyuFahjcOVcwggXkn6PvmhQl5Ctp+A5urXwGvkvAReJ5iz 2onA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k11si1213025pgc.143.2018.01.31.05.25.15; Wed, 31 Jan 2018 05:25:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753467AbeAaNYw (ORCPT + 99 others); Wed, 31 Jan 2018 08:24:52 -0500 Received: from mx1.redhat.com ([209.132.183.28]:58484 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751662AbeAaNYv (ORCPT ); Wed, 31 Jan 2018 08:24:51 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D922F8E69A; Wed, 31 Jan 2018 13:24:50 +0000 (UTC) Received: from treble (ovpn-120-124.rdu2.redhat.com [10.10.120.124]) by smtp.corp.redhat.com (Postfix) with SMTP id EDE475EE04; Wed, 31 Jan 2018 13:24:49 +0000 (UTC) Date: Wed, 31 Jan 2018 07:24:49 -0600 From: Josh Poimboeuf To: Dominik Brodowski Cc: mingo@kernel.org, hpa@zytor.com, tim.c.chen@linux.intel.com, dwmw@amazon.co.uk, linux-kernel@vger.kernel.org, tglx@linutronix.de Subject: Re: [tip:x86/pti] x86/speculation: Use Indirect Branch Prediction Barrier in context switch Message-ID: <20180131132449.qnfj32gufhgjc262@treble> References: <1517263487-3708-1-git-send-email-dwmw@amazon.co.uk> <20180131070300.GA28206@light.dominikbrodowski.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180131070300.GA28206@light.dominikbrodowski.net> User-Agent: Mutt/1.6.0.1 (2016-04-01) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Wed, 31 Jan 2018 13:24:51 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 31, 2018 at 08:03:00AM +0100, Dominik Brodowski wrote: > On Tue, Jan 30, 2018 at 02:39:45PM -0800, tip-bot for Tim Chen wrote: > > Commit-ID: 18bf3c3ea8ece8f03b6fc58508f2dfd23c7711c7 > > Gitweb: https://git.kernel.org/tip/18bf3c3ea8ece8f03b6fc58508f2dfd23c7711c7 > > Author: Tim Chen > > AuthorDate: Mon, 29 Jan 2018 22:04:47 +0000 > > Committer: Thomas Gleixner > > CommitDate: Tue, 30 Jan 2018 23:09:21 +0100 > > > > x86/speculation: Use Indirect Branch Prediction Barrier in context switch > > > > Flush indirect branches when switching into a process that marked itself > > non dumpable. This protects high value processes like gpg better, > > without having too high performance overhead. > > For the record, I am still opposed to limit this to non-dumpable processes. > Whether a process needs protection by IBPB on context switches is a > different question to whether a process should be allowed to be dumped, > though the former may be a superset of the latter. In my opinion, IBPB > should be enabled on all context switches to userspace processes, until we > have a clear mitigation strategy for userspace against Spectre-v2 designed > and implemented. > > Thanks, > Dominik > > -------------------------- > From: Dominik Brodowski > Date: Wed, 31 Jan 2018 07:43:12 +0100 > Subject: [PATCH] x86/speculation: Do not limit Indirect Branch Prediction Barrier to non-dumpable processes > > Whether a process needs protection by IBPB on context switches is a > different question to whether a process should be allowed to be dumped, > though the former may be a superset of the latter. Enable IBPB on all > context switches to a different userspace process, until we have a clear > mitigation strategy for userspace against Spectre-v2 designed and > implemented. > > Signed-off-by: Dominik Brodowski Acked-by: Josh Poimboeuf -- Josh