Received: by 10.223.185.116 with SMTP id b49csp1928528wrg; Sat, 17 Feb 2018 08:20:06 -0800 (PST) X-Google-Smtp-Source: AH8x225YwosTnA/AijFQwc3KkL992DvcHlWhGLTLlsAEg1b2vLgYEkw9ijTciLcX984ON5ipXykJ X-Received: by 2002:a17:902:bd09:: with SMTP id p9-v6mr8614589pls.355.1518884406705; Sat, 17 Feb 2018 08:20:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518884406; cv=none; d=google.com; s=arc-20160816; b=X8PmwMPP+VtuucMO7vJU37wQ/Lo+J+y/GsP5Y5KfVTZZkYc7FZw5pUzp3fKWzzdfzP PsCWzU29B+sV0mEGlt5M1OIzyyG2MPAjPoB12saYGIeg0O72DTl4qQtw4vA4EcA0Rbnb w91HX3r1GFKCH0RXOb+sNt36mpwt1VDk6q80w+sEljMoxJCfV5oa1ASyQR3fFWQW1d2c Da28KC9PFXJL1kaeEi6bNn7Zax81nXdOKTDX4mKNQR9clqUJq+OUnf+DfhcuhrnUZTqa uLAhhzepnmH/N87FXoNTo9MoSxNiP9GDcEGzzcV8ZJ7eDEH0Wf5DtP8sDp0LPFyi7SA4 MK8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=+2azMcjTtYd7pdzlZXCzzweaVUibyo/jn5m8SA3GnTI=; b=MtALIVuMA5qdlmKtIBO4VaPWzTOGztcW0QgPb9EGji1m90WPiW+h6d0S0IACjStOL3 oR15gmcQTHQkvOqKrpE8Rn3hFKTbnqIY45+24yQjS3saac++dvJIEJVqofmKU2a9/2h5 v2IE3Fw8F9d2v+UBEeY8+ifKgXi0/ufMlqn508OivecUENecDeXVAnehN17ZOwDrmN0F YTb3IjptFTAmOBYoPGPq8of9ByZE8p/UMB6jDqP3rwxuoGfOY3fYG5G7Ds0PPfuvV9yW Sf3HK4oZbGwiSU+o6ijuVH+Cpc6l20iqIDyfeKm2KWZLw5fAvqn/QwrMMpWqYzT2ySdU RR8Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ay2-v6si984669plb.664.2018.02.17.08.19.52; Sat, 17 Feb 2018 08:20:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751156AbeBQQSD (ORCPT + 99 others); Sat, 17 Feb 2018 11:18:03 -0500 Received: from mga04.intel.com ([192.55.52.120]:4224 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751033AbeBQQSB (ORCPT ); Sat, 17 Feb 2018 11:18:01 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Feb 2018 08:18:01 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,525,1511856000"; d="scan'208";a="205075825" Received: from tassilo.jf.intel.com (HELO tassilo.localdomain) ([10.7.201.35]) by fmsmga006.fm.intel.com with ESMTP; 17 Feb 2018 08:18:01 -0800 Received: by tassilo.localdomain (Postfix, from userid 1000) id AB1043015B7; Sat, 17 Feb 2018 08:17:46 -0800 (PST) Date: Sat, 17 Feb 2018 08:17:46 -0800 From: Andi Kleen To: Ard Biesheuvel Cc: Peter Jones , "Luck, Tony" , James Bottomley , Joe Konno , Matthew Garrett , Ingo Molnar , Andy Lutomirski , Borislav Petkov , "linux-efi@vger.kernel.org" , Linux Kernel Mailing List , Jeremy Kerr , Benjamin Drung Subject: Re: [PATCH 0/2] efivars: reading variables can generate SMIs Message-ID: <20180217161746.GC3231@tassilo.jf.intel.com> References: <20180215182208.35003-1-joe.konno@linux.intel.com> <1518814319.4419.10.camel@HansenPartnership.com> <3908561D78D1C84285E8C5FCA982C28F7B37942B@ORSMSX110.amr.corp.intel.com> <20180216220536.liew4p4kqmaxwmfh@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Would rate limiting (but not only for non-root) help mitigate Spectre > v1 issues in UEFI runtime services code as well? I have been looking > into unmapping the entire kernel while such calls are in progress, > because firmware is likely to remain vulnerable long after the OSes > have been fixed, and we may be able to kill two birds with one stone > here (and not break userland in the process) Yes a global rate limit would seem like a good compromise. -Andi