Received: by 10.223.185.116 with SMTP id b49csp8896481wrg; Fri, 2 Mar 2018 09:45:32 -0800 (PST) X-Google-Smtp-Source: AG47ELtOyG/WXGrcx+T+8MAUiDbgy+d2wk4VA70xrURxs7o9fm9xhfhBX26dzYv391uVnxcxEp5H X-Received: by 2002:a17:902:8697:: with SMTP id g23-v6mr4199103plo.393.1520012731972; Fri, 02 Mar 2018 09:45:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520012731; cv=none; d=google.com; s=arc-20160816; b=YAAUdgEzBf3sHO/p1W40/9RVcNRdob89o+7QZPs3TdumQpn/XyIfLAFbm0fmg5kOoz 75zxv8nwsWGcqg5cSruFIV4VIFffKnEb55/2ZzakXLOF2cNNjP57Pq8mWk+IytSEw6r4 qWLkhLrRYl7NPAu6KNpGm69SVaZPfr78NK0qvmEURD/XpVESovLQdjVlMpeXFMIq++FL XD47Asdzod2nmcd7ftnz5dBNvxm5N0/KJCspk0di4/Sy7SRdBc2IMV4RDsg9TaJNYTCi OLBa1RdFwyNhCDST91AN0bdtVh5vOUkr0SO7oYdHWmyxOFZQHgnYaFkFAHyqz+LKOUWP +Wew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=vOOVzcwPhmBSwCLGwYpbX4mCIGrwz7TAKHf72KqJ0Bc=; b=NE88phEmBHfD+69KfExiy6LWAChWrtjBqf6G7xiQAy9VFwddn6nnpkmSjOKBUITyCT KbICcuul39uXkxL3eN3DwvuLq+2HjPljvCREAlGhvZCZ7lX/nEnwmXP5Mr1EaLg4Nisi L3BfBkWYcDm8lkBCQBy2H/ne0dRuHmykHh6gzqTKIEvTb75pqex6OFHH5B27fF5L8GMY /ECar0RGRrMPrswMsRo3KKab2ngPnUC7lsLr8Olq4fF4goIRj4XeN5fFrx2KICdiHi2i l+VnQGY2WxNBrUlRRauFH871oIwcUK8yCpAX1z40UqcimrpmGguaKfbAnqbJ7fRmEooh lNbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a24si5209010pfc.36.2018.03.02.09.45.17; Fri, 02 Mar 2018 09:45:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1946197AbeCBKat (ORCPT + 99 others); Fri, 2 Mar 2018 05:30:49 -0500 Received: from foss.arm.com ([217.140.101.70]:52704 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1945989AbeCBKao (ORCPT ); Fri, 2 Mar 2018 05:30:44 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4282B1435; Fri, 2 Mar 2018 02:30:44 -0800 (PST) Received: from edgewater-inn.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 12BAC3F318; Fri, 2 Mar 2018 02:30:44 -0800 (PST) Received: by edgewater-inn.cambridge.arm.com (Postfix, from userid 1000) id E10951AE1293; Fri, 2 Mar 2018 10:30:46 +0000 (GMT) Date: Fri, 2 Mar 2018 10:30:46 +0000 From: Will Deacon To: Alex Shi Cc: Greg KH , Marc Zyngier , Ard Biesheuvel , Catalin Marinas , stable@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 00/45] arm Spectre fix backport review for LTS 4.9 Message-ID: <20180302103046.GC19323@arm.com> References: <1519908862-11425-1-git-send-email-alex.shi@linaro.org> <20180301164630.GB23321@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 02, 2018 at 05:02:32PM +0800, Alex Shi wrote: > As testing the spectre bug fix, that's a good question. I also asked > this question to original patch authors, like Marc. They said they just > figure out these patches could block spectre or meltdown issue. From my > side, I just reproduced the process internal spectre. But all fix on arm > can not resolve the user space internal spectre. It can block from user > to kernel or kernel to user spectre according the code purose. So I > believe these patch could do their job. And arm cpu would drop the > spectre branches if it has 20+ 'nop' instructions... Since this is archived on a public list and I don't want people to rely on this, no, you cannot rely on "20+ 'nop' instructions" to work around spectre on arm/arm64. It might prevent a particular PoC working on a particular SoC, but it's fragile at best. Will