Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3350053imm; Mon, 4 Jun 2018 01:58:22 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJnAYU7LeFhCRkvk8FZuSRsfaqvuNQSRGLgyCR2zpvMQD8iy3f1/KodLWxYtY08QRf7zJC6 X-Received: by 2002:a63:ad4a:: with SMTP id y10-v6mr16537343pgo.330.1528102702051; Mon, 04 Jun 2018 01:58:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528102702; cv=none; d=google.com; s=arc-20160816; b=UTUwP9d11PPPSwGpi2qjH9ffxWj1WrMHs4jlN40chbEmr1SG1OvPWK/vatlaThI1Rm vFTCWj3zjx9svq7ckzprDrtW+P98IaWBf1Ckq5CYJBgJDXetRfYb6EIFaRS0VtCTk5Y3 cQ1mofQRkK02Gst6OeqV1TM8+WYC7D35DPiDgW8/ZqPpKZOLQYTGgQDAOcqHsEifRcOZ c5etB9oTuL5qL4bAVtzXDT49eN1zm0/QLNhpdgfkbdzvVhzdxeGVsigK7gNvunm1VfsO rD1zm21sx1ic3lLHRjHTFxn5zIpPLHEOYtTgtKCeVOB3sioScRGZ1Gj9nTf8pDsCf6bs ascQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :arc-authentication-results; bh=B4EllrgEO8LWKejkOrI0OGp9WxjOOH0NYxl+3ROk9fs=; b=DUmI7GV1UrFnpO2t1wdt4DIE6ooiIjOcJEa7XhvRmbmhPEHljinWigF0O0/XBzXFYK NKPXM7oY8kTsEHidNW66ujcr+Jfe1wAt84x4tDlS3rSk9zOi2kaDfjh095VGUpsKDu/F VjrhDbgsAEwEx97oWT3A1HDLV3y+B3jhO4l0NZGATIH0nSgif04A6iBcoGYOWlxUTnxA MH9ttSfm+knnxXR//UMba8wueSniOO7bmFRnOA4Kcsd/ScbolnlCesp/SpLJxQJzkUfA XZ7yOKhREfE1QeZH27ZAIVzp19/5Fy95ewxx2Z8uSpUQadzsdVe2pi+RsHKOsoQAJCgF yaeQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b70-v6si46584414pfe.265.2018.06.04.01.58.07; Mon, 04 Jun 2018 01:58:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752141AbeFDI5f (ORCPT + 99 others); Mon, 4 Jun 2018 04:57:35 -0400 Received: from mout2.freenet.de ([195.4.92.92]:40214 "EHLO mout2.freenet.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752044AbeFDI5d (ORCPT ); Mon, 4 Jun 2018 04:57:33 -0400 X-Greylist: delayed 320 seconds by postgrey-1.27 at vger.kernel.org; Mon, 04 Jun 2018 04:57:32 EDT Received: from [195.4.92.140] (helo=mjail0.freenet.de) by mout2.freenet.de with esmtpa (ID andihartmann@freenet.de) (port 25) (Exim 4.90_1 #2) id 1fPlDn-0003FZ-Md; Mon, 04 Jun 2018 10:52:11 +0200 Received: from [::1] (port=48380 helo=mjail0.freenet.de) by mjail0.freenet.de with esmtpa (ID andihartmann@freenet.de) (Exim 4.90_1 #2) id 1fPlDn-0004jn-Ic; Mon, 04 Jun 2018 10:52:11 +0200 Received: from mx6.freenet.de ([195.4.92.16]:55566) by mjail0.freenet.de with esmtpa (ID andihartmann@freenet.de) (Exim 4.90_1 #2) id 1fPlBo-0001cA-Tv; Mon, 04 Jun 2018 10:50:08 +0200 Received: from p200300de53d71800505400fffe15ac42.dip0.t-ipconnect.de ([2003:de:53d7:1800:5054:ff:fe15:ac42]:42474 helo=mail.maya.org) by mx6.freenet.de with esmtpsa (ID andihartmann@freenet.de) (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (port 465) (Exim 4.90_1 #2) id 1fPlBo-00064B-OT; Mon, 04 Jun 2018 10:50:08 +0200 Received: internal info suppressed Subject: Re: Spectre mitigation doesn't seem to work at all?! To: Peter Zijlstra Cc: LKML References: <141672d1-8dcb-9a84-7f8f-60c7a2c58b07@01019freenet.de> <20180604081502.GE12258@hirez.programming.kicks-ass.net> From: Andreas Hartmann Openpgp: preference=signencrypt Autocrypt: addr=andreas@maya.org; prefer-encrypt=mutual; keydata= xsDiBDz/vtQRBAC+OSpes1p57fA8ENLYy3Nl/CpEvtRoDdhy7DPyc1+adE57vpK52naRfaZB f0RSMvIZwJYggMio+emiN5Du7kL9y2IEjmHBvp/1x68dEwswHP9X4hJmHmyOJL3IB2WsvEdh QF97913bWX34MYCeuOoSJ1OWvBLGfNs0zv70HOTfJwCgricyy8N1itEryLwoeu5HWz0SmDED /2IiuDhPZ332i0Ylp40RQb2Wb0xBvpscVeRZDItsYYbJ/Sgmso1sn93sFFWmmrvGUyg3MNCt +u+7P8Wg3VXte8cHbNwdzNtXHTfYyTcgZXC4xJN2akZt4pdR531mXyP2kFxmKtAEmW6bNpvV oNnkgZVWvoT4BHLloLzA62JUEgFJA/9dHilAVS3Ezv5ECB02Lt2vNNzMvPlyNbxBhWnrb6VC mFMCRg9bOK2io1zYb8C4gEpJ33wl8hEBxOWfCOEEKesAUCjViosNvxqGNtGWjk5p1O2QBWE2 D6u5+itACQRqhmmgNl+dK6Of2yGG9GxOYWozIELEfL9ZB4xQ7A2tDFR0Zs1HQW5kcmVhcyBI YXJ0bWFubiAod2VpbCBkZXIgUmVjaG5lciBuZXUgaGVpc3N0KSA8YW5kcmVhc0BkdWFsYy5t YXlhLm9yZz7CYAQTEQIAIAUCTMsY3gIbAwYLCQgHAwIEFQIIAwQWAgMBAh4BAheAAAoJEBhU mcTgYeNVT1QAoJ4cJ2jl6Jgmi+PmWCXPk4m8lgAGAKCjkxgK/PjE3+cNsLa/xEpReqYwRs7A TQQ8/77WEAQAqBBex8oxPC1srpaSFbq8NCM/Gy7SKucKsQPqG/De46WQESbmnMElVft2xCBC rOJ7E02k10h/twe0yQnNdXMJDMDM0w0EEyX9ljekIr3SFbXpU2S4wUl3C6CW2hizUgOyLsg0 chpfGMB9+wiVycyjZahafoc14wuuDj5BqWEOCccAAwcD/14lh1PTPKx4hs7ITtFZh5TI6+5f xAWIBBUeQL+GEt+CKwyNc/hWp8YTPJ3SAedmDrEMX+2yPO95KeIfg6bnnIVvI/aTR/vJFsWK GKMx+KaKx+IEwuhCpNIMUASpJWRvVlo3lMIvqAMJIBj79uKq/X9fppblcJst29QVO6aWf3Gh wkYEGBECAAYFAjz/vtYACgkQGFSZxOBh41VBAgCfZRiPCQ+jNvdT5iR2fEblqTtBrF0An0nb M8B1Lpkm44214BbtIQKneVrY Message-ID: Date: Mon, 4 Jun 2018 10:50:07 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180604081502.GE12258@hirez.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.7 required=5.0 tests=ALL_TRUSTED,PLING_QUERY, RP_MATCHES_RCVD autolearn=no autolearn_force=no version=3.4.0 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.maya.org X-Spam-score: -4.4 X-Spamreport: Action: no action Symbol: RCVD_TLS_ALL(0.00) Symbol: BAYES_HAM(-1.27) Symbol: RCVD_COUNT_TWO(0.00) Symbol: RCPT_COUNT_TWO(0.00) Symbol: FREEMAIL_FROM(0.00) Symbol: FREEMAIL_ENVFROM(0.00) Symbol: ASN(0.00) Symbol: MIME_GOOD(-0.10) Symbol: FROM_HAS_DN(0.00) Symbol: TO_DN_ALL(0.00) Symbol: SUBJECT_HAS_QUESTION(0.00) Symbol: RCVD_VIA_SMTP_AUTH(0.00) Symbol: TO_MATCH_ENVRCPT_ALL(0.00) Symbol: NEURAL_HAM(-3.00) Symbol: SUBJECT_ENDS_EXCLAIM(0.00) Symbol: FROM_EQ_ENVFROM(0.00) Message-ID: d8fbee2d-305a-9fc0-356e-b8d4cbd59dbd@maya.org X-FN-Spambar: X-Originated-At: 2003:de:53d7:1800:5054:ff:fe15:ac42!42474 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Peter, thanks for your answer! I appreciate it! On 06/04/2018 at 10:15 AM Peter Zijlstra wrote: > On Fri, Jun 01, 2018 at 02:19:38PM +0200, Andreas Hartmann wrote: > >> I tested the spectre mitigation of different machines and kernels with >> https://github.com/crozone/SpectrePoC >> >> You can see the results below. > >> My question: Did I miss something? > > Yes. > >> Build: ... INTEL_MITIGATION_DISABLED LINUX_KERNEL_MITIGATION_DISABLED >> Build: ... INTEL_MITIGATION_DISABLED LINUX_KERNEL_MITIGATION_DISABLED >> Build: ... INTEL_MITIGATION_DISABLED LINUX_KERNEL_MITIGATION_DISABLED > > ^^^^^^^^ ^^^^^^^^ > > The POC is a v1 on itself. V1 needs to be fixed for every individual > executable (worse, for every individual location in the code, and we're > still finding them). The kernel mitigation status for v1 only indicates > the kernel itself has mitigations (for some locations). > > The POC is meant to test effectiveness of these mitigations, either the > original LFENCE or the dependent instruction thing, but you have to > enable one or the other. Ok, this means every program running on the machine has to care itself to be spectre v1 - safe. A malicious program most probably won't care about that. Therefore, my next question is: which memory regions can be exploited by a malicious program? The complete physical memory or only the memory provided to the malicious program? Should be the latter if this approach should have any impact. Thanks, Andreas