Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp7991127imu; Tue, 4 Dec 2018 00:42:27 -0800 (PST) X-Google-Smtp-Source: AFSGD/V+1/t95EWyqVh7/xblV2FVM6yIhFj0Px6doIvTYPXS0yDqd0KcY15DoQKWM4OHkNYKn25x X-Received: by 2002:a17:902:33c2:: with SMTP id b60mr19080171plc.211.1543912946982; Tue, 04 Dec 2018 00:42:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543912946; cv=none; d=google.com; s=arc-20160816; b=D3ZOd7hTWdeSpxBiI5j2lShXPMSfkN9jxqeSUCmqM4Eg6+gt9Nf+Ou756wTr/E10Xj HDU539mhcxZJBLTGrJSBkMVytvYoUgHiZy71a9AOB0uWUuo8bmmTgmUTPju533mS7lEo /HPWzuuI/lXMeDaUVNN2vFJhAhVXyB3ZUf1bOwx627MkVBfQtkgKu+cwe2FMRKF7jEw3 b2/wR0fm1yd3O+v33Ck3S2Xz8InHfUpuhpVakdVpdFhb2Sqz2D4swcpOH+FGVndCJ3Lz 9ELlN4ekLUZAhd8PbeSepwprORW4cfXxS050DuuqDJdh/hjyhfwyooRaer4UlIde1JZf Ugkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=qo9jirTrls2YP5H5RVnhwjKVy1cmkq1v2AWwm6q6x4I=; b=dK8nWRCaQHvrsInFsqtAmE0oZe6rWdkVJPbCo9+54B9/t/aH//DsGnogicZe2hF5F1 DuVZxcusFOFcn/TNp3s/EJ2mvgi+EBQFKK1H63XxR7OcQrRqICF+1djK0s6axf5EP4NF D5jgllaOahvetLu3/rV1rWiotqQZQWZ+PGq03Yr/jyowR/BTnAKCPV55ejbgIgilWE7Q zEB2ZhQfb3zs5Gu9ft5lP/ze/N3JbIhjF7xG0pQuE9U79OIxK5jDFshQ6FEGQRaIumHy lEGhKVdnaIY8i/0IEdeb804X8uO7D7PvUOtXLjEnnsC2Q/lKz/OsUvYSv09zJsu+mGQb LbKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g59si17769726plb.302.2018.12.04.00.42.12; Tue, 04 Dec 2018 00:42:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725935AbeLDIjc (ORCPT + 99 others); Tue, 4 Dec 2018 03:39:32 -0500 Received: from mx2.suse.de ([195.135.220.15]:50620 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725468AbeLDIjc (ORCPT ); Tue, 4 Dec 2018 03:39:32 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C49DCAFDB; Tue, 4 Dec 2018 08:39:28 +0000 (UTC) Date: Tue, 4 Dec 2018 09:39:27 +0100 (CET) From: Jiri Kosina To: Tim Chen cc: Linus Torvalds , Thomas Gleixner , Linux List Kernel Mailing , the arch/x86 maintainers , Peter Zijlstra , Andrew Lutomirski , thomas.lendacky@amd.com, Josh Poimboeuf , Andrea Arcangeli , David Woodhouse , Andi Kleen , dave.hansen@intel.com, Casey Schaufler , "Mallick, Asit K" , "Van De Ven, Arjan" , jcm@redhat.com, longman9394@gmail.com, Greg KH , david.c.stewart@intel.com, Kees Cook , Jason Brandt Subject: Re: [patch V2 27/28] x86/speculation: Add seccomp Spectre v2 user space protection mode In-Reply-To: Message-ID: References: <20181125183328.318175777@linutronix.de> <20181125185006.051663132@linutronix.de> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 3 Dec 2018, Tim Chen wrote: > > Can we please just fix this stupid lie? > > > > Yes, Intel calls it "STIBP" and tries to make it out to be about the > > indirect branch predictor being per-SMT thread. > > > > But the reason it is unacceptable is apparently because in reality it just > > disables indirect branch prediction entirely. So yes, *technically* it's > > true that that limits indirect branch prediction to just a single SMT > > core, but in reality it is just a "go really slow" mode. > > > > If STIBP had actually just keyed off the logical SMT thread, we wouldn't > > need to have worried about it in the first place. > > > > So let's document reality rather than Intel's Pollyanna world-view. > > > > Reality matters. It's why we had to go all this. Lying about things > > and making it appear like it's not a big deal was why the original > > patch made it through without people noticing. > > > > > To make the usage of STIBP and its working principles clear, > here are some additional explanations of STIBP from our Intel > HW architects. This should also help answer some of the questions > from Thomas and others on STIBP's usages with IBPB and IBRS. Thanks a lot, this indeed does shed some light. I have one question though: [ ... snip ... ] > On processors with enhanced IBRS support, we recommend setting IBRS to 1 > and left set. Then why doesn't CPU with EIBRS support acutally *default* to '1', with opt-out possibility for OS? Thanks, -- Jiri Kosina SUSE Labs