Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2822584imu; Sun, 23 Dec 2018 08:33:46 -0800 (PST) X-Google-Smtp-Source: ALg8bN4A37v71Q/9QXmL5SIB3dAZuuwaaMxPizXHB6mMosFbsU3IneeleJ48TSHyiagZGRRlj2hK X-Received: by 2002:a63:62c4:: with SMTP id w187mr8861443pgb.230.1545582826440; Sun, 23 Dec 2018 08:33:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545582826; cv=none; d=google.com; s=arc-20160816; b=wz16xvDHvvdQuTAa8XJsjKAeXcXWY0FRaJvNLFfXJFEb9jdm35M5vi3EdDLusBGo7E dbTchlXXmO/gLfMZAwvKe9SYmH6tdDFCZ1cCNiUNrMzYd9Km2Q6t1Mkt8Z5NIzDNtIE1 N3HgpGv6LRSSu4hosa2gvUu/1gUHnCL588hoxzbikR3KPTp2p+mXmmwJTcuNwoNtBTbq CMn/cM5w6kRJ6fV2vFzGvXpWK+czpbhooU0/zl4tMmYnbHVSbuN3J9S7G+DLPWpNAaWY bZK3xGDc6LgxU2kvubOOjeuPXW33WHZ1ZolKIZg9I+1LyC+h5QKq4uRryMCprBwqNvQ+ /9rQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=lUcFeZdPF6P0aO86Q1Y1bvKwYZVzfIl9k1JNYDOKaIM=; b=SiP8ywW/NsAyI5z1P6IiqbPuaDxiClXlaAh+fb8BRHH8aCOhSy7O6g6YS7bLjTO3qD tqFoRvO8xBauNzTN9EJaWQUz22A+OreUJn47OXDsKmEu8X6s7FZYqTiy4pcRf3V9oXwU yslisHIQXtyrZRjlI5hPyHPhmDK1BNihPQ6fZFx5HJ4/6aWgQiWkWtthcFUkdjUGrFqs dfQxFlZN8dK6LNJJrCEXsm7EiyX/DRZWSrAQlkFEzvOWr13f/08cjd/YfEDZLP2I0XQi VTXduVoJUzdTA0/LCaG0snZnl7QUC3aUDkgXONDVelbxsrgjV/3dW4EoU4DH+aC1GbSk d1OA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f7si26357583pga.87.2018.12.23.08.33.30; Sun, 23 Dec 2018 08:33:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404318AbeLVXIn (ORCPT + 99 others); Sat, 22 Dec 2018 18:08:43 -0500 Received: from shards.monkeyblade.net ([23.128.96.9]:40498 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731156AbeLVXIn (ORCPT ); Sat, 22 Dec 2018 18:08:43 -0500 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::cf9]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 26E4F14A8F325; Sat, 22 Dec 2018 15:08:43 -0800 (PST) Date: Sat, 22 Dec 2018 15:08:42 -0800 (PST) Message-Id: <20181222.150842.1563344934152542563.davem@davemloft.net> To: gustavo@embeddedor.com Cc: courmisch@gmail.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] phonet: af_phonet: Fix Spectre v1 vulnerability From: David Miller In-Reply-To: <20181221214117.GA1539@embeddedor> References: <20181221214117.GA1539@embeddedor> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Sat, 22 Dec 2018 15:08:43 -0800 (PST) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Gustavo A. R. Silva" Date: Fri, 21 Dec 2018 15:41:17 -0600 > protocol is indirectly controlled by user-space, hence leading to > a potential exploitation of the Spectre variant 1 vulnerability. > > This issue was detected with the help of Smatch: > > net/phonet/af_phonet.c:48 phonet_proto_get() warn: potential spectre issue 'proto_tab' [w] (local cap) > > Fix this by sanitizing protocol before using it to index proto_tab. > > Notice that given that speculation windows are large, the policy is > to kill the speculation on the first load and not worry if it can be > completed with a dependent load/store [1]. > > [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2 > > Signed-off-by: Gustavo A. R. Silva Applied, thanks.