Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3863675imw; Mon, 18 Jul 2022 16:15:27 -0700 (PDT) X-Google-Smtp-Source: AGRyM1txzID32LZsGKE+x+7CLy1GXU6rRbyhXVzWQExykMGlDpiXcS2VCsM2HvaCYPIQzcKnjVJ2 X-Received: by 2002:a05:6402:4255:b0:43a:c03f:1aa4 with SMTP id g21-20020a056402425500b0043ac03f1aa4mr41234476edb.146.1658186126917; Mon, 18 Jul 2022 16:15:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658186126; cv=none; d=google.com; s=arc-20160816; b=h6+lBchZdLUW5pxy+si8vYBbtZrNDeYcfgLAktSKPzZaLb9y0zWezY+KKxDLh9++41 RpliY05VpU1z0ZmjR8IK6U/LHUAx41AU/aWg9q7KfclOQCBuYCjukCvr6wll+zocNvCt EdWKPvFtCyYErjDl2Bnsee3P+s+KtblX0BHN5cP/ZowmF3VGzVTF6bwoRgxpv/TdeaPe 6jL0VzaN62V8OHT/ehniZIKQnp6d+sxvmvltdq1xdd2gFUohf+EuVJJw84NeeXQT2jEb HCLMX2NEk9CqMTIPBJ7nfNNIVwk3BRShYIPcYY0G3oKM3pkWdkrBIUD0NEtr8yqN6I2J 7KyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:message-id:references :in-reply-to:subject:cc:to:from:date:mime-version; bh=YxC9Y0rLhcJ/HsG5r8uGDXfwq0kU6BjELYcetZG0ZC0=; b=all7L1lvTU7SsYs/ldTnqND6rqtfEHDAU1UOJ1ZWE0CaVyeMkcBRyQgWmeAzYSrONg nFmX3Ma8iLXIuRBKDF7L8L2p2Jh8rnnkKIVMqOntnwvmfow9BlLgE+W27Kc8EMzmMzAa ZNk1MhU2ca8yg6Ov4actCc1Oi6aZW5ejmp7+sqXAYz341hvV9TyG1ndZ1DfbQxMgj+L/ L6N2sJlPB7R0xMUVSVBLZtDVZtH2DcbO1NKkKx7t2p58QMCIcKLQabIYmCRAgLmT6MjA NmfUn00p60lOGSXsPefKi9TCV/Px+/e6afDjPHkIoBNBPAfVLSF44DAwJd0xKSnV4hF0 YqRw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d1-20020a1709061f4100b0072edee8a633si701206ejk.187.2022.07.18.16.15.02; Mon, 18 Jul 2022 16:15:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236414AbiGRXJR (ORCPT + 99 others); Mon, 18 Jul 2022 19:09:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35706 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230165AbiGRXJH (ORCPT ); Mon, 18 Jul 2022 19:09:07 -0400 Received: from relay5-d.mail.gandi.net (relay5-d.mail.gandi.net [217.70.183.197]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4818D764E for ; Mon, 18 Jul 2022 16:09:05 -0700 (PDT) Received: (Authenticated sender: joao@overdrivepizza.com) by mail.gandi.net (Postfix) with ESMTPA id 9D6581C0002; Mon, 18 Jul 2022 23:08:59 +0000 (UTC) MIME-Version: 1.0 Date: Mon, 18 Jul 2022 16:08:59 -0700 From: Joao Moreira To: Sami Tolvanen Cc: Thomas Gleixner , Peter Zijlstra , "Torvalds, Linus" , LKML , the arch/x86 maintainers , Tim Chen , Josh Poimboeuf , "Cooper, Andrew" , Pawan Gupta , Johannes Wikner , Alyssa Milburn , Jann Horn , "H.J. Lu" , "Moreira, Joao" , "Nuzman, Joseph" , Steven Rostedt , "Gross, Jurgen" , Masami Hiramatsu , Alexei Starovoitov , Daniel Borkmann , Peter Collingbourne Subject: Re: [patch 00/38] x86/retbleed: Call depth tracking mitigation In-Reply-To: References: <20220716230344.239749011@linutronix.de> <87wncauslw.ffs@tglx> <87tu7euska.ffs@tglx> <87o7xmup5t.ffs@tglx> <87lesqukm5.ffs@tglx> <2f7f899cb75b79b08b0662ff4d2cb877@overdrivepizza.com> Message-ID: X-Sender: joao@overdrivepizza.com Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > The problem with this is that the cmpl instruction contains the full > type hash, which means that any instruction that's FIXED_OFFSET from > the cmpl is a valid indirect call target as far as KCFI is concerned. > -6 was chosen specifically to make the ud2 the only possible target. Ugh. The bitter truth. I'll think a bit further.