lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 28 Nov 2018 15:24:31 +0100 (CET)
From:   Thomas Gleixner <tglx@...utronix.de>
To:     LKML <linux-kernel@...r.kernel.org>
cc:     x86@...nel.org, Peter Zijlstra <peterz@...radead.org>,
        Andy Lutomirski <luto@...nel.org>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Jiri Kosina <jkosina@...e.cz>,
        Tom Lendacky <thomas.lendacky@....com>,
        Josh Poimboeuf <jpoimboe@...hat.com>,
        Andrea Arcangeli <aarcange@...hat.com>,
        David Woodhouse <dwmw@...zon.co.uk>,
        Tim Chen <tim.c.chen@...ux.intel.com>,
        Andi Kleen <ak@...ux.intel.com>,
        Dave Hansen <dave.hansen@...el.com>,
        Casey Schaufler <casey.schaufler@...el.com>,
        Asit Mallick <asit.k.mallick@...el.com>,
        Arjan van de Ven <arjan@...ux.intel.com>,
        Jon Masters <jcm@...hat.com>,
        Waiman Long <longman9394@...il.com>,
        Greg KH <gregkh@...uxfoundation.org>,
        Dave Stewart <david.c.stewart@...el.com>,
        Kees Cook <keescook@...omium.org>
Subject: Re: [patch V2 00/28] x86/speculation: Remedy the STIBP/IBPB
 overhead

On Sun, 25 Nov 2018, Thomas Gleixner wrote:

> Thats hopefully the final version of this. Changes since V1:
> 
>   - Renamed the command line option and related code to spectre_v2_user= as
>     suggested by Josh.
> 
>   - Thought more about the back to back optimization and finally left the
>     IBPB code in switch_mm().
> 
>     It still removes the ptrace check for the always IBPB case. That's
>     substantial overhead for dubious value now that the default is
>     conditional (prctl/seccomp) IBPB.
> 
>   - Added two options which allow conditional STIBP and IBPB always mode.
> 
>   - Addressed the review comments
> 
> Documentation is still work in progress. Thanks Andi for providing the
> first draft for it.
> 
> Still based on tip.git x86/pti as it has been discussed to remove the
> minimal RETPOLINE bandaid from stable kernels as well.

I've integrated the latest review feedback and the change which plugs the
TIF async update issue and pushed all of it out to:

   git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86/pti

For the stable 4.14.y and 4.19.y trees, I've collected the missing bits and
pieces and uploaded tarballs which contain everything ready for consumption:

   https://tglx.de/~tglx/patches-spec-4.14.y.tar.xz

      sha256 of patches-spec-4.14.y.tar:
      3d2976ef06ab5556c1c6cba975b0c9390eb57f43c506fb7f8834bb484feb9b17

   https://tglx.de/~tglx/patches-spec-4.19.y.tar.xz

      sha256 of patches-spec-4.19.y.tar:
      b7666cf378ad63810a17e98a471aae81a49738c552dbe912aea49de83f8145cc

Thanks everyone for review, discussion, testing ... !

Thanks,

	tglx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ