lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHk-=wjR5j9C=58BBJ7ok5bq4-3ePkPsUtVEDFfUCraqNEDXkg@mail.gmail.com>
Date: Thu, 24 Oct 2024 13:00:00 -0700
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Josh Poimboeuf <jpoimboe@...nel.org>
Cc: Borislav Petkov <bp@...en8.de>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, x86@...nel.org, 
	Andrew Cooper <andrew.cooper3@...rix.com>
Subject: Re: [PATCH] x86: fix user address masking non-canonical speculation issue

On Thu, 24 Oct 2024 at 12:09, Josh Poimboeuf <jpoimboe@...nel.org> wrote:
>
> On a non-related note, doesn't the inline asm need a "cc" clobber?

All inline asm is always a cc clobber on x86, probably because the
bulk of x86 instructions do.

Having one is certainly not _wrong_, but we typically don't have it.

(See for example all of the atomics, all bitops, and pretty much
everything else).

We do see to have added the "cc" clobber to a handful of cases - it
looks like the virtualization people do it, because it's mostly
<asm/vmware.h> and <asm/mshyperv.h>, and the ones I found in
<asm/barrier.h> were added by Michael Tsirkin, who is mostly also on
the virt side.

I'm not sure what triggered the virt people to do it, but it's
certainly not wrong, it's just neither needed nor traditional.

                  Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ