diff for duplicates of <20180118131837.GA20783@arm.com> diff --git a/a/1.txt b/N1/1.txt index 910e1ec..c0167fe 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -37,7 +37,7 @@ On Thu, Jan 11, 2018 at 05:41:08PM -0800, Dan Williams wrote: > least until the 'probably safe' assumption of the 'mask' approach has > more time to settle out. ->From the arm64 side, the only concern I have (and this actually applies to +From the arm64 side, the only concern I have (and this actually applies to our CSDB sequence as well) is the calculation of the array size by the caller. As Linus mentioned at the end of [1], if the determination of the size argument is based on a conditional branch, then masking doesn't help diff --git a/a/content_digest b/N1/content_digest index 8ab25ef..3ddd7eb 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -2,7 +2,7 @@ "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0" "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0" "From\0Will Deacon <will.deacon@arm.com>\0" - "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" + "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0" "To\0Dan Williams <dan.j.williams@intel.com>\0" "Cc\0Linus Torvalds <torvalds@linux-foundation.org>" @@ -26,25 +26,7 @@ Ingo Molnar <mingo@redhat.com> Catalin Marinas <catalin.marinas@arm.com> Alexey Kuznetsov <kuznet@ms2.inr.ac.ru> - Linux Media Mailing List <linux-media@vger.kernel.org> - Tom Lendacky <thomas.lendacky@amd.com> - Kees Cook <keescook@chromium.org> - Jan Kara <jack@suse.com> - Al Viro <viro@zeniv.linux.org.uk> - qla2xxx-upstream@qlogic.com - Thomas Gleixner <tglx@linutronix.de> - Mauro Carvalho Chehab <mchehab@kernel.org> - Kalle Valo <kvalo@codeaurora.org> - Alan Cox <alan@linux.intel.com> - Martin K. Petersen <martin.petersen@oracle.com> - Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org> - Greg KH <gregkh@linuxfoundation.org> - Linux Wireless List <linux-wireless@vger.kernel.org> - Eric W. Biederman <ebiederm@xmission.com> - Network Development <netdev@vger.kernel.org> - Andrew Morton <akpm@linux-foundation.org> - David S. Miller <davem@davemloft.net> - " Laurent Pinchart <laurent.pinchart@ideasonboard.com>\0" + " Linux Media Mailing List <linux-media@v>\0" "\00:1\0" "b\0" "Hi Dan, Linus,\n" @@ -86,7 +68,7 @@ "> least until the 'probably safe' assumption of the 'mask' approach has\n" "> more time to settle out.\n" "\n" - ">From the arm64 side, the only concern I have (and this actually applies to\n" + "From the arm64 side, the only concern I have (and this actually applies to\n" "our CSDB sequence as well) is the calculation of the array size by the\n" "caller. As Linus mentioned at the end of [1], if the determination of the\n" "size argument is based on a conditional branch, then masking doesn't help\n" @@ -104,4 +86,4 @@ "\n" [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com -a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92 +942aa9b378da1f7b9cb007a7429a48adeded07e9621b7d76c10dcafdd1af187e
diff --git a/a/1.txt b/N2/1.txt index 910e1ec..a08b52a 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -36,21 +36,3 @@ On Thu, Jan 11, 2018 at 05:41:08PM -0800, Dan Williams wrote: > I was thinking we'd keep it as a 'just in case' sort of thing, at > least until the 'probably safe' assumption of the 'mask' approach has > more time to settle out. - ->From the arm64 side, the only concern I have (and this actually applies to -our CSDB sequence as well) is the calculation of the array size by the -caller. As Linus mentioned at the end of [1], if the determination of the -size argument is based on a conditional branch, then masking doesn't help -because you bound within the wrong range under speculation. - -We ran into this when trying to use masking to protect our uaccess routines -where the conditional bound is either KERNEL_DS or USER_DS. It's possible -that a prior conditional set_fs(KERNEL_DS) could defeat the masking and so -we'd need to throw some heavy barriers in set_fs to make it robust. - -The question then is whether or not we're likely to run into this elsewhere, -and I don't have a good feel for that. - -Will - -[1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com diff --git a/a/content_digest b/N2/content_digest index 8ab25ef..d702675 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -2,7 +2,7 @@ "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0" "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0" "From\0Will Deacon <will.deacon@arm.com>\0" - "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" + "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0" "To\0Dan Williams <dan.j.williams@intel.com>\0" "Cc\0Linus Torvalds <torvalds@linux-foundation.org>" @@ -84,24 +84,6 @@ "> \n" "> I was thinking we'd keep it as a 'just in case' sort of thing, at\n" "> least until the 'probably safe' assumption of the 'mask' approach has\n" - "> more time to settle out.\n" - "\n" - ">From the arm64 side, the only concern I have (and this actually applies to\n" - "our CSDB sequence as well) is the calculation of the array size by the\n" - "caller. As Linus mentioned at the end of [1], if the determination of the\n" - "size argument is based on a conditional branch, then masking doesn't help\n" - "because you bound within the wrong range under speculation.\n" - "\n" - "We ran into this when trying to use masking to protect our uaccess routines\n" - "where the conditional bound is either KERNEL_DS or USER_DS. It's possible\n" - "that a prior conditional set_fs(KERNEL_DS) could defeat the masking and so\n" - "we'd need to throw some heavy barriers in set_fs to make it robust.\n" - "\n" - "The question then is whether or not we're likely to run into this elsewhere,\n" - "and I don't have a good feel for that.\n" - "\n" - "Will\n" - "\n" - [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com + > more time to settle out. -a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92 +5cfb38979feb8536bf995668292fef60790c33f22072431ff326b960b64e0ba1
diff --git a/a/content_digest b/N3/content_digest index 8ab25ef..1c750b9 100644 --- a/a/content_digest +++ b/N3/content_digest @@ -2,7 +2,7 @@ "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0" "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0" "From\0Will Deacon <will.deacon@arm.com>\0" - "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" + "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0" "To\0Dan Williams <dan.j.williams@intel.com>\0" "Cc\0Linus Torvalds <torvalds@linux-foundation.org>" @@ -26,25 +26,7 @@ Ingo Molnar <mingo@redhat.com> Catalin Marinas <catalin.marinas@arm.com> Alexey Kuznetsov <kuznet@ms2.inr.ac.ru> - Linux Media Mailing List <linux-media@vger.kernel.org> - Tom Lendacky <thomas.lendacky@amd.com> - Kees Cook <keescook@chromium.org> - Jan Kara <jack@suse.com> - Al Viro <viro@zeniv.linux.org.uk> - qla2xxx-upstream@qlogic.com - Thomas Gleixner <tglx@linutronix.de> - Mauro Carvalho Chehab <mchehab@kernel.org> - Kalle Valo <kvalo@codeaurora.org> - Alan Cox <alan@linux.intel.com> - Martin K. Petersen <martin.petersen@oracle.com> - Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org> - Greg KH <gregkh@linuxfoundation.org> - Linux Wireless List <linux-wireless@vger.kernel.org> - Eric W. Biederman <ebiederm@xmission.com> - Network Development <netdev@vger.kernel.org> - Andrew Morton <akpm@linux-foundation.org> - David S. Miller <davem@davemloft.net> - " Laurent Pinchart <laurent.pinchart@ideasonboard.com>\0" + " Linux Media Mailing List <linux-media@v>\0" "\00:1\0" "b\0" "Hi Dan, Linus,\n" @@ -104,4 +86,4 @@ "\n" [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com -a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92 +604398668a4fd21a98cfd33f320d07ade92a69d1bb0c71c5faa942926075fa3f
diff --git a/a/content_digest b/N4/content_digest index 8ab25ef..7e84444 100644 --- a/a/content_digest +++ b/N4/content_digest @@ -2,7 +2,7 @@ "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0" "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0" "From\0Will Deacon <will.deacon@arm.com>\0" - "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" + "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0" "To\0Dan Williams <dan.j.williams@intel.com>\0" "Cc\0Linus Torvalds <torvalds@linux-foundation.org>" @@ -104,4 +104,4 @@ "\n" [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com -a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92 +c05d7f4d903e3ec5579d1094ce759691187ab742c6661d7db120a0a68911f790
diff --git a/a/content_digest b/N5/content_digest index 8ab25ef..e5a50d9 100644 --- a/a/content_digest +++ b/N5/content_digest @@ -2,7 +2,7 @@ "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0" "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0" "From\0Will Deacon <will.deacon@arm.com>\0" - "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" + "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0" "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0" "To\0Dan Williams <dan.j.williams@intel.com>\0" "Cc\0Linus Torvalds <torvalds@linux-foundation.org>" @@ -26,25 +26,7 @@ Ingo Molnar <mingo@redhat.com> Catalin Marinas <catalin.marinas@arm.com> Alexey Kuznetsov <kuznet@ms2.inr.ac.ru> - Linux Media Mailing List <linux-media@vger.kernel.org> - Tom Lendacky <thomas.lendacky@amd.com> - Kees Cook <keescook@chromium.org> - Jan Kara <jack@suse.com> - Al Viro <viro@zeniv.linux.org.uk> - qla2xxx-upstream@qlogic.com - Thomas Gleixner <tglx@linutronix.de> - Mauro Carvalho Chehab <mchehab@kernel.org> - Kalle Valo <kvalo@codeaurora.org> - Alan Cox <alan@linux.intel.com> - Martin K. Petersen <martin.petersen@oracle.com> - Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org> - Greg KH <gregkh@linuxfoundation.org> - Linux Wireless List <linux-wireless@vger.kernel.org> - Eric W. Biederman <ebiederm@xmission.com> - Network Development <netdev@vger.kernel.org> - Andrew Morton <akpm@linux-foundation.org> - David S. Miller <davem@davemloft.net> - " Laurent Pinchart <laurent.pinchart@ideasonboard.com>\0" + " Linux Media Mailing List <linux-media@v\0" "\00:1\0" "b\0" "Hi Dan, Linus,\n" @@ -104,4 +86,4 @@ "\n" [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com -a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92 +3d1d843b86e3b80de3e3187c834f09f96ece4ffe2fbf6f1a52b31746a293eb56
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.