All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20180118131837.GA20783@arm.com>

diff --git a/a/1.txt b/N1/1.txt
index 910e1ec..c0167fe 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -37,7 +37,7 @@ On Thu, Jan 11, 2018 at 05:41:08PM -0800, Dan Williams wrote:
 > least until the 'probably safe' assumption of the 'mask' approach has
 > more time to settle out.
 
->From the arm64 side, the only concern I have (and this actually applies to
+From the arm64 side, the only concern I have (and this actually applies to
 our CSDB sequence as well) is the calculation of the array size by the
 caller. As Linus mentioned at the end of [1], if the determination of the
 size argument is based on a conditional branch, then masking doesn't help
diff --git a/a/content_digest b/N1/content_digest
index 8ab25ef..3ddd7eb 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,7 @@
  "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0"
  "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0"
  "From\0Will Deacon <will.deacon@arm.com>\0"
- "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
+ "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
  "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0"
  "To\0Dan Williams <dan.j.williams@intel.com>\0"
  "Cc\0Linus Torvalds <torvalds@linux-foundation.org>"
@@ -26,25 +26,7 @@
   Ingo Molnar <mingo@redhat.com>
   Catalin Marinas <catalin.marinas@arm.com>
   Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
-  Linux Media Mailing List <linux-media@vger.kernel.org>
-  Tom Lendacky <thomas.lendacky@amd.com>
-  Kees Cook <keescook@chromium.org>
-  Jan Kara <jack@suse.com>
-  Al Viro <viro@zeniv.linux.org.uk>
-  qla2xxx-upstream@qlogic.com
-  Thomas Gleixner <tglx@linutronix.de>
-  Mauro Carvalho Chehab <mchehab@kernel.org>
-  Kalle Valo <kvalo@codeaurora.org>
-  Alan Cox <alan@linux.intel.com>
-  Martin K. Petersen <martin.petersen@oracle.com>
-  Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org>
-  Greg KH <gregkh@linuxfoundation.org>
-  Linux Wireless List <linux-wireless@vger.kernel.org>
-  Eric W. Biederman <ebiederm@xmission.com>
-  Network Development <netdev@vger.kernel.org>
-  Andrew Morton <akpm@linux-foundation.org>
-  David S. Miller <davem@davemloft.net>
- " Laurent Pinchart <laurent.pinchart@ideasonboard.com>\0"
+ " Linux Media Mailing List <linux-media@v>\0"
  "\00:1\0"
  "b\0"
  "Hi Dan, Linus,\n"
@@ -86,7 +68,7 @@
  "> least until the 'probably safe' assumption of the 'mask' approach has\n"
  "> more time to settle out.\n"
  "\n"
- ">From the arm64 side, the only concern I have (and this actually applies to\n"
+ "From the arm64 side, the only concern I have (and this actually applies to\n"
  "our CSDB sequence as well) is the calculation of the array size by the\n"
  "caller. As Linus mentioned at the end of [1], if the determination of the\n"
  "size argument is based on a conditional branch, then masking doesn't help\n"
@@ -104,4 +86,4 @@
  "\n"
  [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com
 
-a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92
+942aa9b378da1f7b9cb007a7429a48adeded07e9621b7d76c10dcafdd1af187e

diff --git a/a/1.txt b/N2/1.txt
index 910e1ec..a08b52a 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -36,21 +36,3 @@ On Thu, Jan 11, 2018 at 05:41:08PM -0800, Dan Williams wrote:
 > I was thinking we'd keep it as a 'just in case' sort of thing, at
 > least until the 'probably safe' assumption of the 'mask' approach has
 > more time to settle out.
-
->From the arm64 side, the only concern I have (and this actually applies to
-our CSDB sequence as well) is the calculation of the array size by the
-caller. As Linus mentioned at the end of [1], if the determination of the
-size argument is based on a conditional branch, then masking doesn't help
-because you bound within the wrong range under speculation.
-
-We ran into this when trying to use masking to protect our uaccess routines
-where the conditional bound is either KERNEL_DS or USER_DS. It's possible
-that a prior conditional set_fs(KERNEL_DS) could defeat the masking and so
-we'd need to throw some heavy barriers in set_fs to make it robust.
-
-The question then is whether or not we're likely to run into this elsewhere,
-and I don't have a good feel for that.
-
-Will
-
-[1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com
diff --git a/a/content_digest b/N2/content_digest
index 8ab25ef..d702675 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -2,7 +2,7 @@
  "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0"
  "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0"
  "From\0Will Deacon <will.deacon@arm.com>\0"
- "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
+ "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
  "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0"
  "To\0Dan Williams <dan.j.williams@intel.com>\0"
  "Cc\0Linus Torvalds <torvalds@linux-foundation.org>"
@@ -84,24 +84,6 @@
  "> \n"
  "> I was thinking we'd keep it as a 'just in case' sort of thing, at\n"
  "> least until the 'probably safe' assumption of the 'mask' approach has\n"
- "> more time to settle out.\n"
- "\n"
- ">From the arm64 side, the only concern I have (and this actually applies to\n"
- "our CSDB sequence as well) is the calculation of the array size by the\n"
- "caller. As Linus mentioned at the end of [1], if the determination of the\n"
- "size argument is based on a conditional branch, then masking doesn't help\n"
- "because you bound within the wrong range under speculation.\n"
- "\n"
- "We ran into this when trying to use masking to protect our uaccess routines\n"
- "where the conditional bound is either KERNEL_DS or USER_DS. It's possible\n"
- "that a prior conditional set_fs(KERNEL_DS) could defeat the masking and so\n"
- "we'd need to throw some heavy barriers in set_fs to make it robust.\n"
- "\n"
- "The question then is whether or not we're likely to run into this elsewhere,\n"
- "and I don't have a good feel for that.\n"
- "\n"
- "Will\n"
- "\n"
- [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com
+ > more time to settle out.
 
-a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92
+5cfb38979feb8536bf995668292fef60790c33f22072431ff326b960b64e0ba1

diff --git a/a/content_digest b/N3/content_digest
index 8ab25ef..1c750b9 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -2,7 +2,7 @@
  "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0"
  "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0"
  "From\0Will Deacon <will.deacon@arm.com>\0"
- "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
+ "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
  "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0"
  "To\0Dan Williams <dan.j.williams@intel.com>\0"
  "Cc\0Linus Torvalds <torvalds@linux-foundation.org>"
@@ -26,25 +26,7 @@
   Ingo Molnar <mingo@redhat.com>
   Catalin Marinas <catalin.marinas@arm.com>
   Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
-  Linux Media Mailing List <linux-media@vger.kernel.org>
-  Tom Lendacky <thomas.lendacky@amd.com>
-  Kees Cook <keescook@chromium.org>
-  Jan Kara <jack@suse.com>
-  Al Viro <viro@zeniv.linux.org.uk>
-  qla2xxx-upstream@qlogic.com
-  Thomas Gleixner <tglx@linutronix.de>
-  Mauro Carvalho Chehab <mchehab@kernel.org>
-  Kalle Valo <kvalo@codeaurora.org>
-  Alan Cox <alan@linux.intel.com>
-  Martin K. Petersen <martin.petersen@oracle.com>
-  Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org>
-  Greg KH <gregkh@linuxfoundation.org>
-  Linux Wireless List <linux-wireless@vger.kernel.org>
-  Eric W. Biederman <ebiederm@xmission.com>
-  Network Development <netdev@vger.kernel.org>
-  Andrew Morton <akpm@linux-foundation.org>
-  David S. Miller <davem@davemloft.net>
- " Laurent Pinchart <laurent.pinchart@ideasonboard.com>\0"
+ " Linux Media Mailing List <linux-media@v>\0"
  "\00:1\0"
  "b\0"
  "Hi Dan, Linus,\n"
@@ -104,4 +86,4 @@
  "\n"
  [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com
 
-a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92
+604398668a4fd21a98cfd33f320d07ade92a69d1bb0c71c5faa942926075fa3f

diff --git a/a/content_digest b/N4/content_digest
index 8ab25ef..7e84444 100644
--- a/a/content_digest
+++ b/N4/content_digest
@@ -2,7 +2,7 @@
  "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0"
  "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0"
  "From\0Will Deacon <will.deacon@arm.com>\0"
- "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
+ "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
  "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0"
  "To\0Dan Williams <dan.j.williams@intel.com>\0"
  "Cc\0Linus Torvalds <torvalds@linux-foundation.org>"
@@ -104,4 +104,4 @@
  "\n"
  [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com
 
-a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92
+c05d7f4d903e3ec5579d1094ce759691187ab742c6661d7db120a0a68911f790

diff --git a/a/content_digest b/N5/content_digest
index 8ab25ef..e5a50d9 100644
--- a/a/content_digest
+++ b/N5/content_digest
@@ -2,7 +2,7 @@
  "ref\0CA+55aFzNQ8CZ8iNcPXrCfyk=1edMiRGDA0fY0rd87BsFKBxgAw@mail.gmail.com\0"
  "ref\0CAPcyv4gPcV7MRumSJNz6nDw=HhKO4MK2QqKbj4uc_6APsSFr+g@mail.gmail.com\0"
  "From\0Will Deacon <will.deacon@arm.com>\0"
- "Subject\0[kernel-hardening] Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
+ "Subject\0Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution\0"
  "Date\0Thu, 18 Jan 2018 13:18:37 +0000\0"
  "To\0Dan Williams <dan.j.williams@intel.com>\0"
  "Cc\0Linus Torvalds <torvalds@linux-foundation.org>"
@@ -26,25 +26,7 @@
   Ingo Molnar <mingo@redhat.com>
   Catalin Marinas <catalin.marinas@arm.com>
   Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
-  Linux Media Mailing List <linux-media@vger.kernel.org>
-  Tom Lendacky <thomas.lendacky@amd.com>
-  Kees Cook <keescook@chromium.org>
-  Jan Kara <jack@suse.com>
-  Al Viro <viro@zeniv.linux.org.uk>
-  qla2xxx-upstream@qlogic.com
-  Thomas Gleixner <tglx@linutronix.de>
-  Mauro Carvalho Chehab <mchehab@kernel.org>
-  Kalle Valo <kvalo@codeaurora.org>
-  Alan Cox <alan@linux.intel.com>
-  Martin K. Petersen <martin.petersen@oracle.com>
-  Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org>
-  Greg KH <gregkh@linuxfoundation.org>
-  Linux Wireless List <linux-wireless@vger.kernel.org>
-  Eric W. Biederman <ebiederm@xmission.com>
-  Network Development <netdev@vger.kernel.org>
-  Andrew Morton <akpm@linux-foundation.org>
-  David S. Miller <davem@davemloft.net>
- " Laurent Pinchart <laurent.pinchart@ideasonboard.com>\0"
+ " Linux Media Mailing List <linux-media@v\0"
  "\00:1\0"
  "b\0"
  "Hi Dan, Linus,\n"
@@ -104,4 +86,4 @@
  "\n"
  [1] http://lkml.kernel.org/r/CA+55aFz0tsreoa=5Ud2noFCpng-dizLBhT9WU9asyhpLfjdcYA@mail.gmail.com
 
-a23e9079ecb7651e2a0cb5844b5f3ad6e0476cb0518d0a810893314df114fc92
+3d1d843b86e3b80de3e3187c834f09f96ece4ffe2fbf6f1a52b31746a293eb56

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.