From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from userp2130.oracle.com ([156.151.31.86]) by Galois.linutronix.de with esmtps (TLS1.2:RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fCtDL-0003De-Dv for speck@linutronix.de; Sun, 29 Apr 2018 22:46:32 +0200 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w3TKk7jw177714 for ; Sun, 29 Apr 2018 20:46:24 GMT Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp2130.oracle.com with ESMTP id 2hmgdja45d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Sun, 29 Apr 2018 20:46:24 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w3TKkO7X014436 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Sun, 29 Apr 2018 20:46:24 GMT Received: from abhmp0013.oracle.com (abhmp0013.oracle.com [141.146.116.19]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w3TKkNpK004464 for ; Sun, 29 Apr 2018 20:46:24 GMT Date: Sun, 29 Apr 2018 16:46:19 -0400 From: Konrad Rzeszutek Wilk Subject: [MODERATED] Re: [patch V7 00/15] SBB 0 Message-ID: <20180429204613.GA22621@localhost.localdomain> References: <20180429193045.711908246@linutronix.de> <20180429203542.GC19814@pd.tnic> MIME-Version: 1.0 In-Reply-To: <20180429203542.GC19814@pd.tnic> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Sun, Apr 29, 2018 at 10:35:42PM +0200, speck for Borislav Petkov wrote: > On Sun, Apr 29, 2018 at 09:30:45PM +0200, speck for Thomas Gleixner wrote: > > This is an update based on Konrads V6 series. The major changes are: > > > > - Distangle the mitigation control from the AMD/Intel cpu init code and > > keep it confined to bugs.c. That's cleaner and required to make the > > prctl mode work properly on both AMD and Intel > > > > - Avoid parsing the command line when RDS is not supported at all. > > > > - Make all the spec ctrl msr related variables __ro_after_init instead of > > read_mostly. Nothing can fiddle with them after boot. > > > > - Integrate the PRCTL: > > Ok, now that we have this "fancy" contraption I haz a question: how are > programs supposed to use it which are closed source? Or such which can't > be recompiled? Are people supposed to do wrappers or are we saying, > tough luck to those who can't change their applications? spec_store_bypass_disable=on And they are all good.