From mboxrd@z Thu Jan 1 00:00:00 1970 From: Konrad Rzeszutek Wilk Subject: Re: [PATCH v6 00/27] x86: PIE support and option to extend KASLR randomization Date: Thu, 31 Jan 2019 16:40:38 -0500 Message-ID: <20190131214038.GI28234@char.us.oracle.com> References: <20190131192533.34130-1-thgarnie@chromium.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kernel-hardening@lists.openwall.com, kristen@linux.intel.com, Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Jonathan Corbet , Masahiro Yamada , Michal Marek , Herbert Xu , "David S. Miller" , Andy Lutomirski , Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , Juergen Gross , Alok Kataria , Dennis Zhou , Tejun Heo , Christoph Lameter , "Rafael J. Wysocki" , Len Brown , Pa To: Thomas Garnier Return-path: List-Post: List-Help: List-Unsubscribe: List-Subscribe: Content-Disposition: inline In-Reply-To: <20190131192533.34130-1-thgarnie@chromium.org> List-Id: kvm.vger.kernel.org On Thu, Jan 31, 2019 at 11:24:07AM -0800, Thomas Garnier wrote: > There has been no major concern in the latest iterations. I am interested on > what would be the best way to slowly integrate this patchset upstream. One question that I was somehow expected in this cover letter - what about all those lovely speculative bugs? As in say some one hasn't updated their machine with the Spectre v3a microcode - wouldn't they be able to get the kernel virtual address space? In effect rendering all this hard-work not needed?