From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261354AbVFAMNK (ORCPT ); Wed, 1 Jun 2005 08:13:10 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261357AbVFAMNK (ORCPT ); Wed, 1 Jun 2005 08:13:10 -0400 Received: from mail02.syd.optusnet.com.au ([211.29.132.183]:25264 "EHLO mail02.syd.optusnet.com.au") by vger.kernel.org with ESMTP id S261354AbVFAMNH (ORCPT ); Wed, 1 Jun 2005 08:13:07 -0400 From: Con Kolivas To: Arjan van de Ven Subject: Re: [PATCH] Sample fix for hyperthread exploit Date: Wed, 1 Jun 2005 22:13:24 +1000 User-Agent: KMail/1.8.1 Cc: linux kernel mailing list , Ingo Molnar , ck list References: <200506012158.39805.kernel@kolivas.org> <1117627597.6271.29.camel@laptopd505.fenrus.org> In-Reply-To: <1117627597.6271.29.camel@laptopd505.fenrus.org> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200506012213.25445.kernel@kolivas.org> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 1 Jun 2005 22:06, Arjan van de Ven wrote: > > Comments? > > I don't think it's really worth it, but if you go this way I'd rather do > this via a prctl() so that apps can tell the kernel "I'd like to run > exclusive on a core". That'd be much better than blindly isolating all > applications. I agree, and this is where we (could) implement the core isolation. I'm still under the impression (as you appear to be) that this theoretical exploit is not worth trying to work around. Cheers, Con