From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EC5FAC2D0A3 for ; Wed, 4 Nov 2020 22:17:33 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 7F17420756 for ; Wed, 4 Nov 2020 22:17:33 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="RX2JBijV" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732134AbgKDWOL (ORCPT ); Wed, 4 Nov 2020 17:14:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732001AbgKDWOK (ORCPT ); Wed, 4 Nov 2020 17:14:10 -0500 Received: from mail-pf1-x431.google.com (mail-pf1-x431.google.com [IPv6:2607:f8b0:4864:20::431]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 36EF4C0613D4 for ; Wed, 4 Nov 2020 14:14:10 -0800 (PST) Received: by mail-pf1-x431.google.com with SMTP id e7so18453115pfn.12 for ; Wed, 04 Nov 2020 14:14:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=4SX8JmQlcxK5oX4LLeWbxpL7OAoTDYcCU+6+RVvGYlM=; b=RX2JBijVQFv1L+Mod4nyguYVc83aMkdQnTSA4fshKUc7aV23uLUvF08QHDh0Is4Pqc Y8C7u7YARCq/nsAwL8gHMGWDjRZ/i8rf6teR9z+sDJZUgLYQtq2wJ0I48zHOVm1zkNrf ta1xYjO+dpWNT4NcIGfE2jZIbJ6ZSCtbIauIs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=4SX8JmQlcxK5oX4LLeWbxpL7OAoTDYcCU+6+RVvGYlM=; b=jyOg2mBhaEVQvtWvgp1e3hBgH8elT0KssFwz1Argx326QM7cGALRjuy3znn0p+HrFj bcG8aumAX6dVehvXDktYWpUQqtq77aCdM8Lp55QvpCnT8y07Kt/9l7xMA3Hleg01aiRa Vsqjne6PHZLPyixtxWwbawphfZGMHQVL7GZSOicgsnEkYk+Ao8uOW9qwhIXqxzCJ7c3o tM6PMYqvnaXIeGTEV+I6hQuMN9zmFIu9K76uY4kggTx1fWDMMUD/lMZknmak6T2Z0Idt B+7zOIKszmuHd4H0cYMOnTqI2GBe5LOKHOpOYRKshn2EK8FwdfNhpnR4Z2e4GgaByDpV uifg== X-Gm-Message-State: AOAM532Tgs+Q63+BVRNP8YI870l6ojfi2MP6BBpOfidm7ajp2jjYxmvn aL6kUjBHsEzE14I5URAphXEmoQ== X-Google-Smtp-Source: ABdhPJwnQvdrXkvZA4YnhjXoMmBDm+dt32SsDETknXAd989qVmGT8ZvBz6SW/KD78kJNz8WtONYvwA== X-Received: by 2002:a17:90b:b12:: with SMTP id bf18mr11114pjb.205.1604528049604; Wed, 04 Nov 2020 14:14:09 -0800 (PST) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id j20sm3306738pgh.15.2020.11.04.14.14.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Nov 2020 14:14:08 -0800 (PST) Date: Wed, 4 Nov 2020 14:14:07 -0800 From: Kees Cook To: Andrea Arcangeli Cc: YiFei Zhu , Linux Containers , YiFei Zhu , bpf , kernel list , Aleksa Sarai , Andy Lutomirski , David Laight , Dimitrios Skarlatos , Giuseppe Scrivano , Hubertus Franke , Jack Chen , Jann Horn , Josep Torrellas , Tianyin Xu , Tobin Feldman-Fitzthum , Tycho Andersen , Valentin Rothberg , Will Drewry , Jiri Kosina , Thomas Gleixner , Waiman Long Subject: Re: RFC: default to spec_store_bypass_disable=prctl spectre_v2_user=prctl Message-ID: <202011041411.AD961737EA@keescook> References: <20201104215702.GG24993@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201104215702.GG24993@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 04, 2020 at 04:57:02PM -0500, Andrea Arcangeli wrote: > Switch the kernel default of SSBD and STIBP to the ones with > CONFIG_SECCOMP=n (i.e. spec_store_bypass_disable=prctl > spectre_v2_user=prctl) even if CONFIG_SECCOMP=y. Agreed. I think this is the right time to flip this switch. I agree with the (very well described) rationales. :) Fundamentally, likely everyone who is interested in manipulating the mitigations are doing so now, and it doesn't make sense (on many fronts) to tie some to seccomp mode any more (which was intended as a temporary defense to gain coverage while sysadmins absorbed what the best practices should be). Thanks for sending this! Acked-by: Kees Cook -- Kees Cook