Re: [PATCH v4 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak

2018-09-07 Thread Josh Poimboeuf
On Thu, Sep 06, 2018 at 10:32:38AM +0200, Jiri Kosina wrote: > From: Jiri Kosina > > Currently, we are issuing IBPB only in cases when switching into a > non-dumpable > process, the rationale being to protect such 'important and security > sensitive' > processess (such as GPG) from data leak

Re: [PATCH v4 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak

2018-09-07 Thread Josh Poimboeuf
On Thu, Sep 06, 2018 at 10:32:38AM +0200, Jiri Kosina wrote: > From: Jiri Kosina > > Currently, we are issuing IBPB only in cases when switching into a > non-dumpable > process, the rationale being to protect such 'important and security > sensitive' > processess (such as GPG) from data leak

[PATCH v4 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak

2018-09-06 Thread Jiri Kosina
From: Jiri Kosina Currently, we are issuing IBPB only in cases when switching into a non-dumpable process, the rationale being to protect such 'important and security sensitive' processess (such as GPG) from data leak into a different userspace process via spectre v2. This is however completely

[PATCH v4 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak

2018-09-06 Thread Jiri Kosina
From: Jiri Kosina Currently, we are issuing IBPB only in cases when switching into a non-dumpable process, the rationale being to protect such 'important and security sensitive' processess (such as GPG) from data leak into a different userspace process via spectre v2. This is however completely

[PATCH v4 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak

2018-09-06 Thread Jiri Kosina
From: Jiri Kosina Currently, we are issuing IBPB only in cases when switching into a non-dumpable process, the rationale being to protect such 'important and security sensitive' processess (such as GPG) from data leak into a different userspace process via spectre v2. This is however completely

[PATCH v4 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak

2018-09-06 Thread Jiri Kosina
From: Jiri Kosina Currently, we are issuing IBPB only in cases when switching into a non-dumpable process, the rationale being to protect such 'important and security sensitive' processess (such as GPG) from data leak into a different userspace process via spectre v2. This is however completely