From: Dave Hansen <dave.hansen@intel.com>
To: Pavel Machek <pavel@ucw.cz>
Cc: "Yu, Yu-cheng" <yu-cheng.yu@intel.com>,
Randy Dunlap <rdunlap@infradead.org>,
x86@kernel.org, "H. Peter Anvin" <hpa@zytor.com>,
Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@redhat.com>,
linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org,
linux-mm@kvack.org, linux-arch@vger.kernel.org,
linux-api@vger.kernel.org, Arnd Bergmann <arnd@arndb.de>,
Andy Lutomirski <luto@kernel.org>,
Balbir Singh <bsingharora@gmail.com>,
Borislav Petkov <bp@alien8.de>,
Cyrill Gorcunov <gorcunov@gmail.com>,
Dave Hansen <dave.hansen@linux.intel.com>,
Eugene Syromiatnikov <esyr@redhat.com>,
Florian Weimer <fweimer@redhat.com>,
"H.J. Lu" <hjl.tools@gmail.com>, Jann Horn <jannh@google.com>,
Jonathan Corbet <corbet@lwn.net>,
Kees Cook <keescook@chromium.org>,
Mike Kravetz <mike.kravetz@oracle.com>,
Nadav Amit <nadav.amit@gmail.com>,
Oleg Nesterov <oleg@redhat.com>,
Peter Zijlstra <peterz@infradead.org>,
"Ravi V. Shankar" <ravi.v.shankar@intel.com>,
Vedvyas Shanbhogue <vedvyas.shanbhogue@intel.com>,
Dave Martin <Dave.Martin@arm.com>,
Weijiang Yang <weijiang.yang@intel.com>
Subject: Re: [PATCH v12 1/8] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
Date: Mon, 21 Sep 2020 15:58:24 -0700 [thread overview]
Message-ID: <88af5381-98d0-5b56-c264-97ee6dd72f8b@intel.com> (raw)
In-Reply-To: <20200921225251.GB13299@amd>
On 9/21/20 3:52 PM, Pavel Machek wrote:
>>> +config X86_INTEL_BRANCH_TRACKING_USER
>>> + prompt "Intel Indirect Branch Tracking for user-mode"
>> Take the "Intel " and "INTEL_" out, please. It will only cause us all
>> pain later if some of our x86 compatriots decide to implement this.
> Are other x86 manufacturers legally allowed to implement that?
I don't know and frankly don't want to know.
We've seen AMD and Intel both implement plenty of features from the
other. Protection Keys for Userspace is the most recent example.
Unless there's evidence to the contrary, I think the best thing for the
kernel is to assume that any feature can show up on any vendor's CPU.
next prev parent reply other threads:[~2020-09-21 22:58 UTC|newest]
Thread overview: 46+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-18 19:23 [PATCH v12 0/8] Control-flow Enforcement: " Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 1/8] x86/cet/ibt: Add Kconfig option for user-mode " Yu-cheng Yu
2020-09-18 20:24 ` Randy Dunlap
2020-09-18 20:59 ` Pavel Machek
2020-09-18 21:08 ` H.J. Lu
2020-09-18 21:24 ` Pavel Machek
2020-09-18 21:36 ` H.J. Lu
2020-09-18 21:25 ` Yu, Yu-cheng
2020-09-18 21:40 ` Pavel Machek
2020-09-18 21:46 ` H.J. Lu
2020-09-18 22:03 ` Pavel Machek
2020-09-21 22:30 ` Yu, Yu-cheng
2020-09-21 22:41 ` Dave Hansen
2020-09-21 22:47 ` Yu, Yu-cheng
2020-09-21 22:54 ` Dave Hansen
2020-09-21 23:27 ` Yu, Yu-cheng
2020-09-21 22:52 ` Pavel Machek
2020-09-21 22:58 ` Dave Hansen [this message]
2020-09-18 19:23 ` [PATCH v12 2/8] x86/cet/ibt: User-mode Indirect Branch Tracking support Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 3/8] x86/cet/ibt: Handle signals for Indirect Branch Tracking Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 4/8] x86/cet/ibt: ELF header parsing " Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 5/8] x86/cet/ibt: Update arch_prctl functions " Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 6/8] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 7/8] x86/vdso: Insert endbr32/endbr64 to vDSO Yu-cheng Yu
2020-09-18 19:23 ` [PATCH v12 8/8] x86: Disallow vsyscall emulation when CET is enabled Yu-cheng Yu
2020-09-18 19:32 ` Dave Hansen
2020-09-18 21:00 ` Pavel Machek
2020-09-18 21:06 ` H.J. Lu
2020-09-18 21:17 ` Dave Hansen
2020-09-18 21:22 ` H.J. Lu
2020-09-18 21:28 ` Dave Hansen
2020-09-18 21:21 ` Yu, Yu-cheng
2020-09-18 21:22 ` Pavel Machek
2020-09-19 0:11 ` Andy Lutomirski
2020-09-21 16:22 ` Yu, Yu-cheng
2020-09-21 22:37 ` Yu-cheng Yu
2020-09-21 23:48 ` Andy Lutomirski
2020-09-22 17:45 ` Yu, Yu-cheng
2020-09-23 21:34 ` Andy Lutomirski
2020-09-23 22:07 ` Yu, Yu-cheng
2020-09-23 21:29 ` Sean Christopherson
2020-09-23 22:06 ` Yu, Yu-cheng
2020-09-23 22:08 ` Dave Hansen
2020-09-23 22:20 ` Yu, Yu-cheng
2020-09-23 22:47 ` Andy Lutomirski
2020-09-23 22:53 ` Dave Hansen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=88af5381-98d0-5b56-c264-97ee6dd72f8b@intel.com \
--to=dave.hansen@intel.com \
--cc=Dave.Martin@arm.com \
--cc=arnd@arndb.de \
--cc=bp@alien8.de \
--cc=bsingharora@gmail.com \
--cc=corbet@lwn.net \
--cc=dave.hansen@linux.intel.com \
--cc=esyr@redhat.com \
--cc=fweimer@redhat.com \
--cc=gorcunov@gmail.com \
--cc=hjl.tools@gmail.com \
--cc=hpa@zytor.com \
--cc=jannh@google.com \
--cc=keescook@chromium.org \
--cc=linux-api@vger.kernel.org \
--cc=linux-arch@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=luto@kernel.org \
--cc=mike.kravetz@oracle.com \
--cc=mingo@redhat.com \
--cc=nadav.amit@gmail.com \
--cc=oleg@redhat.com \
--cc=pavel@ucw.cz \
--cc=peterz@infradead.org \
--cc=ravi.v.shankar@intel.com \
--cc=rdunlap@infradead.org \
--cc=tglx@linutronix.de \
--cc=vedvyas.shanbhogue@intel.com \
--cc=weijiang.yang@intel.com \
--cc=x86@kernel.org \
--cc=yu-cheng.yu@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox