Re: [PATCH v5] ARM: Implement SLS mitigation

2021-03-23 Thread Jian Cai
Thanks for the suggestion. I've sent an inquiry to the author of -mharden-sls* in GCC and hopefully that would shed some more light. We do get warnings for oraphon sections when using lld. The other linkers do not seem to provide such warnings, although the boot failure also does not seem to happen

Re: [PATCH v5] ARM: Implement SLS mitigation

2021-03-22 Thread Linus Walleij
On Wed, Mar 10, 2021 at 5:43 AM Jian Cai wrote: > On Sat, Mar 6, 2021 at 4:25 AM Linus Walleij wrote: > > On Fri, Mar 5, 2021 at 12:23 AM Jian Cai wrote: > > > On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij > > > wrote: > > > I think gcc also has these options. > > > https://gcc.gnu.org/onlined

Re: [PATCH v5] ARM: Implement SLS mitigation

2021-03-09 Thread Jian Cai
On Sat, Mar 6, 2021 at 4:25 AM Linus Walleij wrote: > > On Fri, Mar 5, 2021 at 12:23 AM Jian Cai wrote: > > On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij > > wrote: > > > > > > On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote: > > > > > > > This patch adds CONFIG_HARDEN_SLS_ALL that can be used t

Re: [PATCH v5] ARM: Implement SLS mitigation

2021-03-06 Thread Linus Walleij
On Fri, Mar 5, 2021 at 12:23 AM Jian Cai wrote: > On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij wrote: > > > > On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote: > > > > > This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on > > > -mharden-sls=all, which mitigates the straight-line spec

Re: [PATCH v5] ARM: Implement SLS mitigation

2021-03-04 Thread Jian Cai
On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij wrote: > > On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote: > > > This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on > > -mharden-sls=all, which mitigates the straight-line speculation > > vulnerability, speculative execution of the instr

Re: [PATCH v5] ARM: Implement SLS mitigation

2021-03-03 Thread Linus Walleij
On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote: > This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on > -mharden-sls=all, which mitigates the straight-line speculation > vulnerability, speculative execution of the instruction following some > unconditional jumps. Notice -mharden-sls