Re: [PATCH] Mention PowerPC in the L1TF documentation.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Anthony,

On Thu, 14 Nov 2019, asteinhauser@xxxxxxxxxx wrote:

> From: Anthony Steinhauser <asteinhauser@xxxxxxxxxx>
> 
> There is a false negative that L1TF is Intel specific while it affects
> also PowerPC:
> https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d

Please use the regular

   commit 12-char-sha ("powerpc: .......")

notation. These links are horrible.

> Another false negative is that the kernel is unconditionally protected
> against L1TF attacks from userspace. That's true only on x86 but not on
> PowerPC where you can turn the protection off by nopti.

Missing newline between body and SOB

> Signed-off-by: Anthony Steinhauser <asteinhauser@xxxxxxxxxx>
> ---
>  Documentation/admin-guide/hw-vuln/l1tf.rst | 15 +++++++++------
>  1 file changed, 9 insertions(+), 6 deletions(-)
> 
> diff --git a/Documentation/admin-guide/hw-vuln/l1tf.rst b/Documentation/admin-guide/hw-vuln/l1tf.rst
> index f83212fae4d5..243e494b337a 100644
> --- a/Documentation/admin-guide/hw-vuln/l1tf.rst
> +++ b/Documentation/admin-guide/hw-vuln/l1tf.rst
> @@ -9,10 +9,11 @@ for the access, has the Present bit cleared or other reserved bits set.
>  Affected processors
>  -------------------
>  
> -This vulnerability affects a wide range of Intel processors. The
> -vulnerability is not present on:
> +This vulnerability affects a wide range of Intel and PowerPC processors.
> +The vulnerability is not present on:
>  
> -   - Processors from AMD, Centaur and other non Intel vendors
> +   - Processors from AMD, Centaur and other non Intel vendors except for
> +     PowerPC

No. This needs restructuring. The non Intel vendor means vendors which
produce x86 machines (not really clear TBH), but adding these two PPC parts
above and here does not make it any better.
  
>     - Older processor models, where the CPU family is < 6

Also this suggest that _ALL_ PowerPC processors are affected as there is
no exception list.

So I suggest to structure this like this:

Affected processors
-------------------

 1) Intel processors

    Move the existing list here

 2) PowerPC processors

    Add some meat

Whether a processor is affected or not...

> @@ -125,7 +126,7 @@ mitigations are active. The relevant sysfs file is:
>  
>  /sys/devices/system/cpu/vulnerabilities/l1tf
>  
> -The possible values in this file are:
> +The possible values in this file on x86 are:

That commit you referenced added the sysfs output for powerpc. So that
should be documented properly here as well, right?

>    ===========================   ===============================
>    'Not affected'		The processor is not vulnerable
> @@ -158,8 +159,10 @@ The resulting grade of protection is discussed in the following sections.
>  Host mitigation mechanism
>  -------------------------
>  
> -The kernel is unconditionally protected against L1TF attacks from malicious
> -user space running on the host.
> +On x86 the kernel is unconditionally protected against L1TF attacks from
> +malicious user space running on the host. On PowerPC the kernel is
> +protected by flushing the L1D cache on each transition from kernel to
> +userspace unless the 'nopti' boot argument turns this mitigation off.

Please make this clearly visually separated. Just glueing this together is
hard to read.

What about the l1tf boot param? Is it x86 only? If so, then this wants to
be added to the the documentation as well.

What about the guest to host issue on PPC? Not affected or same mitigation
or what?

We really spent a lot of time to write understandable and useful
documentation. Just sprinkling a few powerpc'isms into it is really not
cutting it.

This needs proper structuring so that it's obvious for the intended
audience (administrators, users) which part is applicable to which
architecture or to both. 

Thanks,

	tglx



[Index of Archives]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux