Anthony Steinhauser <asteinhauser@xxxxxxxxxx> writes: > OK, I don't intend to work on it to that extent, so you can consider > this abandoned. I or someone else at IBM will pick this up and get it massaged into a form that Thomas is happy with. cheers > On Thu, Nov 14, 2019 at 2:55 PM Thomas Gleixner <tglx@xxxxxxxxxxxxx> wrote: >> >> Anthony, >> >> On Thu, 14 Nov 2019, asteinhauser@xxxxxxxxxx wrote: >> >> > From: Anthony Steinhauser <asteinhauser@xxxxxxxxxx> >> > >> > There is a false negative that L1TF is Intel specific while it affects >> > also PowerPC: >> > https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d >> >> Please use the regular >> >> commit 12-char-sha ("powerpc: .......") >> >> notation. These links are horrible. >> >> > Another false negative is that the kernel is unconditionally protected >> > against L1TF attacks from userspace. That's true only on x86 but not on >> > PowerPC where you can turn the protection off by nopti. >> >> Missing newline between body and SOB >> >> > Signed-off-by: Anthony Steinhauser <asteinhauser@xxxxxxxxxx> >> > --- >> > Documentation/admin-guide/hw-vuln/l1tf.rst | 15 +++++++++------ >> > 1 file changed, 9 insertions(+), 6 deletions(-) >> > >> > diff --git a/Documentation/admin-guide/hw-vuln/l1tf.rst b/Documentation/admin-guide/hw-vuln/l1tf.rst >> > index f83212fae4d5..243e494b337a 100644 >> > --- a/Documentation/admin-guide/hw-vuln/l1tf.rst >> > +++ b/Documentation/admin-guide/hw-vuln/l1tf.rst >> > @@ -9,10 +9,11 @@ for the access, has the Present bit cleared or other reserved bits set. >> > Affected processors >> > ------------------- >> > >> > -This vulnerability affects a wide range of Intel processors. The >> > -vulnerability is not present on: >> > +This vulnerability affects a wide range of Intel and PowerPC processors. >> > +The vulnerability is not present on: >> > >> > - - Processors from AMD, Centaur and other non Intel vendors >> > + - Processors from AMD, Centaur and other non Intel vendors except for >> > + PowerPC >> >> No. This needs restructuring. The non Intel vendor means vendors which >> produce x86 machines (not really clear TBH), but adding these two PPC parts >> above and here does not make it any better. >> >> > - Older processor models, where the CPU family is < 6 >> >> Also this suggest that _ALL_ PowerPC processors are affected as there is >> no exception list. >> >> So I suggest to structure this like this: >> >> Affected processors >> ------------------- >> >> 1) Intel processors >> >> Move the existing list here >> >> 2) PowerPC processors >> >> Add some meat >> >> Whether a processor is affected or not... >> >> > @@ -125,7 +126,7 @@ mitigations are active. The relevant sysfs file is: >> > >> > /sys/devices/system/cpu/vulnerabilities/l1tf >> > >> > -The possible values in this file are: >> > +The possible values in this file on x86 are: >> >> That commit you referenced added the sysfs output for powerpc. So that >> should be documented properly here as well, right? >> >> > =========================== =============================== >> > 'Not affected' The processor is not vulnerable >> > @@ -158,8 +159,10 @@ The resulting grade of protection is discussed in the following sections. >> > Host mitigation mechanism >> > ------------------------- >> > >> > -The kernel is unconditionally protected against L1TF attacks from malicious >> > -user space running on the host. >> > +On x86 the kernel is unconditionally protected against L1TF attacks from >> > +malicious user space running on the host. On PowerPC the kernel is >> > +protected by flushing the L1D cache on each transition from kernel to >> > +userspace unless the 'nopti' boot argument turns this mitigation off. >> >> Please make this clearly visually separated. Just glueing this together is >> hard to read. >> >> What about the l1tf boot param? Is it x86 only? If so, then this wants to >> be added to the the documentation as well. >> >> What about the guest to host issue on PPC? Not affected or same mitigation >> or what? >> >> We really spent a lot of time to write understandable and useful >> documentation. Just sprinkling a few powerpc'isms into it is really not >> cutting it. >> >> This needs proper structuring so that it's obvious for the intended >> audience (administrators, users) which part is applicable to which >> architecture or to both. >> >> Thanks, >> >> tglx