Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3491488imu; Mon, 14 Jan 2019 04:05:09 -0800 (PST) X-Google-Smtp-Source: ALg8bN7zh/JovLrBwRBxrzWxWBNDpb36fs/aaboh3D0Q6TpTt6CxF+aFcM1i+5LFh+3peIcNW2P3 X-Received: by 2002:a63:5026:: with SMTP id e38mr22610122pgb.123.1547467509193; Mon, 14 Jan 2019 04:05:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547467509; cv=none; d=google.com; s=arc-20160816; b=WXT46U2PvtAITZWQLgqSVVEOyBxK3/bH9jccaLSaIS9RJ83dklAK18F+gtjEJxVHgl 9IIP32btykdb8Bi/XzoK4tyy6TsNGs/Wa2bg/NEhfT8Tsl7nl3VRPSAtSIMt4PGC9+V9 suAXkYINNU0Uk23cWm9ni8tjUG4Bc1+udUV2mj3PSvhLk1cOEkHy8TUE+bKhV/8g2nnh Yp43uiB7Tw1L9932/OH1BOzOtGSAWm/4hHnd+Rc7KasHPri7vaBLO0jNrRhQTd7F7ZDa MGw83BXj8lGtk9JoG6lv0Ozb6/8c7IV7+4F5hhe9C6q33qhxEWkUMsQ+SBf/jy2X2dYX Ep/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=AWgXPfNdlJ2wsz80M4CfHuQZqY0sZzfrbOXBzphR8QY=; b=ijwWZcPrC1TfRai+JLWMNKUPoFZ5A5c7ONdKTW2z3ytWWVlxb921swCU7tlNp52Q66 F0PD2w8ie9EofnyhCsYnzO0XCtODfAq8ZFHoVExRogf8egjfn+r2CbsDFLmLctG0HPmm Ka2QA/cCcLMaMnVYq59FPuYUFrg6Z7mbBexFO9sXctvdFk1Ur1Uvi1VckoFYRaUy0/LC t0y2sGpS9HShzDIHOuznmVShnnSpEmlVKCEkKVPIpXNVlCLrMORoYn3vFFSIJ+5doOq+ wgE4p9duOZDFekzBNaL3gxfq0jnJOMih1OmUbTXfiXxM4Gfb8jInkw6+FgAy6UeR7Vlz NpfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w7si180531pgh.560.2019.01.14.04.04.54; Mon, 14 Jan 2019 04:05:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726765AbfANMCC (ORCPT + 99 others); Mon, 14 Jan 2019 07:02:02 -0500 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:37632 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726731AbfANMCB (ORCPT ); Mon, 14 Jan 2019 07:02:01 -0500 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id AC10A809E1; Mon, 14 Jan 2019 13:01:52 +0100 (CET) Date: Mon, 14 Jan 2019 13:01:57 +0100 From: Pavel Machek To: Jiri Kosina Cc: Tim Chen , Jonathan Corbet , Thomas Gleixner , Linus Torvalds , Tom Lendacky , Ingo Molnar , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , David Woodhouse , Andi Kleen , Dave Hansen , Asit Mallick , Arjan van de Ven , Jon Masters , Waiman Long , Greg KH , Borislav Petkov , linux-kernel@vger.kernel.org, x86@kernel.org, stable@vger.kernel.org Subject: Re: [PATCH] x86/speculation: Add document to describe Spectre and its mitigations Message-ID: <20190114120157.GB21544@amd> References: <64efec3fda40c0758601bf9b1480a35d76d3c487.1545413988.git.tim.c.chen@linux.intel.com> <20181228103437.4c03c181@lwn.net> <20190113231001.GB18710@amd> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="24zk1gE8NUlDmwG9" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --24zk1gE8NUlDmwG9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon 2019-01-14 00:12:59, Jiri Kosina wrote: > On Mon, 14 Jan 2019, Pavel Machek wrote: >=20 > > That one really is Intel-specific (not even all x86s are affectd). Same= =20 > > for Meltdown. >=20 > At least for Meltdown, your claim is simply not correct. You are right, there may be few ARM chips affected by meltdown. I don't know about any non-Intel affected by l1tf. =2E..and its documentation is just plain wrong, explaining I'm protected when I'm not... commit f372cd79be31382ae6030a1f15638cc7fe9eeb9f Author: Pavel Date: Thu Jan 3 00:48:40 2019 +0100 Ok, I guess L1TF was a lot of fun, and there was not time for a good documentation. =20 There's admin guide that is written as an advertisment, and unfortunately is slightly "inaccurate" at places (to the point of lying). =20 Plus, I believe it should go to x86/ directory, as this is really Intel issue, and not anything ARM (or RISC-V) people need to know. =20 Signed-off-by: Pavel Machek diff --git a/Documentation/admin-guide/l1tf.rst b/Documentation/admin-guide= /l1tf.rst index 9af9773..05c5422 100644 --- a/Documentation/admin-guide/l1tf.rst +++ b/Documentation/admin-guide/l1tf.rst @@ -1,10 +1,11 @@ L1TF - L1 Terminal Fault =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =20 -L1 Terminal Fault is a hardware vulnerability which allows unprivileged -speculative access to data which is available in the Level 1 Data Cache -when the page table entry controlling the virtual address, which is used -for the access, has the Present bit cleared or other reserved bits set. +L1 Terminal Fault is a hardware vulnerability on most recent Intel x86 +CPUs which allows unprivileged speculative access to data which is +available in the Level 1 Data Cache when the page table entry +controlling the virtual address, which is used for the access, has the +Present bit cleared or other reserved bits set. =20 Affected processors ------------------- @@ -76,12 +77,14 @@ Attack scenarios deterministic and more practical. =20 The Linux kernel contains a mitigation for this attack vector, PTE - inversion, which is permanently enabled and has no performance - impact. The kernel ensures that the address bits of PTEs, which are not - marked present, never point to cacheable physical memory space. - - A system with an up to date kernel is protected against attacks from - malicious user space applications. + inversion, which is permanently enabled and has no measurable + performance impact in most configurations. The kernel ensures that + the address bits of PTEs, which are not marked present, never point + to cacheable physical memory space. On x86-32, this physical memory + needs to be limited to 2GiB to make mitigation effective. + + Mitigation is present in kernels v4.19 and newer, and in + recent -stable kernels. =20 2. Malicious guest in a virtual machine ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --24zk1gE8NUlDmwG9 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlw8ejUACgkQMOfwapXb+vItRACfc4I0adToRnEhCUMN/qWFESte +LIAoK2uSoHWtjfhFHH1+DFFU+n62s5D =500e -----END PGP SIGNATURE----- --24zk1gE8NUlDmwG9--