Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1069341pxv; Thu, 22 Jul 2021 21:39:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwOC5XNbWimNso98wbtyeBLBmKrFaOwVwLDvbuZN+QK6UPQ7lmsvWKoBKR410QbraoPu0RZ X-Received: by 2002:a05:6638:c58:: with SMTP id g24mr2544710jal.63.1627015178754; Thu, 22 Jul 2021 21:39:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627015178; cv=none; d=google.com; s=arc-20160816; b=fxilaWxvJBqUKtDj4yEuf9ih8G0ftQkXWHOnoIF/jG7cAeosIn+lLlwNOAQFkfuHGG VPh63TFO5ze2CRY0xlUw2ADMa2zGka4hGSyKhvebbPIaLJwYHSpvyShWeNcwgTF5y3t7 Ms5d1u5xsC3/PWLYeb/nduJxH4z6KEzLUIN2HlQSUY72PMQvR4LBSLXBp5T1ompoHusC 3iOq4rb6YWinmV+s4vQz6km1Y/1KNCZP6M/Gs8Re1k1vKUmjztqf26uBWOP7NUpmWBxq xluBEFgPc0zwjj8NfzebyH7hieRQTH+6VP6S0eTl/06hPyN5CoOHh9yAvJ/mTu64LoXZ hF0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=/qj6oCF0Bps6laCKnB2SnDxbkiRn81ATixkUpo80E10=; b=nEm8fhvJeYqZo/CzQizufDDyyueceZYwQHlntOd1e0tnXT7eP+ZwlRT67n09wIFz9d j6dFmvNeq0bz8SVA9QIIjvANSf44ZZIk4kkd6DIf8zgEIuDcTkdsiJACX9dl36G6urTU EKsJVLusHV0fnuevjZHVOOFThU1TZz4lBS7QAPwcX92w43yy/Al4/OPv9GBywJaU7loU H9yIlSiZEnlW/PPny/8w92CqQJ+WFEs3Vgh9O0uHWOMXS4vLHQXvknmOg5h4tLzW9OGV s/SYDMKd3jT64h453rczBWDwCKH2FiVYZy97Foxwh00fBJA0K7Mfq0aLv+bMBaFfHhbZ cd4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=tTj7788f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f11si34095412ils.120.2021.07.22.21.39.26; Thu, 22 Jul 2021 21:39:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=tTj7788f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233628AbhGWD6K (ORCPT + 99 others); Thu, 22 Jul 2021 23:58:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40966 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231760AbhGWD6J (ORCPT ); Thu, 22 Jul 2021 23:58:09 -0400 Received: from mail-il1-x12f.google.com (mail-il1-x12f.google.com [IPv6:2607:f8b0:4864:20::12f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D622EC061575 for ; Thu, 22 Jul 2021 21:38:42 -0700 (PDT) Received: by mail-il1-x12f.google.com with SMTP id a14so477906ila.1 for ; Thu, 22 Jul 2021 21:38:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/qj6oCF0Bps6laCKnB2SnDxbkiRn81ATixkUpo80E10=; b=tTj7788fq7UyumVl+0XhQdDXTaMDEbeKbtVh/w/cutbEiKDoVaLSnLq3z7sBPoV4UB t5AAod9e9SIzKwa7A0xbZlPMXlZmD6OjfmZpV9EYj6zWMuw89zY4T1S/uNauPgIRkTkB JprwM84orX5EsY9ziXQ9fUCoQAXXMbAoas000= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/qj6oCF0Bps6laCKnB2SnDxbkiRn81ATixkUpo80E10=; b=ERGXfFdhgkHGuYvRaUWIRgEFrT3fnna+p2JmRD/ktqubwf3M6V7FqrXNal8bUpHY/H ZxI9Jq9IR4JDjWebrQ68HoR5NPwOUlZrmLF/nAO1xKcc3Mw2F+SLxle2gt13S9C0bwje epzc5KyGd6+gvEWBUmRQCB9uDrPfyJWzfFbF0uvqo0Mxt/I0StPCL7gaHtHTQz5KWaVc kyUaFzEnH5WaJm5DaqVc/xnFLNEgIvwZ4q4TGuc32VjhJHcZqwfSYVbTVpducHYTlAMP CHbNxQm8LJ45/Fwyh1hCIplBrYbRaIQ0mH7/FbhkJbtB0tJ8hPgJp7MLshueC1sFSBJZ oMsQ== X-Gm-Message-State: AOAM5336YFrUBW6TVQ7wDyrK74tbT0Cy3vCixE4KuqiFhZ/+LiE+sylO zqaSGkOL4whcMVgHjEbBTcF+p2scEm5w/akHHL/i4Q== X-Received: by 2002:a92:b74d:: with SMTP id c13mr2278206ilm.176.1627015121239; Thu, 22 Jul 2021 21:38:41 -0700 (PDT) MIME-Version: 1.0 References: <20210721190250.26095-1-fmdefrancesco@gmail.com> In-Reply-To: <20210721190250.26095-1-fmdefrancesco@gmail.com> From: Joel Fernandes Date: Fri, 23 Jul 2021 00:38:30 -0400 Message-ID: Subject: Re: [PATCH] admin-guide/hw-vuln: Rephrase a section of core-scheduling.rst To: "Fabio M. De Francesco" Cc: Jonathan Corbet , Vineeth Pillai , "Peter Zijlstra (Intel)" , "open list:DOCUMENTATION" , LKML Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 21, 2021 at 3:02 PM Fabio M. De Francesco wrote: > > Rephrase the "For MDS" section in core-scheduling.rst for the purpose of > making it clearer what is meant by "kernel memory is still considered > untrusted". > > Suggested-by: Vineeth Pillai > Signed-off-by: Fabio M. De Francesco Reviewed-by: Joel Fernandes (Google) thanks, - Joel > --- > Documentation/admin-guide/hw-vuln/core-scheduling.rst | 9 +++++---- > 1 file changed, 5 insertions(+), 4 deletions(-) > > diff --git a/Documentation/admin-guide/hw-vuln/core-scheduling.rst b/Documentation/admin-guide/hw-vuln/core-scheduling.rst > index 7b410aef9c5c..e6b5ceb219ec 100644 > --- a/Documentation/admin-guide/hw-vuln/core-scheduling.rst > +++ b/Documentation/admin-guide/hw-vuln/core-scheduling.rst > @@ -181,10 +181,11 @@ Open cross-HT issues that core scheduling does not solve > -------------------------------------------------------- > 1. For MDS > ~~~~~~~~~~ > -Core scheduling cannot protect against MDS attacks between an HT running in > -user mode and another running in kernel mode. Even though both HTs run tasks > -which trust each other, kernel memory is still considered untrusted. Such > -attacks are possible for any combination of sibling CPU modes (host or guest mode). > +Core scheduling cannot protect against MDS attacks between the siblings running in > +user mode and the others running in kernel mode. Even though all siblings run tasks > +which trust each other, when the kernel is executing code on behalf of a task, it > +cannot trust the code running in the sibling. Such attacks are possible for any > +combination of sibling CPU modes (host or guest mode). > > 2. For L1TF > ~~~~~~~~~~~ > -- > 2.32.0 >