Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3020384pxv; Sun, 25 Jul 2021 13:41:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzo6Lf8i1vglyiFBVeLxdZ4lBUuQ9ERDZ3/v0actCTfaVh8trg3Xmc8Q2n0VqQwRhzpzkFs X-Received: by 2002:a92:c24c:: with SMTP id k12mr10880466ilo.28.1627245718403; Sun, 25 Jul 2021 13:41:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627245718; cv=none; d=google.com; s=arc-20160816; b=nPylzC98m104eEkh55/TMpO4a0515//GVVxOego8mySsD/pDXz7aSib+24Tyn5+VdY V8h0/kYgm21BtIY0gQhYIj7H2Byu8kHOX8Rk5uXfk5nqPwdmBedXLEQlXRYEfFVjtqjw W050zq99w0FAYwAxxxbCLm0RLUyJuhdLFbnzc/ghKT7tMHlTL1vJ+IJbiBv0oBN5jykw iN2e/1JkQXAA7YR+0XoULZ6++YYWzVVSElamHuaVyDgAibKnbRVIJtsJYALExZ1AzKny PxkssQOegfRZdfuM7G8BWJMEnTxo1TwGhNZggxaHvgysc36RU6T66LAA6LQv28gTt5wW dNcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature:dkim-filter; bh=hxyBfpapE4saUxSqIX5rdRRgIZ4B66krlK1oq/pp36M=; b=JQ+kOQKFttBqdAE9f22VTnpz3/cyqJi/DXEY5VqtadJn5uy4rqGCNyqoJ0T+36se/m Ayf5zPAqQEEwAvN1CTnaYtKuMb7wZQmSKKuQY/Obbk2+HZHoe2B8H8NB6nKJNmuGnLg3 buVfkVLkGeBZtHFcud9pwzOb+w73MMyQ1qj0tNkpqQX6MGtu4oCbyDF77W6DtIhU4dom mFetU1MD1nKXaMd0l3dt770p//wtoRLPOskkYQVb48xoauW86jfDD7DzDlwMN5Q6LxEo wPbfnALycTyy+CSRGM+TglnS3vx38pWTYJ8yn6JC9ljS9gH4qNG7GL+nUyKXvwX28H2L vhUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@lwn.net header.s=20201203 header.b="CR/66uZ3"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e6si41425389ilm.61.2021.07.25.13.41.46; Sun, 25 Jul 2021 13:41:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@lwn.net header.s=20201203 header.b="CR/66uZ3"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230116AbhGYT7T (ORCPT + 99 others); Sun, 25 Jul 2021 15:59:19 -0400 Received: from ms.lwn.net ([45.79.88.28]:41964 "EHLO ms.lwn.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229518AbhGYT7S (ORCPT ); Sun, 25 Jul 2021 15:59:18 -0400 Received: from localhost (unknown [IPv6:2601:281:8300:104d::5f6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ms.lwn.net (Postfix) with ESMTPSA id 615A12E6; Sun, 25 Jul 2021 20:39:48 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 ms.lwn.net 615A12E6 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lwn.net; s=20201203; t=1627245588; bh=hxyBfpapE4saUxSqIX5rdRRgIZ4B66krlK1oq/pp36M=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=CR/66uZ3+aJ/fRlIx1WA0FOphcuNsxaaoTia8rAXgcf0SQMSomI9PsqJ42Jo0UHXl J0K76xu97bSnlz92R6CpJJ4jUW4EcaLisY0SnAdhcq4Rvjl/86nCr08JLlgx9l+GIH TwUHEmMImT0PCTUSLfsxg1ra3CH9WwVzZV3lA2D6YePPzC5hhCZ7E7cz02sK0Jp21h ZekjkPXtsPTtbetvHLwEtiC1aVgM5KhhDN8HmXVCCFOal/x4JOS4ZQJ1yvYMK4BIqg znH/8BpjfNmT0s8nuLMau1NKQ7Qern210NngxcRKTLzhiA+ZVGY0BfQUZ2Qk2I3c5t 6vMsSxIikOqzA== From: Jonathan Corbet To: "Fabio M. De Francesco" , "Joel Fernandes (Google)" , Vineeth Pillai , "Peter Zijlstra (Intel)" , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: "Fabio M. De Francesco" Subject: Re: [PATCH] admin-guide/hw-vuln: Rephrase a section of core-scheduling.rst In-Reply-To: <20210721190250.26095-1-fmdefrancesco@gmail.com> References: <20210721190250.26095-1-fmdefrancesco@gmail.com> Date: Sun, 25 Jul 2021 14:39:47 -0600 Message-ID: <87a6maunzg.fsf@meer.lwn.net> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org "Fabio M. De Francesco" writes: > Rephrase the "For MDS" section in core-scheduling.rst for the purpose of > making it clearer what is meant by "kernel memory is still considered > untrusted". > > Suggested-by: Vineeth Pillai > Signed-off-by: Fabio M. De Francesco > --- > Documentation/admin-guide/hw-vuln/core-scheduling.rst | 9 +++++---- > 1 file changed, 5 insertions(+), 4 deletions(-) > > diff --git a/Documentation/admin-guide/hw-vuln/core-scheduling.rst b/Documentation/admin-guide/hw-vuln/core-scheduling.rst > index 7b410aef9c5c..e6b5ceb219ec 100644 > --- a/Documentation/admin-guide/hw-vuln/core-scheduling.rst > +++ b/Documentation/admin-guide/hw-vuln/core-scheduling.rst > @@ -181,10 +181,11 @@ Open cross-HT issues that core scheduling does not solve > -------------------------------------------------------- > 1. For MDS > ~~~~~~~~~~ > -Core scheduling cannot protect against MDS attacks between an HT running in > -user mode and another running in kernel mode. Even though both HTs run tasks > -which trust each other, kernel memory is still considered untrusted. Such > -attacks are possible for any combination of sibling CPU modes (host or guest mode). > +Core scheduling cannot protect against MDS attacks between the siblings running in > +user mode and the others running in kernel mode. Even though all siblings run tasks > +which trust each other, when the kernel is executing code on behalf of a task, it > +cannot trust the code running in the sibling. Such attacks are possible for any > +combination of sibling CPU modes (host or guest mode). Applied, thanks. I took the liberty of reflowing that paragraph to keep the line lengths reasonable... jon