lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 20 Oct 2011 14:31:26 +0200
From:	Borislav Petkov <bp@...64.org>
To:	"Srivatsa S. Bhat" <srivatsa.bhat@...ux.vnet.ibm.com>
Cc:	Tejun Heo <tj@...nel.org>, "Rafael J. Wysocki" <rjw@...k.pl>,
	"tglx@...utronix.de" <tglx@...utronix.de>,
	"tigran@...azian.fsnet.co.uk" <tigran@...azian.fsnet.co.uk>,
	"mingo@...e.hu" <mingo@...e.hu>, "hpa@...or.com" <hpa@...or.com>,
	"x86@...nel.org" <x86@...nel.org>,
	Linux PM mailing list <linux-pm@...r.kernel.org>,
	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] CPU hotplug, x86 microcode: Revalidate microcode before
 microcode update

Hi Srivatsa,

On Wed, Oct 19, 2011 at 01:16:41PM -0400, Srivatsa S. Bhat wrote:
> However, since I am not aware of what hpa's new ucode loading solution
> is, nor how it will handle this case, I thought of posting this patch
> (now tested and fine-tuned),

Hehe, please don't tell me you tested it by really hotswapping an x86
CPU :-).

> so that it can be applied in case this
> patch is deemed to be necessary/desirable to avoid breaking hot-swap cases.
> 
> Thanks,
> Srivatsa S. Bhat
> 
> ---
> 
> This patch is intended to go with the patch posted at
> http://thread.gmane.org/gmane.linux.kernel/1200882/focus=1200991
> 
> Since that patch optimizes microcode update by keeping the microcode image
> in kernel memory and not freeing it up even when the CPU goes offline, it
> means we would be applying the same microcode image when the CPU comes back
> online.
> 
> However, if physically hotplugging of CPUs is supported, then we could
> physically hot-unplug CPUs and then hot-plug new (and possibly a different
> type of) CPUs. In such a case, it would be wrong to blindly apply the same
> old microcode (that the kernel maintained for the old CPU) to this new CPU.
> 
> Hence, this patch adds a validation to check whether the microcode revision
> we have in kernel memory and the revision that needs to be applied to the
> CPU that was just brought online, are the same or not. If they happen to be
> different, then it invalidates and frees the kernel's copy of the microcode,
> triggering a fresh request to userspace to get the appropriate microcode
> image for this CPU.
> 
> Signed-off-by: Srivatsa S. Bhat <srivatsa.bhat@...ux.vnet.ibm.com>

Ok, seriously, I think your patch looks very good and it should be doing
what it's supposed to and the commit message is very good in explaining
what happens, but, unless there's a real problem it fixes, it is not
needed.

I know, I know, what about the hotswapping case, you'd say. Well,
this is not real, I'd guess hotswapping on x86 is still no more than
scribbles on some whiteboard (unless I'm proven wrong, of course) so
fixing hypothetical cases is not something we should do - the kernel
bloat level is not very low as it is right now and there are _much_ more
_real_ issues which could make much better use of your expertise and
patches.

:-)

So, this should probably be x86 maintainers' call, but I, for one, don't
think this patch is necessary, IMHO.

Thanks.

-- 
Regards/Gruss,
Boris.

Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach
GM: Alberto Bozzo
Reg: Dornach, Landkreis Muenchen
HRB Nr. 43632 WEEE Registernr: 129 19551
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ