lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 May 2022 20:41:09 -0700 From: Dan Williams <dan.j.williams@...el.com> To: "Luck, Tony" <tony.luck@...el.com> Cc: Borislav Petkov <bp@...en8.de>, "chu, jane" <jane.chu@...cle.com>, Christoph Hellwig <hch@...radead.org>, "Hansen, Dave" <dave.hansen@...el.com>, Peter Zijlstra <peterz@...radead.org>, "Lutomirski, Andy" <luto@...nel.org>, david <david@...morbit.com>, "Darrick J. Wong" <djwong@...nel.org>, linux-fsdevel <linux-fsdevel@...r.kernel.org>, Linux NVDIMM <nvdimm@...ts.linux.dev>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, X86 ML <x86@...nel.org>, "Verma, Vishal L" <vishal.l.verma@...el.com>, "Jiang, Dave" <dave.jiang@...el.com>, Alasdair Kergon <agk@...hat.com>, Mike Snitzer <snitzer@...hat.com>, device-mapper development <dm-devel@...hat.com>, "Weiny, Ira" <ira.weiny@...el.com>, Matthew Wilcox <willy@...radead.org>, Vivek Goyal <vgoyal@...hat.com>, "Wang, Jue" <juew@...gle.com> Subject: Re: [PATCH v9 3/7] mce: fix set_mce_nospec to always unmap the whole page On Wed, May 11, 2022 at 10:17 AM Luck, Tony <tony.luck@...el.com> wrote: > > > I - just like you - am waiting for Tony to say whether he still needs > > this whole_page() thing. I already suggested removing it so I'm fine > > with this patch. > > IIRC this new patch effectively reverts back to the original behavior that > I implemented back at the dawn of time. I.e. just always mark the whole > page "not present" and don't try to mess with UC mappings to allow > partial (but non-speculative) access to the not-poisoned parts of the > page. > > If that is the case ... then Acked-by: Tony Luck <tony.luck@...el.com> > > If I've misunderstood ... then please explain what it is doing. You are correct. The page is always marked not present as far as the page-offlining code is concerned, back to the way it always was. The code in the pmem driver that repairs the page now knows that the page is to be kept "not present" until the poison is cleared and clear_mce_nospec() returns the mapping to typical write-back caching. There is no support for what the UC case previously allowed which was reading the good lines around the one bad line, just handle overwrites to clear poison and restore access.
Powered by blists - more mailing lists