linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter
@ 2019-05-16  7:09 Geert Uytterhoeven
  2019-05-16  7:48 ` Jiri Kosina
                   ` (2 more replies)
  0 siblings, 3 replies; 5+ messages in thread
From: Geert Uytterhoeven @ 2019-05-16  7:09 UTC (permalink / raw)
  To: Josh Poimboeuf, Thomas Gleixner, Ingo Molnar, Peter Zijlstra,
	Jiri Kosina, Greg Kroah-Hartman, Ben Hutchings
  Cc: linux-kernel, Geert Uytterhoeven, stable

Currently, if the user specifies an unsupported mitigation strategy on
the kernel command line, it will be ignored silently.  The code will
fall back to the default strategy, possibly leaving the system more
vulnerable than expected.

This may happen due to e.g. a simple typo, or, for a stable kernel
release, because not all mitigation strategies have been backported.

Inform the user by printing a message.

Fixes: 98af8452945c5565 ("cpu/speculation: Add 'mitigations=' cmdline option")
Cc: stable@vger.kernel.org
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
---
 kernel/cpu.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/kernel/cpu.c b/kernel/cpu.c
index f2ef10460698e9ec..8458fda00e6ddb88 100644
--- a/kernel/cpu.c
+++ b/kernel/cpu.c
@@ -2339,6 +2339,9 @@ static int __init mitigations_parse_cmdline(char *arg)
 		cpu_mitigations = CPU_MITIGATIONS_AUTO;
 	else if (!strcmp(arg, "auto,nosmt"))
 		cpu_mitigations = CPU_MITIGATIONS_AUTO_NOSMT;
+	else
+		pr_crit("Unsupported mitigations=%s, system may still be vulnerable\n",
+			arg);
 
 	return 0;
 }
-- 
2.17.1


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter
  2019-05-16  7:09 [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter Geert Uytterhoeven
@ 2019-05-16  7:48 ` Jiri Kosina
  2019-05-16  8:16   ` Ingo Molnar
  2019-05-16 17:43 ` Josh Poimboeuf
  2019-06-26 15:16 ` [tip:smp/urgent] " tip-bot for Geert Uytterhoeven
  2 siblings, 1 reply; 5+ messages in thread
From: Jiri Kosina @ 2019-05-16  7:48 UTC (permalink / raw)
  To: Geert Uytterhoeven
  Cc: Josh Poimboeuf, Thomas Gleixner, Ingo Molnar, Peter Zijlstra,
	Greg Kroah-Hartman, Ben Hutchings, linux-kernel, stable

On Thu, 16 May 2019, Geert Uytterhoeven wrote:

> Currently, if the user specifies an unsupported mitigation strategy on
> the kernel command line, it will be ignored silently.  The code will
> fall back to the default strategy, possibly leaving the system more
> vulnerable than expected.

Honestly, I am not convinced. We are not doing this for vast majority of 
other cmdline options either, if for any at all.

Thanks,

-- 
Jiri Kosina
SUSE Labs


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter
  2019-05-16  7:48 ` Jiri Kosina
@ 2019-05-16  8:16   ` Ingo Molnar
  0 siblings, 0 replies; 5+ messages in thread
From: Ingo Molnar @ 2019-05-16  8:16 UTC (permalink / raw)
  To: Jiri Kosina
  Cc: Geert Uytterhoeven, Josh Poimboeuf, Thomas Gleixner,
	Peter Zijlstra, Greg Kroah-Hartman, Ben Hutchings, linux-kernel,
	stable


* Jiri Kosina <jikos@kernel.org> wrote:

> On Thu, 16 May 2019, Geert Uytterhoeven wrote:
> 
> > Currently, if the user specifies an unsupported mitigation strategy on
> > the kernel command line, it will be ignored silently.  The code will
> > fall back to the default strategy, possibly leaving the system more
> > vulnerable than expected.
> 
> Honestly, I am not convinced. We are not doing this for vast majority of 
> other cmdline options either, if for any at all.

That's really a weakness - I've been bitten by this previously: I typoed 
or mis-remembered a command line option and didn't have it while I 
thought I had it.

Our boot-commandline library is pretty user-unfriendly.

Thanks,

	Ingo

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter
  2019-05-16  7:09 [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter Geert Uytterhoeven
  2019-05-16  7:48 ` Jiri Kosina
@ 2019-05-16 17:43 ` Josh Poimboeuf
  2019-06-26 15:16 ` [tip:smp/urgent] " tip-bot for Geert Uytterhoeven
  2 siblings, 0 replies; 5+ messages in thread
From: Josh Poimboeuf @ 2019-05-16 17:43 UTC (permalink / raw)
  To: Geert Uytterhoeven
  Cc: Thomas Gleixner, Ingo Molnar, Peter Zijlstra, Jiri Kosina,
	Greg Kroah-Hartman, Ben Hutchings, linux-kernel, stable

On Thu, May 16, 2019 at 09:09:35AM +0200, Geert Uytterhoeven wrote:
> Currently, if the user specifies an unsupported mitigation strategy on
> the kernel command line, it will be ignored silently.  The code will
> fall back to the default strategy, possibly leaving the system more
> vulnerable than expected.
> 
> This may happen due to e.g. a simple typo, or, for a stable kernel
> release, because not all mitigation strategies have been backported.
> 
> Inform the user by printing a message.
> 
> Fixes: 98af8452945c5565 ("cpu/speculation: Add 'mitigations=' cmdline option")
> Cc: stable@vger.kernel.org
> Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
> ---
>  kernel/cpu.c | 3 +++
>  1 file changed, 3 insertions(+)
> 
> diff --git a/kernel/cpu.c b/kernel/cpu.c
> index f2ef10460698e9ec..8458fda00e6ddb88 100644
> --- a/kernel/cpu.c
> +++ b/kernel/cpu.c
> @@ -2339,6 +2339,9 @@ static int __init mitigations_parse_cmdline(char *arg)
>  		cpu_mitigations = CPU_MITIGATIONS_AUTO;
>  	else if (!strcmp(arg, "auto,nosmt"))
>  		cpu_mitigations = CPU_MITIGATIONS_AUTO_NOSMT;
> +	else
> +		pr_crit("Unsupported mitigations=%s, system may still be vulnerable\n",
> +			arg);
>  
>  	return 0;
>  }
> -- 
> 2.17.1
> 

Acked-by: Josh Poimboeuf <jpoimboe@redhat.com>

-- 
Josh

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [tip:smp/urgent] cpu/speculation: Warn on unsupported mitigations= parameter
  2019-05-16  7:09 [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter Geert Uytterhoeven
  2019-05-16  7:48 ` Jiri Kosina
  2019-05-16 17:43 ` Josh Poimboeuf
@ 2019-06-26 15:16 ` tip-bot for Geert Uytterhoeven
  2 siblings, 0 replies; 5+ messages in thread
From: tip-bot for Geert Uytterhoeven @ 2019-06-26 15:16 UTC (permalink / raw)
  To: linux-tip-commits
  Cc: mingo, peterz, ben, hpa, jpoimboe, tglx, gregkh, geert, jkosina,
	linux-kernel

Commit-ID:  1bf72720281770162c87990697eae1ba2f1d917a
Gitweb:     https://git.kernel.org/tip/1bf72720281770162c87990697eae1ba2f1d917a
Author:     Geert Uytterhoeven <geert@linux-m68k.org>
AuthorDate: Thu, 16 May 2019 09:09:35 +0200
Committer:  Thomas Gleixner <tglx@linutronix.de>
CommitDate: Wed, 26 Jun 2019 16:56:21 +0200

cpu/speculation: Warn on unsupported mitigations= parameter

Currently, if the user specifies an unsupported mitigation strategy on the
kernel command line, it will be ignored silently.  The code will fall back
to the default strategy, possibly leaving the system more vulnerable than
expected.

This may happen due to e.g. a simple typo, or, for a stable kernel release,
because not all mitigation strategies have been backported.

Inform the user by printing a message.

Fixes: 98af8452945c5565 ("cpu/speculation: Add 'mitigations=' cmdline option")
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Jiri Kosina <jkosina@suse.cz>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Ben Hutchings <ben@decadent.org.uk>
Cc: stable@vger.kernel.org
Link: https://lkml.kernel.org/r/20190516070935.22546-1-geert@linux-m68k.org

---
 kernel/cpu.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/kernel/cpu.c b/kernel/cpu.c
index 077fde6fb953..551db494f153 100644
--- a/kernel/cpu.c
+++ b/kernel/cpu.c
@@ -2339,6 +2339,9 @@ static int __init mitigations_parse_cmdline(char *arg)
 		cpu_mitigations = CPU_MITIGATIONS_AUTO;
 	else if (!strcmp(arg, "auto,nosmt"))
 		cpu_mitigations = CPU_MITIGATIONS_AUTO_NOSMT;
+	else
+		pr_crit("Unsupported mitigations=%s, system may still be vulnerable\n",
+			arg);
 
 	return 0;
 }

^ permalink raw reply related	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2019-06-26 15:16 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-05-16  7:09 [PATCH] cpu/speculation: Warn on unsupported mitigations= parameter Geert Uytterhoeven
2019-05-16  7:48 ` Jiri Kosina
2019-05-16  8:16   ` Ingo Molnar
2019-05-16 17:43 ` Josh Poimboeuf
2019-06-26 15:16 ` [tip:smp/urgent] " tip-bot for Geert Uytterhoeven

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).