linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Disabling CPU vulnerabilities workarounds
@ 2018-08-23 16:33 Artem S. Tashkinov
  0 siblings, 0 replies; 5+ messages in thread
From: Artem S. Tashkinov @ 2018-08-23 16:33 UTC (permalink / raw)
  To: linux-kernel

Hello LKML,

As time goes by more and more fixes of Intel/AMD/ARM CPUs 
vulnerabilities are added to the Linux kernel without a simple way to 
disable them all in one fell swoop.

Disabling is a good option for strictly confined environments where no 
3d party untrusted code is ever to be run, e.g. a rendering farm, a 
supercomputer, or even a home server which runs Samba/SSH server and 
nothing else.

I wonder if someone could wrote a patch which implemented the following 
two options for the kernel:

* A boot option option which allows to disable most runtime 
protections/workarounds/fixes (as far as I understand some of them can't 
be reverted since they are compiled in or use certain GCC flags), e.g. 
let's call it "insecure" or "insecurecpumode".

* A compile-time CONFIG_ option which disables all these fixes 
_permanently_ without a way to turn them later back on during runtime.

Right now linux/Documentation/admin-guide/kernel-parameters.txt is a 
mess of various things which take ages to sift through and there's zero 
understanding whether you've found everything and correctly disabled it.


Best regards,
Artem

^ permalink raw reply	[flat|nested] 5+ messages in thread
* Disabling CPU vulnerabilities workarounds
@ 2018-08-25 10:42 Artem S. Tashkinov
  2018-08-25 18:39 ` Casey Schaufler
  0 siblings, 1 reply; 5+ messages in thread
From: Artem S. Tashkinov @ 2018-08-25 10:42 UTC (permalink / raw)
  To: linux-kernel

Hello LKML,

As time goes by more and more fixes of Intel/AMD/ARM CPUs 
vulnerabilities are added to the Linux kernel without a simple way to 
disable them all in one fell swoop.

Disabling is a good option for strictly confined environments where no 
3d party untrusted code is ever to be run, e.g. a rendering farm, a 
supercomputer, or even a home server which runs Samba/SSH server and 
nothing else.

I wonder if someone could wrote a patch which implemented the following 
two options for the kernel:

* A boot option option which allows to disable most runtime 
protections/workarounds/fixes (as far as I understand some of them can't 
be reverted since they are compiled in or use certain GCC flags), e.g. 
let's call it "insecure" or "insecurecpumode".

* A compile-time CONFIG_ option which disables all these fixes 
_permanently_ without a way to turn them later back on during runtime.

Right now linux/Documentation/admin-guide/kernel-parameters.txt is a 
mess of various things which take ages to sift through and there's zero 
understanding whether you've found everything and correctly disabled it.


Best regards,
Artem

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2018-08-26 20:58 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-23 16:33 Disabling CPU vulnerabilities workarounds Artem S. Tashkinov
2018-08-25 10:42 Artem S. Tashkinov
2018-08-25 18:39 ` Casey Schaufler
2018-08-25 23:28   ` Artem S. Tashkinov
2018-08-26 20:54     ` Casey Schaufler

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).