Re: [PATCH v3 20/35] x86/bugs: Define attack vectors
From: Borislav Petkov
Date: Thu Feb 27 2025 - 12:15:18 EST
On Thu, Feb 27, 2025 at 04:05:08PM +0000, Kaplan, David wrote:
> No. It should be 'mitigations=auto;no_user_kernel,no_user_user'
>
> (And maybe add 'no_guest_guest' if they don’t care about the malicious VMs attacking each other)
Doh, ofc, I meant that. :-P
mitigations=off;no_guest_guest
is a non-sensical config: "disable all and then disable guest_guest
additionally". Doh.
> Right, the question is do we support both opt-in and opt-out forms. We can.
> We could also start by only supporting opt-out form.
We probably should put this to a vote. I think supporting both will cause
a lot of confusion but starting with one set and then maybe adding the other
one later, if really needed, is what we could start with.
> As mentioned earlier in the thread, SMT really needs a tristate of:
> 1. All SMT mitigations including potentially disabling SMT
> 2. All SMT mitigations but excluding the possibility of disabling SMT (current default)
> 3. No SMT mitigations (not even things like STIBP)
>
> There are various ways to encode that in the command line options. 'auto,nosmt' is already #1. And just 'auto' is currently #2.
>
> We could then add 'no_cross_thread' to support #3. I think that was the latest proposal.
No objections here.
Thx.
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette