[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v8 13/17] x86/boot: Calculate the most appropriate BTI mitigation to use



On 16/01/18 14:25, Boris Ostrovsky wrote:
> On 01/16/2018 09:13 AM, Andrew Cooper wrote:
>> On 16/01/18 14:10, Boris Ostrovsky wrote:
>>> On 01/12/2018 01:01 PM, Andrew Cooper wrote:
>>>>  
>>>> +    if ( boot_cpu_has(X86_FEATURE_IBRSB) )
>>>> +    {
>>>> +        /*
>>>> +         * Even if we've chosen to not have IBRS set in Xen context, we 
>>>> still
>>>> +         * need the IBRS entry/exit logic to virtualise IBRS support for
>>>> +         * guests.
>>>> +         */
>>>> +        if ( ibrs )
>>>> +            setup_force_cpu_cap(X86_FEATURE_XEN_IBRS_SET);
>>>> +        else
>>>> +            setup_force_cpu_cap(X86_FEATURE_XEN_IBRS_CLEAR);
>>>> +    }
>>>>
>>> Are you going to add support for Intel's "Enhanced IBRS" (I think that's
>>> what they call the "always on" mode")?
>> I'm not going to touch IBRS_ATT mode until I've got an SDP to develop
>> against.
>>
>> Given how many times the IBRS_ATT spec has changed already, I have
>> little confidence that it will remain unchanged right to the eventual
>> hardware arrives.
> I don't know if you are aware of it (I learned about this doc on Sunday) but
>
> https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
>
> (Not part of the SDM but still, an official specification. For a change.)

Wow - the published 1.0 has far more than the prerelease versions.

Still, ARCH_CAPS is only going to appear in new hardware, which is still
probably years away.  There are more important things to worry about at
the moment.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.