[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 04/13] xen/arm: Add ARCH_WORKAROUND_2 probing



On Sat, 26 May 2018, Andrew Cooper wrote:
> On 25/05/2018 21:51, Stefano Stabellini wrote:
> > On Wed, 23 May 2018, Julien Grall wrote:
> >> Hi,
> >>
> >> On 05/23/2018 10:57 PM, Stefano Stabellini wrote:
> >>> On Tue, 22 May 2018, Julien Grall wrote:
> >>>> As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery
> >>>> mechanism for detecting the SSBD mitigation.
> >>>>
> >>>> A new capability is also allocated for that purpose, and a config
> >>>> option.
> >>>>
> >>>> This is part of XSA-263.
> >>>>
> >>>> Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
> >>>> ---
> >>>>   xen/arch/arm/Kconfig             | 10 ++++++++++
> >>>>   xen/arch/arm/cpuerrata.c         | 39
> >>>> +++++++++++++++++++++++++++++++++++++++
> >>>>   xen/include/asm-arm/cpuerrata.h  | 21 +++++++++++++++++++++
> >>>>   xen/include/asm-arm/cpufeature.h |  3 ++-
> >>>>   xen/include/asm-arm/smccc.h      |  6 ++++++
> >>>>   5 files changed, 78 insertions(+), 1 deletion(-)
> >>>>
> >>>> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
> >>>> index 8174c0c635..0e2d027060 100644
> >>>> --- a/xen/arch/arm/Kconfig
> >>>> +++ b/xen/arch/arm/Kconfig
> >>>> @@ -73,6 +73,16 @@ config SBSA_VUART_CONSOLE
> >>>>            Allows a guest to use SBSA Generic UART as a console. The
> >>>>            SBSA Generic UART implements a subset of ARM PL011 UART.
> >>>>   +config ARM_SSBD
> >>>> +        bool "Speculative Store Bypass Disable" if EXPERT = "y"
> >>>> +        depends on HAS_ALTERNATIVE
> >>>> +        default y
> >>>> +        help
> >>>> +          This enables mitigation of bypassing of previous stores by
> >>>> speculative
> >>>> +          loads.
> >>> I would add a reference to spectre v4. What do you think of:
> >>>
> >>>    This enables the mitigation of Spectre v4 attacks based on bypassing
> >>>    of previous memory stores by speculative loads.
> >> Well, the real name is SSBD (Speculative Store Bypass Disable). AFAIK, 
> >> Spectre
> >> only refers to variant 1 and 2 so far. This one has no fancy name and the
> >> specifications is using SSBD.
> > Googling for Spectre Variant 4 returns twice as many results as Googling
> > for Speculative Store Bypass Disable. It doesn't matter what is the
> > official name for the security issue, I think we need to include a
> > reference to the most common name for it.
> 
> "Speculative Store Bypass" is the agreed vendor-neutral name for the
> issue.  This is why all the mitigation is SSBD, where the D on the end
> is Disable.
> 
> Google SP4 is a common name (but only covers one reporter of the issue),
> whereas Spectre has nothing to do with this issue, and is definitely
> wrong to use.
> 
> If in doubt, use SSB(D).

I think we should definitely call it SSBD, I was just saying that it
might be helpful to include also "Variant 4" in the description, such
as:

 This is also known as Variant 4.

to help users find the right results on Google. Anyway, given that you
are certainly better informed than me about it, I won't insist on this
point, I am OK without mentioning "Variant 4".
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.