From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
Julien Grall <julien.grall@arm.com>
Cc: xen-devel@lists.xenproject.org, andre.przywara@arm.com
Subject: Re: [PATCH 04/13] xen/arm: Add ARCH_WORKAROUND_2 probing
Date: Sat, 26 May 2018 00:54:43 +0100 [thread overview]
Message-ID: <68d78c21-0404-ec12-e08c-c379db27daf5@citrix.com> (raw)
In-Reply-To: <alpine.DEB.2.10.1805251222130.12008@sstabellini-ThinkPad-X260>
On 25/05/2018 21:51, Stefano Stabellini wrote:
> On Wed, 23 May 2018, Julien Grall wrote:
>> Hi,
>>
>> On 05/23/2018 10:57 PM, Stefano Stabellini wrote:
>>> On Tue, 22 May 2018, Julien Grall wrote:
>>>> As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery
>>>> mechanism for detecting the SSBD mitigation.
>>>>
>>>> A new capability is also allocated for that purpose, and a config
>>>> option.
>>>>
>>>> This is part of XSA-263.
>>>>
>>>> Signed-off-by: Julien Grall <julien.grall@arm.com>
>>>> ---
>>>> xen/arch/arm/Kconfig | 10 ++++++++++
>>>> xen/arch/arm/cpuerrata.c | 39
>>>> +++++++++++++++++++++++++++++++++++++++
>>>> xen/include/asm-arm/cpuerrata.h | 21 +++++++++++++++++++++
>>>> xen/include/asm-arm/cpufeature.h | 3 ++-
>>>> xen/include/asm-arm/smccc.h | 6 ++++++
>>>> 5 files changed, 78 insertions(+), 1 deletion(-)
>>>>
>>>> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
>>>> index 8174c0c635..0e2d027060 100644
>>>> --- a/xen/arch/arm/Kconfig
>>>> +++ b/xen/arch/arm/Kconfig
>>>> @@ -73,6 +73,16 @@ config SBSA_VUART_CONSOLE
>>>> Allows a guest to use SBSA Generic UART as a console. The
>>>> SBSA Generic UART implements a subset of ARM PL011 UART.
>>>> +config ARM_SSBD
>>>> + bool "Speculative Store Bypass Disable" if EXPERT = "y"
>>>> + depends on HAS_ALTERNATIVE
>>>> + default y
>>>> + help
>>>> + This enables mitigation of bypassing of previous stores by
>>>> speculative
>>>> + loads.
>>> I would add a reference to spectre v4. What do you think of:
>>>
>>> This enables the mitigation of Spectre v4 attacks based on bypassing
>>> of previous memory stores by speculative loads.
>> Well, the real name is SSBD (Speculative Store Bypass Disable). AFAIK, Spectre
>> only refers to variant 1 and 2 so far. This one has no fancy name and the
>> specifications is using SSBD.
> Googling for Spectre Variant 4 returns twice as many results as Googling
> for Speculative Store Bypass Disable. It doesn't matter what is the
> official name for the security issue, I think we need to include a
> reference to the most common name for it.
"Speculative Store Bypass" is the agreed vendor-neutral name for the
issue. This is why all the mitigation is SSBD, where the D on the end
is Disable.
Google SP4 is a common name (but only covers one reporter of the issue),
whereas Spectre has nothing to do with this issue, and is definitely
wrong to use.
If in doubt, use SSB(D).
~Andrew
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-05-25 23:54 UTC|newest]
Thread overview: 62+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-22 17:42 [PATCH 00/13] xen/arm: SSBD (aka Spectre-v4) mitigation (XSA-263) Julien Grall
2018-05-22 17:42 ` [PATCH 01/13] xen/arm: domain: Zeroed the vCPU stack Julien Grall
2018-05-25 20:52 ` Stefano Stabellini
2018-05-29 10:27 ` Julien Grall
2018-05-29 21:41 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 02/13] xen/arm64: entry: Use named label in guest_sync Julien Grall
2018-05-23 21:27 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 03/13] xen/arm: setup: Check errata for boot CPU later on Julien Grall
2018-05-23 21:34 ` Stefano Stabellini
2018-05-25 19:51 ` Julien Grall
2018-05-29 21:30 ` Stefano Stabellini
2018-05-30 9:17 ` Julien Grall
2018-05-22 17:42 ` [PATCH 04/13] xen/arm: Add ARCH_WORKAROUND_2 probing Julien Grall
2018-05-23 21:57 ` Stefano Stabellini
2018-05-23 22:31 ` Julien Grall
2018-05-25 20:51 ` Stefano Stabellini
2018-05-25 23:54 ` Andrew Cooper [this message]
2018-05-29 21:35 ` Stefano Stabellini
2018-05-30 9:35 ` Julien Grall
2018-05-22 17:42 ` [PATCH 05/13] xen/arm: Add command line option to control SSBD mitigation Julien Grall
2018-05-23 22:34 ` Stefano Stabellini
2018-05-24 0:48 ` Stefano Stabellini
2018-05-25 19:56 ` Julien Grall
2018-05-24 9:52 ` Julien Grall
2018-05-25 20:51 ` Stefano Stabellini
2018-05-29 11:31 ` Julien Grall
2018-05-29 22:34 ` Stefano Stabellini
2018-05-30 10:39 ` Julien Grall
2018-05-30 20:10 ` Stefano Stabellini
2018-05-31 10:34 ` Julien Grall
2018-05-31 20:58 ` Stefano Stabellini
2018-05-31 21:29 ` Julien Grall
2018-05-23 23:23 ` Stefano Stabellini
2018-05-24 9:53 ` Julien Grall
2018-05-22 17:42 ` [PATCH 06/13] xen/arm: Add ARCH_WORKAROUND_2 support for guests Julien Grall
2018-05-23 23:24 ` Stefano Stabellini
2018-05-24 0:40 ` Stefano Stabellini
2018-05-24 10:00 ` Julien Grall
2018-05-25 20:51 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 07/13] xen/arm: Simplify alternative patching Julien Grall
2018-05-25 20:52 ` Stefano Stabellini
2018-05-25 21:34 ` Julien Grall
2018-05-25 23:24 ` Stefano Stabellini
2018-05-29 11:34 ` Julien Grall
2018-05-22 17:42 ` [PATCH 08/13] xen/arm: alternatives: Add dynamic patching feature Julien Grall
2018-05-25 20:52 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 09/13] xen/arm64: Add generic assembly macros Julien Grall
2018-05-23 23:37 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 10/13] xen/arm64: Implement a fast path for handling SMCCC_ARCH_WORKAROUND_2 Julien Grall
2018-05-25 19:18 ` Stefano Stabellini
2018-05-29 12:16 ` Julien Grall
2018-05-29 21:39 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 11/13] xen/arm: Kconfig: Move HARDEN_BRANCH_PREDICTOR under "Architecture features" Julien Grall
2018-05-23 23:45 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 12/13] xen/arm: smccc: Fix indentation in ARM_SMCCC_ARCH_WORKAROUND_1_FID Julien Grall
2018-05-23 23:44 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 13/13] xen/arm: Avoid to use current everywhere in enter_hypervisor_head Julien Grall
2018-05-23 23:47 ` Stefano Stabellini
2018-05-24 10:29 ` Julien Grall
2018-05-24 18:46 ` Stefano Stabellini
2018-05-22 17:46 ` [for-4.11] Re: [PATCH 00/13] xen/arm: SSBD (aka Spectre-v4) mitigation (XSA-263) Julien Grall
2018-05-23 4:07 ` Juergen Gross
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=68d78c21-0404-ec12-e08c-c379db27daf5@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=andre.przywara@arm.com \
--cc=julien.grall@arm.com \
--cc=sstabellini@kernel.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).