All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jon Masters <jcm@redhat.com>
To: speck@linutronix.de
Subject: [MODERATED] Re: GPZv4
Date: Tue, 17 Apr 2018 17:03:01 -0400	[thread overview]
Message-ID: <47b619bf-8d07-c465-9017-583cf5ac80ee@redhat.com> (raw)
In-Reply-To: <20180417203717.GF3890@pd.tnic>

[-- Attachment #1: Type: text/plain, Size: 3290 bytes --]

On 04/17/2018 04:37 PM, speck for Borislav Petkov wrote:
> On Tue, Apr 17, 2018 at 03:56:55PM -0400, speck for Jon Masters wrote:
>> Let's make sure we're talking about the right thing when we talk about
>> things being on or off. I usually always talk about a performance
>> feature being on or off, not a mitigation. Therefore, I read the above
>> as "MD is off by default", meaning the performance feature is disabled.
> 
> I mean the opposite. MD is enabled, as it is the default setting
> normally, on any CPU that has MD. So the performance feature remains
> enabled.
> 
>> This is our current thinking. However, AMD disagree with this and prefer
>> to leave the feature enabled by default.
> 
> Yes.

Great! Then we're at least talking about the right thing, even if we
have differing opinions on the default ;)

[my one comment in this email on RHEL, feel free to skip next para]
Red Hat's perspective is that we need to be "secure by default". I would
/love/ to be able to leave MD enabled globally on all arches, but in
order for that to happen, everyone across the industry would have to
agree to that with no vendors going a different way at the 11th hour and
using it for PR win. To that end, I've asked all of the big players to
consider a commitment to this plan prior to RH making the default be
enabled. Intel and AMD agreed to go do some driving there, and I met
with MS in Redmond last week to discuss this in a bit more detail. If we
don't get such a plan in place, AMD would currently be the only uarch
for which we would leave the default of SSB enabled in RHEL (by virtue
of the terms under which we have the chicken bit information provided).

>> That would mean having to (at a minimum) address all of the userspace
>> exposure with prctl(), seccomp(), or other interfaces, and get that
>> all done within the next month. For the actual browsers, sure, there
>> will be process isolation updates.
> 
> Yes.

This is a fair amount of work. In particular, we don't have any prctl
defined yet and we need one for applications to use to toggle userspace.

> Paranoid people can boot with mdd=on - meaning "memory
> disambiguation disable - on"

Indeed.

>    [ and yap, if anything, we very very quickly need to agree on one
>      terminology and stick with it because the confusion will be insane...
>    ]
> 
> or, in your suggested nomenclature, ssb=off.
> 
> The finer-grained stuff we can do in parallel.

So we need to close on the following urgently:

1). What are we going to refer to this as?
	- MDD
	- SSB
	- something else?

In the case of "MDD" it's x86 specific and "enabling" it means you
disable a feature (MD). To me, that seems to be inverted logic. You
would set it to "on", "off", or "kernel" (MD only in userspace).

In the case of "SSB" it's more industry wide terminology but it's not
the Intel term. You would set it to "on", "off", or "userspace".

2). We need a prctl option for a task to request behavior for SSB. One
option could be a new PR_SET_MITIGATION where we then have minor
parameters for additional mitigations that are required later.

Can we get some closure on the two above asap?

Jon.

-- 
Computer Architect | Sent from my Fedora powered laptop


  reply	other threads:[~2018-04-17 21:03 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-04-17 18:26 [MODERATED] GPZv4 Jon Masters
2018-04-17 19:31 ` [MODERATED] GPZv4 Borislav Petkov
2018-04-17 19:56   ` Jon Masters
2018-04-17 20:37     ` Borislav Petkov
2018-04-17 21:03       ` Jon Masters [this message]
2018-04-17 21:20         ` Borislav Petkov
2018-04-17 21:22         ` GPZv4 Thomas Gleixner
2018-04-17 21:25           ` [MODERATED] GPZv4 Jiri Kosina
2018-04-17 21:38             ` Jon Masters
2018-04-17 21:43               ` Jiri Kosina
2018-04-17 22:01                 ` GPZv4 Thomas Gleixner
2018-04-17 22:02                   ` [MODERATED] GPZv4 Jon Masters
2018-04-18  2:48                     ` Konrad Rzeszutek Wilk
2018-04-18  3:44                       ` Jon Masters
2018-04-18  4:09                         ` Jon Masters
2018-04-18  4:18                           ` Jon Masters
2018-04-18  4:56                         ` Jon Masters
2018-04-18  7:06                         ` Jon Masters
2018-04-18  8:54                       ` GPZv4 Thomas Gleixner
2018-04-18 13:22                         ` [MODERATED] GPZv4 Jon Masters
2018-04-18 14:04                           ` GPZv4 Thomas Gleixner
2018-04-18 14:07                             ` [MODERATED] GPZv4 Jon Masters
2018-04-18 14:52                               ` Konrad Rzeszutek Wilk
2018-04-18 15:02                                 ` Jon Masters
2018-04-18 21:12                                   ` Konrad Rzeszutek Wilk
2018-04-18 21:20                                     ` Jon Masters
2018-04-17 21:36           ` Jon Masters

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=47b619bf-8d07-c465-9017-583cf5ac80ee@redhat.com \
    --to=jcm@redhat.com \
    --cc=speck@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.