| 
    
 [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2 for-4.18?] x86: support data operand independent timing mode
 Hi, On 14/09/2023 10:11, Jan Beulich wrote: On 14.09.2023 11:04, Julien Grall wrote:On 14/09/2023 07:32, Jan Beulich wrote:On 13.09.2023 19:56, Julien Grall wrote:On 11/09/2023 16:01, Jan Beulich wrote:[1] specifies a long list of instructions which are intended to exhibit timing behavior independent of the data they operate on. On certain hardware this independence is optional, controlled by a bit in a new MSR. Provide a command line option to control the mode Xen and its guests are to operate in, with a build time control over the default. Longer term we may want to allow guests to control this.If I read correctly the discussion on the previous version. There was some concern with this version of patch. I can't find anything public suggesting that the concerned were dismissed. Do you have any pointer?Well, I can point to the XenServer patch queue, which since then has gained a patch of similar (less flexible) functionality (and seeing the similarity I was puzzled by this patch, which was posted late for 4.17, not having gone in quite some time ago). This to me demonstrates that the original concerns were "downgraded". It would of course still be desirable to have guests control the behavior for themselves, but that's a more intrusive change left for the future. Beyond that I guess I need to have Andrew speak for himself.Since Arm64 supposedly also has such a control, put command line option and Kconfig control in common files. [1] https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/data-operand-independent-timing-isa-guidance.html Requested-by: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> --- This may be viewed as a new feature, and hence be too late for 4.18. It may, however, also be viewed as security relevant, which is why I'd like to propose to at least consider it. Slightly RFC, in particular for whether the Kconfig option should default to Y or N.I am not entirely sure. I understand that DIT will help in the cryptographic case but it is not clear to me what is the performance impact.The entire purpose of the bit is to have a performance impact, slowing down execution when fastpaths could be taken, but shouldn't to achieve the named goal.I understood that. My question was more related to how much it will degrade the performance. This will help to know whether the default should be yes or no.Well, as said - I have no information beyond that to be found at the provided URL. I am confused. Above, you suggested it cannot be guaranteed. So I interpreted we don't know what's happening on any processor. So where you referring to... Therefore you're still suggesting to emit a warning on most of Intel's hardware and on all non-Intel one. ... non-Intel HW? That's going too far, imo. We could restrict the warning to non-Intel platform. Jan -- Julien Grall 
 
 
  | 
  
![]()  | 
            
         Lists.xenproject.org is hosted with RackSpace, monitoring our  |