[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAATStaPWxLvCsY77tgTsHj0Jp8+6WZ52Rm+t+=ie=uio50EgBg@mail.gmail.com>
Date: Wed, 20 Jan 2021 23:44:03 +1100
From: "Anand K. Mistry" <amistry@...gle.com>
To: Josh Poimboeuf <jpoimboe@...hat.com>
Cc: x86@...nel.org, Anthony Steinhauser <asteinhauser@...gle.com>,
tglx@...utronix.de, Borislav Petkov <bp@...en8.de>,
Joel Fernandes <joelaf@...gle.com>,
Alexandre Chartre <alexandre.chartre@...cle.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Andy Lutomirski <luto@...nel.org>,
Dave Hansen <dave.hansen@...ux.intel.com>,
"H. Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...hat.com>,
Julien Thierry <jthierry@...hat.com>,
Maciej Fijalkowski <maciej.fijalkowski@...el.com>,
Mark Gross <mgross@...ux.intel.com>,
Mike Rapoport <rppt@...nel.org>,
Paolo Bonzini <pbonzini@...hat.com>,
Peter Zijlstra <peterz@...radead.org>,
Tony Luck <tony.luck@...el.com>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [RFC PATCH] x86/speculation: Add finer control for when to issue IBPB
> > This proposal attempts to reduce that cost by letting the system
> > developer choose whether to issue the IBPB on entry or exit of an IB
> > speculation disabled process (default is both, which is current
> > behaviour). Documentation/admin-guide/hw-vuln/spectre.rst documents two
> > mitigation strategies that use conditional IBPB;
> > "Protect sensitive programs", and "Sandbox untrusted programs".
>
> Why make the setting system-wide? Shouldn't this decision be made on a
> per-task basis, depending on whether the task is sensitive or untrusted?
It definitely could be. I didn't give it as much thought since for me,
the entire system uses a "sandbox" approach, so the behaviour would
apply to any IB spec disabled process. And conversely, any system
taking the "sensitive programs" approach would also expect the same
behaviour from all processes.
I'm open to making it per-process. It's just that making it
system-wide seemed to "fit" with the documented mitigation strategies,
and it's what I would use in production.
Powered by blists - more mailing lists