David Gibson <da...@gibson.dropbear.id.au> writes:

> On Tue, Mar 12, 2019 at 10:01:45AM +0000, Peter Maydell wrote:
>> On Tue, 12 Mar 2019 at 03:34, David Gibson <da...@gibson.dropbear.id.au> 
>> wrote:
>> > Ok, done.  As a rule these warnings are there intentionally for TCG -
>> > we want to enable Spectre/Meltdown mitigations by default, but no-one
>> > really knows if and how to implement them for TCG.
>>
>> For the Arm "block speculation" type instructions what we did was
>> say "TCG's execution doesn't speculate in a relevant way, and
>> we treat the TCG backends as not a security boundary anyway,
>> so we'll end the TB and put in a memory barrier and call that
>> sufficient". That is, they're provided for the benefit of
>> emulating guest OSes that use them, rather than because they
>> make a difference from a security perspective.
>>
>> I don't know exactly what the semantics of the PPC mitigations
>> are, but we should probably think about and document a coherent
>> position on this for TCG.
>
> Yes, but this requires input from someone who understands both Spectre
> and TCG well enough, which I am not.

Someone applying for one of the outreach projects mentioned another
attack vector "side-channel leakages in qemu translation from ARM to
x86" to which I replied the same "not a security boundary" response. But
I guess there are some papers being written around this subject.

--
Alex Bennée

Reply via email to