Hello Etienne,
On 6/10/20 1:19 PM, Etienne Carriere via TF-A wrote:
Before we discuss the location of this header file, have we considered using the compiler support for speculative execution mitigations instead? I am referring to the __builtin_speculation_safe_value() macro, which I believe achieves the same goal as the code you propose to introduce here, i.e. protecting against Spectre v1 bounds-check bypass attacks.
TF-A already uses this compiler builtin today and provides a wrapper macro around it, see SPECULATION_SAFE_VALUE() in include/lib/utils_def.f (although I would argue this is not the best location one could think of...). For reference, this was introduced by commit [1].
According to Arm's whitepaper [2], the support for this compiler builtin was added in GCC 9 and LLVM/Clang was to follow shortly.
If these versions are too recent for you, then I believe the official location to get equivalent code is [3]. As stated there:
The header file provided here allows a migration path to using the builtin function for users who are unable to immediately upgrade to a compiler which supports the builtin.
So I would prefer we get the code from there rather than from the OP-TEE project, which got it from the Fuschia project ;) This is licensed under the Boost Software License 1.0, which we've never used in TF-A so I would need to check with our legal department whether this is OK, but I don't expect any issues there as this is described as a permissive license only requiring preservation of copyright and license notices.
This is assuming that both header files (the one from OP-TEE and the one from the Arm software Github repo) are equivalent... Is this the case? Is the code provided in OP-TEE perhaps more optimized?
Regards, Sandrine
[1] https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=9edd8...
[2] https://developer.arm.com/support/arm-security-updates/speculative-processor...
On Fri, 12 Jun 2020 at 14:15, Sandrine Bailleux sandrine.bailleux@arm.com wrote:
True. I can get my changes series to use SPECULATION_SAFE_VALUE() instead.
Fair enough. I'll see with ARM-software/speculation-barrier if confine_array_index() helper function is of interest.
Sure, thanks,
The story starts in Fushia implementing x86 and and aarch64. OP-TEE imported the file and made the aarch32 (arm/thumb2) and fixed a Clang issue. Import and maturation took few commits / pull-requests in optee_os.git. Here I thought it would be better to support all 64/32b.
I'll see with ARM-software/speculation-barrier.git about this code.
Thanks for the feedback and suggestions. Regards, Etienne
tf-a@lists.trustedfirmware.org