mbox series

[for-4.13,0/2] xen/nospec: Add Kconfig options for speculative hardening

Message ID 20190930182437.25478-1-andrew.cooper3@citrix.com (mailing list archive)
Headers show
Series xen/nospec: Add Kconfig options for speculative hardening | expand

Message

Andrew Cooper Sept. 30, 2019, 6:24 p.m. UTC
The main purpose is patch 2.  The "l1tf-barrier" work currently causes a perf
hit and gains no safety, and is therefore unfit for inclusion into Xen 4.13 at
this time.

Andrew Cooper (2):
  xen/nospec: Introduce CONFIG_SPECULATIVE_ARRAY_HARDEN
  xen/nospec: Introduce CONFIG_SPECULATIVE_BRANCH_HARDEN and disable it

 docs/misc/xen-command-line.pandoc |  8 +-------
 xen/arch/x86/spec_ctrl.c          | 17 ++---------------
 xen/common/Kconfig                | 38 ++++++++++++++++++++++++++++++++++++++
 xen/include/asm-x86/cpufeatures.h |  2 +-
 xen/include/asm-x86/nospec.h      |  4 ++--
 xen/include/asm-x86/spec_ctrl.h   |  1 -
 xen/include/xen/nospec.h          | 12 ++++++++++++
 7 files changed, 56 insertions(+), 26 deletions(-)

Comments

Jürgen Groß Oct. 1, 2019, 6:35 a.m. UTC | #1
On 30.09.19 20:24, Andrew Cooper wrote:
> The main purpose is patch 2.  The "l1tf-barrier" work currently causes a perf
> hit and gains no safety, and is therefore unfit for inclusion into Xen 4.13 at
> this time.
> 
> Andrew Cooper (2):
>    xen/nospec: Introduce CONFIG_SPECULATIVE_ARRAY_HARDEN
>    xen/nospec: Introduce CONFIG_SPECULATIVE_BRANCH_HARDEN and disable it
> 
>   docs/misc/xen-command-line.pandoc |  8 +-------
>   xen/arch/x86/spec_ctrl.c          | 17 ++---------------
>   xen/common/Kconfig                | 38 ++++++++++++++++++++++++++++++++++++++
>   xen/include/asm-x86/cpufeatures.h |  2 +-
>   xen/include/asm-x86/nospec.h      |  4 ++--
>   xen/include/asm-x86/spec_ctrl.h   |  1 -
>   xen/include/xen/nospec.h          | 12 ++++++++++++
>   7 files changed, 56 insertions(+), 26 deletions(-)
> 

For the series:

Release-acked-by: Juergen Gross <jgross@suse.com>


Juergen