Message ID | 20190930182437.25478-1-andrew.cooper3@citrix.com (mailing list archive) |
---|---|
Headers | show |
Series | xen/nospec: Add Kconfig options for speculative hardening | expand |
On 30.09.19 20:24, Andrew Cooper wrote: > The main purpose is patch 2. The "l1tf-barrier" work currently causes a perf > hit and gains no safety, and is therefore unfit for inclusion into Xen 4.13 at > this time. > > Andrew Cooper (2): > xen/nospec: Introduce CONFIG_SPECULATIVE_ARRAY_HARDEN > xen/nospec: Introduce CONFIG_SPECULATIVE_BRANCH_HARDEN and disable it > > docs/misc/xen-command-line.pandoc | 8 +------- > xen/arch/x86/spec_ctrl.c | 17 ++--------------- > xen/common/Kconfig | 38 ++++++++++++++++++++++++++++++++++++++ > xen/include/asm-x86/cpufeatures.h | 2 +- > xen/include/asm-x86/nospec.h | 4 ++-- > xen/include/asm-x86/spec_ctrl.h | 1 - > xen/include/xen/nospec.h | 12 ++++++++++++ > 7 files changed, 56 insertions(+), 26 deletions(-) > For the series: Release-acked-by: Juergen Gross <jgross@suse.com> Juergen