[Xen-devel] [PATCH for-4.13 0/2] xen/nospec: Add Kconfig options for speculative hardening

Andrew Cooper posted 2 patches 6 years, 1 month ago
Patches applied successfully (tree, apply log)
git fetch https://github.com/patchew-project/xen tags/patchew/20190930182437.25478-1-andrew.cooper3@citrix.com
There is a newer version of this series
docs/misc/xen-command-line.pandoc |  8 +-------
xen/arch/x86/spec_ctrl.c          | 17 ++---------------
xen/common/Kconfig                | 38 ++++++++++++++++++++++++++++++++++++++
xen/include/asm-x86/cpufeatures.h |  2 +-
xen/include/asm-x86/nospec.h      |  4 ++--
xen/include/asm-x86/spec_ctrl.h   |  1 -
xen/include/xen/nospec.h          | 12 ++++++++++++
7 files changed, 56 insertions(+), 26 deletions(-)
[Xen-devel] [PATCH for-4.13 0/2] xen/nospec: Add Kconfig options for speculative hardening
Posted by Andrew Cooper 6 years, 1 month ago
The main purpose is patch 2.  The "l1tf-barrier" work currently causes a perf
hit and gains no safety, and is therefore unfit for inclusion into Xen 4.13 at
this time.

Andrew Cooper (2):
  xen/nospec: Introduce CONFIG_SPECULATIVE_ARRAY_HARDEN
  xen/nospec: Introduce CONFIG_SPECULATIVE_BRANCH_HARDEN and disable it

 docs/misc/xen-command-line.pandoc |  8 +-------
 xen/arch/x86/spec_ctrl.c          | 17 ++---------------
 xen/common/Kconfig                | 38 ++++++++++++++++++++++++++++++++++++++
 xen/include/asm-x86/cpufeatures.h |  2 +-
 xen/include/asm-x86/nospec.h      |  4 ++--
 xen/include/asm-x86/spec_ctrl.h   |  1 -
 xen/include/xen/nospec.h          | 12 ++++++++++++
 7 files changed, 56 insertions(+), 26 deletions(-)

-- 
2.11.0


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
Re: [Xen-devel] [PATCH for-4.13 0/2] xen/nospec: Add Kconfig options for speculative hardening
Posted by Jürgen Groß 6 years, 1 month ago
On 30.09.19 20:24, Andrew Cooper wrote:
> The main purpose is patch 2.  The "l1tf-barrier" work currently causes a perf
> hit and gains no safety, and is therefore unfit for inclusion into Xen 4.13 at
> this time.
> 
> Andrew Cooper (2):
>    xen/nospec: Introduce CONFIG_SPECULATIVE_ARRAY_HARDEN
>    xen/nospec: Introduce CONFIG_SPECULATIVE_BRANCH_HARDEN and disable it
> 
>   docs/misc/xen-command-line.pandoc |  8 +-------
>   xen/arch/x86/spec_ctrl.c          | 17 ++---------------
>   xen/common/Kconfig                | 38 ++++++++++++++++++++++++++++++++++++++
>   xen/include/asm-x86/cpufeatures.h |  2 +-
>   xen/include/asm-x86/nospec.h      |  4 ++--
>   xen/include/asm-x86/spec_ctrl.h   |  1 -
>   xen/include/xen/nospec.h          | 12 ++++++++++++
>   7 files changed, 56 insertions(+), 26 deletions(-)
> 

For the series:

Release-acked-by: Juergen Gross <jgross@suse.com>


Juergen

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel