[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH SpectreV1+L1TF v7 3/9] spec: add l1tf-barrier
>>> On 21.02.19 at 09:16, <nmanthey@xxxxxxxxx> wrote: > To control the runtime behavior on L1TF vulnerable platforms better, the > command line option l1tf-barrier is introduced. This option controls > whether on vulnerable x86 platforms the lfence instruction is used to > prevent speculative execution from bypassing the evaluation of > conditionals that are protected with the evaluate_nospec macro. > > By now, Xen is capable of identifying L1TF vulnerable hardware. However, > this information cannot be used for alternative patching, as a CPU feature > is required. To control alternative patching with the command line option, > a new x86 feature "X86_FEATURE_SC_L1TF_VULN" is introduced. This feature > is used to patch the lfence instruction into the arch_barrier_nospec_true > function. The feature is enabled only if L1TF vulnerable hardware is > detected and the command line option does not prevent using this feature. > > The status of hyperthreading is considered when automatically enabling > adding the lfence instruction. Since platforms without hyperthreading can > still be vulnerable to L1TF in case the L1 cache is not flushed properly, > the additional lfence instructions are patched in if either hyperthreading > is enabled, or L1 cache flushing is missing. > > This is part of the speculative hardening effort. > > Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> with one remark: > @@ -842,6 +849,12 @@ void __init init_speculation_mitigations(void) > else if ( opt_l1d_flush == -1 ) > opt_l1d_flush = cpu_has_bug_l1tf && !(caps & ARCH_CAPS_SKIP_L1DFL); > > + /* By default, enable L1TF_VULN on L1TF-vulnerable hardware */ > + if ( opt_l1tf_barrier == -1 ) > + opt_l1tf_barrier = cpu_has_bug_l1tf && (opt_smt != 0 || > opt_l1d_flush == 0); We commonly omit "!= 0" and use ! instead of "== 0". If I end up committing this, I may take the liberty of changing these. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |