[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen stable-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations
commit 1ecb0d46d3cdc9c0fc986c9f4ef9dfe8d5ef0489 Author: Jan Beulich <JBeulich@xxxxxxxx> AuthorDate: Mon Aug 13 05:07:23 2018 -0600 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Tue Aug 14 17:39:57 2018 +0100 x86: Make "spec-ctrl=no" a global disable of all mitigations In order to have a simple and easy to remember means to suppress all the more or less recent workarounds for hardware vulnerabilities, force settings not controlled by "spec-ctrl=" also to their original defaults, unless they've been forced to specific values already by earlier command line options. This is part of XSA-273. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (cherry picked from commit d8800a82c3840b06b17672eddee4878bbfdacc6d) --- docs/misc/xen-command-line.markdown | 13 +++++++++---- xen/arch/x86/spec_ctrl.c | 9 +++++++++ 2 files changed, 18 insertions(+), 4 deletions(-) diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index ff80b2c85a..449576769a 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -1479,10 +1479,15 @@ extreme care.** An overall boolean value, `spec-ctrl=no`, can be specified to turn off all mitigations, including pieces of infrastructure used to virtualise certain -mitigation features for guests. Alternatively, a slightly more restricted -`spec-ctrl=no-xen` can be used to turn off all of Xen's mitigations, while -leaving the virtualisation support in place for guests to use. Use of a -positive boolean value for either of these options is invalid. +mitigation features for guests. This also includes settings which `xpti`, +`smt`, `pv-l1tf` control, unless the respective option(s) have been +specified earlier on the command line. + +Alternatively, a slightly more restricted `spec-ctrl=no-xen` can be used to +turn off all of Xen's mitigations, while leaving the virtualisation support +in place for guests to use. + +Use of a positive boolean value for either of these options is invalid. The booleans `pv=`, `hvm=`, `msr-sc=` and `rsb=` offer fine grained control over the alternative blocks used by Xen. These impact Xen's ability to diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c index 2040776e85..c3f04a2137 100644 --- a/xen/arch/x86/spec_ctrl.c +++ b/xen/arch/x86/spec_ctrl.c @@ -116,6 +116,15 @@ static int __init parse_spec_ctrl(char *s) opt_eager_fpu = 0; + if ( opt_xpti < 0 ) + opt_xpti = 0; + + if ( opt_smt < 0 ) + opt_smt = 1; + + if ( opt_pv_l1tf < 0 ) + opt_pv_l1tf = 0; + disable_common: opt_rsb_pv = 0; opt_rsb_hvm = 0; -- generated by git-patchbot for /home/xen/git/xen.git#stable-4.6 _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |