x86/AMD: Mitigations for GPZ SP4 - Speculative Store Bypass
authorAndrew Cooper <andrew.cooper3@citrix.com>
Thu, 26 Apr 2018 09:56:28 +0000 (10:56 +0100)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Mon, 21 May 2018 13:20:06 +0000 (14:20 +0100)
commit8c0e338086f060eba31d37b83fbdb883928aa085
treea790857b5a1d6bae27f9e0c6cde528c9a10790e8
parentf097a3a84221b0ad2848a1368ac9932180739642
x86/AMD: Mitigations for GPZ SP4 - Speculative Store Bypass

AMD processors will execute loads and stores with the same base register in
program order, which is typically how a compiler emits code.

Therefore, by default no mitigating actions are taken, despite there being
corner cases which are vulnerable to the issue.

For performance testing, or for users with particularly sensitive workloads,
the `spec-ctrl=ssbd` command line option is available to force Xen to disable
Memory Disambiguation on applicable hardware.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
docs/misc/xen-command-line.markdown
xen/arch/x86/cpu/amd.c
xen/arch/x86/spec_ctrl.c
xen/include/asm-x86/spec_ctrl.h