x86/spec-ctrl: Mitigate the Special Register Buffer Data Sampling sidechannel
authorAndrew Cooper <andrew.cooper3@citrix.com>
Wed, 8 Jan 2020 19:47:46 +0000 (19:47 +0000)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Tue, 9 Jun 2020 16:46:14 +0000 (17:46 +0100)
commitb8d476a9eaee8877cd5ba2c9eb6dbc5412626d13
tree90d1b0b08bbd967e63a50c929d35b52b5204821c
parent1c751c4146b9e1d8dd9b61ee6a01caa1b07463cc
x86/spec-ctrl: Mitigate the Special Register Buffer Data Sampling sidechannel

See patch documentation and comments.

This is part of XSA-320 / CVE-2020-0543

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
(cherry picked from commit 6a49b9a7920c82015381740905582b666160d955)
docs/misc/xen-command-line.markdown
xen/arch/x86/acpi/power.c
xen/arch/x86/smpboot.c
xen/arch/x86/spec_ctrl.c
xen/include/asm-x86/spec_ctrl.h