[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241116121053.GBZziLzfKuQ7lyTrdX@fat_crate.local>
Date: Sat, 16 Nov 2024 13:10:53 +0100
From: Borislav Petkov <bp@...en8.de>
To: Maksim Davydov <davydov-max@...dex-team.ru>
Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org, babu.moger@....com,
x86@...nel.org, seanjc@...gle.com, sandipan.das@....com,
mingo@...hat.com, tglx@...utronix.de, dave.hansen@...ux.intel.com,
hpa@...or.com, pbonzini@...hat.com
Subject: Re: [PATCH 0/2] x86: KVM: Add missing AMD features
On Sat, Nov 16, 2024 at 03:02:47PM +0300, Maksim Davydov wrote:
> Yes, BTC_NO and AMD_IBPB_RET are used by guests while choosing mitigations.
How?
Basically what the current code does to do retbleed or IBPB on entry? Where
latter means the HV allows writes to MSR_IA32_PRED_CMD...?
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Powered by blists - more mailing lists