[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241202120416.6054-1-bp@kernel.org>
Date: Mon, 2 Dec 2024 13:04:12 +0100
From: Borislav Petkov <bp@...nel.org>
To: Sean Christopherson <seanjc@...gle.com>,
X86 ML <x86@...nel.org>
Cc: Paolo Bonzini <pbonzini@...hat.com>,
Josh Poimboeuf <jpoimboe@...hat.com>,
Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>,
KVM <kvm@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
"Borislav Petkov (AMD)" <bp@...en8.de>
Subject: [PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
From: "Borislav Petkov (AMD)" <bp@...en8.de>
Hi,
here's the next revision, with hopefully all review feedback addressed.
Changelog:
v1:
https://lore.kernel.org/r/20241104101543.31885-1-bp@kernel.org
Thx.
Borislav Petkov (AMD) (4):
x86/bugs: Add SRSO_USER_KERNEL_NO support
KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace
x86/bugs: KVM: Add support for SRSO_MSR_FIX
Documentation/kernel-parameters: Fix a typo in kvm.enable_virt_at_load
text
Documentation/admin-guide/hw-vuln/srso.rst | 10 ++++++++++
Documentation/admin-guide/kernel-parameters.txt | 2 +-
arch/x86/include/asm/cpufeatures.h | 2 ++
arch/x86/include/asm/msr-index.h | 1 +
arch/x86/kernel/cpu/bugs.c | 16 +++++++++++++++-
arch/x86/kernel/cpu/common.c | 1 +
arch/x86/kvm/cpuid.c | 2 +-
arch/x86/kvm/svm/svm.c | 6 ++++++
arch/x86/lib/msr.c | 2 ++
9 files changed, 39 insertions(+), 3 deletions(-)
base-commit: 40384c840ea1944d7c5a392e8975ed088ecf0b37
--
2.43.0
Powered by blists - more mailing lists