[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <be306052-4f7b-4964-9169-8faa5ee7bb55@suse.com>
Date: Tue, 3 Dec 2024 16:30:09 +0200
From: Nikolay Borisov <nik.borisov@...e.com>
To: Borislav Petkov <bp@...nel.org>, Sean Christopherson <seanjc@...gle.com>,
X86 ML <x86@...nel.org>
Cc: Paolo Bonzini <pbonzini@...hat.com>, Josh Poimboeuf
<jpoimboe@...hat.com>, Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>,
KVM <kvm@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>,
"Borislav Petkov (AMD)" <bp@...en8.de>
Subject: Re: [PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
On 2.12.24 г. 14:04 ч., Borislav Petkov wrote:
> From: "Borislav Petkov (AMD)" <bp@...en8.de>
>
> Hi,
>
> here's the next revision, with hopefully all review feedback addressed.
>
> Changelog:
> v1:
>
> https://lore.kernel.org/r/20241104101543.31885-1-bp@kernel.org
The series is pretty self-explanatory. So:
Reviewed-by: Nikolay Borisov <nik.borisov@...e.com>
>
> Thx.
>
> Borislav Petkov (AMD) (4):
> x86/bugs: Add SRSO_USER_KERNEL_NO support
> KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace
> x86/bugs: KVM: Add support for SRSO_MSR_FIX
> Documentation/kernel-parameters: Fix a typo in kvm.enable_virt_at_load
> text
>
> Documentation/admin-guide/hw-vuln/srso.rst | 10 ++++++++++
> Documentation/admin-guide/kernel-parameters.txt | 2 +-
> arch/x86/include/asm/cpufeatures.h | 2 ++
> arch/x86/include/asm/msr-index.h | 1 +
> arch/x86/kernel/cpu/bugs.c | 16 +++++++++++++++-
> arch/x86/kernel/cpu/common.c | 1 +
> arch/x86/kvm/cpuid.c | 2 +-
> arch/x86/kvm/svm/svm.c | 6 ++++++
> arch/x86/lib/msr.c | 2 ++
> 9 files changed, 39 insertions(+), 3 deletions(-)
>
>
> base-commit: 40384c840ea1944d7c5a392e8975ed088ecf0b37
Powered by blists - more mailing lists