From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from aserp2130.oracle.com ([141.146.126.79]) by Galois.linutronix.de with esmtps (TLS1.2:RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fJ7k2-000718-Qa for speck@linutronix.de; Thu, 17 May 2018 03:30:04 +0200 Received: from pps.filterd (aserp2130.oracle.com [127.0.0.1]) by aserp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w4H1PbDJ015023 for ; Thu, 17 May 2018 01:29:55 GMT Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp2130.oracle.com with ESMTP id 2hxpvcwukx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 17 May 2018 01:29:55 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w4H1TtZ2030352 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 17 May 2018 01:29:55 GMT Received: from abhmp0017.oracle.com (abhmp0017.oracle.com [141.146.116.23]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w4H1TsBp008157 for ; Thu, 17 May 2018 01:29:54 GMT Date: Wed, 16 May 2018 21:29:53 -0400 From: Konrad Rzeszutek Wilk Subject: [MODERATED] Re: [patch 07/15] SSB updates V17 7 Message-ID: <20180517012953.GF10272@char.us.oracle.com> References: <20180516135132.687640705@linutronix.de> <20180516135209.895185914@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20180516135209.895185914@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Wed, May 16, 2018 at 03:51:39PM +0200, speck for Thomas Gleixner wrote: > Subject: [patch 07/15] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL > From: Thomas Gleixner > > AMD is proposing a VIRT_SPEC_CTRL MSR to handle the Speculative Store > Bypass Disable via MSR_AMD64_LS_CFG so that guests do not have to care > about the bit position of the SSBD bit and thus facilitate migration. > Also, the sibling coordination on Family 17H CPUs can only be done on > the host. > > Extend x86_spec_ctrl_set_guest() and x86_spec_ctrl_restore_host() with an > extra argument for the VIRT_SPEC_CTRL MSR. > > Hand in 0 from VMX and in SVM add a new virt_spec_ctrl member to the CPU > data structure which is going to be used in later patches for the actual > implementation. > > Signed-off-by: Thomas Gleixner Reviewed-by: Borislav Petkov Reviewed-by: Konrad Rzeszutek Wilk Thank you!