]> www.infradead.org Git - users/jedix/linux-maple.git/commit
amd/kvm: do not intercept new MSRs for spectre v2 mitigation
authorElena Ufimtseva <elena.ufimtseva@oracle.com>
Fri, 27 Apr 2018 23:53:51 +0000 (19:53 -0400)
committerBrian Maly <brian.maly@oracle.com>
Mon, 21 May 2018 21:15:26 +0000 (17:15 -0400)
commitc38335ba6e967c984b79dbacee995fa89d3e8fe9
tree776ca3ec3b2c273c0d7c74f263b2d8b0a0325198
parentc7152bf5f692d390f6c1ffc29c3fb398a0e3e6f5
amd/kvm: do not intercept new MSRs for spectre v2 mitigation

Do not intercept MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD on AMD
for Spectre v2 mitigation.
As IBRS is not used on AMD, attempt to intercept MSR_IA32_SPEC_CTRL
will have guest crash with injected GP fault.
Also change the comment about field 'always' in svm_direct_access_msrs structure
for clarity.

OraBug: 27370258

Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Reviewed-by: HÃ¥kon Bugge <haakon.bugge@oracle.com>
Signed-off-by: Brian Maly <brian.maly@oracle.com>
arch/x86/kvm/svm.c