On 21/06/18 01:20, Brian Woods wrote:
> On Wed, Jun 20, 2018 at 08:34:13AM +0200, Juergen Gross wrote:
>> Brian, would you please give the attached patch a try?
>>
>>
>> Juergen
> Juergen,
>
> It works for Dom0.  You see a lot of messages that are like:
> (XEN) emul-priv-op.c:1166:d0v1 Domain attempted WRMSR c0011020 from 
> 0x0206800000000000 to 0x0206800000000400
> (XEN) emul-priv-op.c:1166:d0v0 Domain attempted WRMSR c0011020 from 
> 0x0206800000000000 to 0x0206800000000400

That is Linux trying to enable the SSBD via the native mechanism (on
Fam17h hardware I'm guessing, give the bit position).

Like many of the other mitigations, a PV guest knows it is virtualised
and shouldn’t be playing with this MSR.

OTOH, Xen should be implementing the AMD SSBD spec and allowing for
virtualised control of SSBD.  Sadly, I was only show the whitepaper with
insufficient time before the SSBD embargo to implement it in XSA-263,
and haven't had time since.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to