[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v9 05/11] x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL, PRED_CMD}



On 19/01/18 10:52, Jan Beulich wrote:
>>>> On 18.01.18 at 16:46, <andrew.cooper3@xxxxxxxxxx> wrote:
>> @@ -292,6 +301,16 @@ static int update_domain_cpuid_info(struct domain *d,
>>              d->arch.pv_domain.cpuidmasks->e1cd = mask;
>>          }
>>          break;
>> +
>> +    case 0x80000008:
>> +        /*
>> +         * If the IBRB policy has changed, we need to recalculate the MSR
> "IBPB" I think? Other than that
> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

Indeed.  Sorry.  (I'm going to grep across the codebase for any other
mistakes before committing, because I doubt this is the only example).

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.