On Wed, 2018-01-10 at 22:51 +0000, David Woodhouse wrote:
> In accordance with the Intel and AMD documentation, we need to overwrite
> all entries in the RSB on exiting a guest, to prevent malicious branch
> target predictions from affecting the host kernel. This is needed both
> for retpoline and for IBRS.
> 
> Signed-off-by: David Woodhouse <[email protected]>
> ---
> Untested in this form although it's a variant on what we've had already.
> I have an army of machines willing to do my bidding but nested virt
> is non-trivial and I figure I might as well post it as someone else
> can probably test it in less than the time it takes me to work out how.

Now smoke tested with Intel VT-x, but not yet on AMD. Tom, would you be
able to do that?


> This implements the most pressing of the RSB stuffing documented
> by dhansen (based our discussions) in https://goo.gl/pXbvBE

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to