https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=235010
--- Comment #2 from Conrad Meyer <[email protected]> --- This seems to be a good summary: https://lkml.org/lkml/2019/1/9/448 We might be passing through CPUID bits that we should not be to the guest, at least not without adding that MSR to our emulation list. I'm not sure how we handle spectre/meltdown representations to guests on Intel. I don't think guests should be able to set these MSRs and they probably shouldn't do software mitigation -- it's up to the host to correct mitigate. So maybe we should set whatever bit claims immunity to spectre/meltdown in guest cpuid. -- You are receiving this mail because: You are the assignee for the bug. _______________________________________________ [email protected] mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-virtualization To unsubscribe, send any mail to "[email protected]"
