aboutsummaryrefslogtreecommitdiff
path: root/os-win32.c
diff options
context:
space:
mode:
authorKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>2018-06-01 11:38:08 -0400
committerEduardo Habkost <ehabkost@redhat.com>2018-06-22 15:01:15 -0300
commita764f3f7197f4d7ad8fe8424269933de912224cb (patch)
tree1938fed38cbd4b47b2bb69c2b7f211c0641f5dc5 /os-win32.c
parent9ccb9784b57804f5c74434ad6ccb66650a015ffc (diff)
downloadqemu-a764f3f7197f4d7ad8fe8424269933de912224cb.zip
qemu-a764f3f7197f4d7ad8fe8424269933de912224cb.tar.gz
qemu-a764f3f7197f4d7ad8fe8424269933de912224cb.tar.bz2
i386: define the AMD 'amd-ssbd' CPUID feature bit
AMD future CPUs expose _two_ ways to utilize the Intel equivalant of the Speculative Store Bypass Disable. The first is via the virtualized VIRT_SPEC CTRL MSR (0xC001_011f) and the second is via the SPEC_CTRL MSR (0x48). The document titled: 124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf gives priority of SPEC CTRL MSR over the VIRT SPEC CTRL MSR. A copy of this document is available at https://bugzilla.kernel.org/show_bug.cgi?id=199889 Anyhow, this means that on future AMD CPUs there will be _two_ ways to deal with SSBD. Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> Message-Id: <20180601153809.15259-2-konrad.wilk@oracle.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Diffstat (limited to 'os-win32.c')
0 files changed, 0 insertions, 0 deletions