[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/intel: Expose MSR_ARCH_CAPS to dom0



On 27.08.2020 21:37, Andrew Cooper wrote:
> The overhead of (the lack of) MDS_NO alone has been measured at 30% on some
> workloads.  While we're not in a position yet to offer MSR_ARCH_CAPS generally
> to guests, dom0 doesn't migrate, so we can pass a subset of hardware values
> straight through.
> 
> This will cause PVH dom0's not to use KPTI by default, and all dom0's not to
> use VERW flushing by default,

To avoid VERW, shouldn't you also expose SKIP_L1DFL?

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.