From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 05 Mar 2019 16:40:50 -0000 Received: from mga02.intel.com ([134.134.136.20]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1h1D7Y-0002jK-4t for speck@linutronix.de; Tue, 05 Mar 2019 17:40:49 +0100 Date: Tue, 5 Mar 2019 08:40:44 -0800 From: mark gross Subject: [MODERATED] Re: [patch V6 12/14] MDS basics 12 Message-ID: <20190305164044.GA466@mgross-MOBL.amr.corp.intel.com> Reply-To: mgross@linux.intel.com References: <20190301214738.281554861@linutronix.de> <20190301214848.253554490@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20190301214848.253554490@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Fri, Mar 01, 2019 at 10:47:50PM +0100, speck for Thomas Gleixner wrote: > Subject: [patch V6 12/14] x86/speculation/mds: Add mitigation mode VMWERV > From: Thomas Gleixner > > In virtualized environments it can happen that the host has the microcode > update which utilizes the VERW instruction to clear CPU buffers, but the > hypervisor is not yet updated to expose the X86_FEATURE_MD_CLEAR CPUID bit > to guests. > > Introduce an internal mitigation mode VWWERV which enables the invocation minor type-oh. s/VWWERV/VMWERV/ --mark