From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 79B9211713 for ; Fri, 19 Apr 2024 21:46:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713563193; cv=none; b=BEj1lJfG+Aro6IQc6FSnk/E/eMeg7I4g4FDgnu0GcbTfD4StLLXcQ0lDesF5PkvmGJg2LslLkMJkVBFoRTQD0GHnGS60FbbQBOMoM2GdtRWzc6PgIqMbkesjmnijFTVf1DaIpG8eqnArvC9MtAS1JZSSvdbesBzAkQhtHtugEJg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713563193; c=relaxed/simple; bh=JqQId/KDevEZmUaHLf6u8GZsAyLmvNuf3utf6UEm3vE=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=cj8uos54GlFceVnJoKpvv8P8X0MQzxmYm/iO+VzC/nCm3uh/HTmQR+nSoNDUeuQHVJ80DiIyAQhVVd3UXBzLtLnAoheSsdS0I0+GIbqK4MsbNEv87DGTLkMcOw5nkvYapqoIOdsltLL2k/0T12DGu+LNG4tigeMq8yzfPR24e1I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=MsKSuY39; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="MsKSuY39" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5C530C072AA; Fri, 19 Apr 2024 21:46:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1713563193; bh=JqQId/KDevEZmUaHLf6u8GZsAyLmvNuf3utf6UEm3vE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=MsKSuY399KMnUoP/0LFX2AhIpDvFT2CjQWGREu3HqNmwnzRj+pd4ManuQrq8+Ly5m XZqg2YQVOCOdEqHqGv5LZDQuQjTB/vRzmhw5QJzoYhs/tjIiMawyaP7ybriWYafi+W TdlXeDlhjjlfxmhDsNcXzC4sKybBZzhP4VfXs0mD8o5Wg2Rc7UrWQtTOsDW62nMF3B G8qa3lBEoE5SDROuLMBF9uB/NZtBQueUbptKPMcz5ywwOsSJndUzxPqlVxXnV9UBjd N8TNwd0W9GBWDOX4V0yyfA2WgiNFYSuz62U8UJJwz+w3+Ae5Frvam1IgWxg74GJq+Y N2fYBF95DfJ5w== Date: Fri, 19 Apr 2024 14:46:30 -0700 From: Josh Poimboeuf To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Linus Torvalds , Daniel Sneddon , Pawan Gupta , Thomas Gleixner , Alexandre Chartre , Konrad Rzeszutek Wilk , Peter Zijlstra , Greg Kroah-Hartman , Sean Christopherson , Andrew Cooper , Dave Hansen , Nikolay Borisov , KP Singh , Waiman Long , Borislav Petkov , Ingo Molnar , Maksim Davydov Subject: Re: [PATCH v4 5/5] x86/bugs: Add 'spectre_bhi=vmexit' cmdline option Message-ID: <20240419214630.owsieyiyj5p432cy@treble> References: <72d86c6da24138f39ca6fc9459b1d037301c1427.1713559768.git.jpoimboe@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <72d86c6da24138f39ca6fc9459b1d037301c1427.1713559768.git.jpoimboe@kernel.org> On Fri, Apr 19, 2024 at 02:09:51PM -0700, Josh Poimboeuf wrote: > In cloud environments it can be useful to *only* enable the vmexit > mitigation and leave syscalls vulnerable. Add that as an option. > > This is similar to the old spectre_v2=auto option which was removed with As Daniel pointed out this should be /v2/bhi/ -- Josh