summaryrefslogtreecommitdiff
path: root/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst
diff options
context:
space:
mode:
authorTakahiro Itazuri <itazur@amazon.com>2023-09-01 09:29:59 +0100
committerJonathan Corbet <corbet@lwn.net>2023-10-10 13:35:55 -0600
commita3c12cf3a69150adb4a8fd199e4c78d4a9e65509 (patch)
tree5afd2b64ecd0f9d72a346e8f4d1c715533476c35 /Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst
parentc9ad95adc096f25004d4192258863806a68a9bc8 (diff)
docs/hw-vuln: Update desc of best effort mode
Moves the description of the best effort mitigation mode to the table of the possible values in the mds and tsx_async_abort docs, and adds the same one to the mmio_stale_data doc. Signed-off-by: Takahiro Itazuri <itazur@amazon.com> Reviewed-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Signed-off-by: Jonathan Corbet <corbet@lwn.net> Link: https://lore.kernel.org/r/20230901082959.28310-1-itazur@amazon.com
Diffstat (limited to 'Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst')
-rw-r--r--Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst13
1 files changed, 12 insertions, 1 deletions
diff --git a/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst b/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst
index c98fd11907cc..1302fd1b55e8 100644
--- a/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst
+++ b/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst
@@ -225,8 +225,19 @@ The possible values in this file are:
* - 'Vulnerable'
- The processor is vulnerable, but no mitigation enabled
* - 'Vulnerable: Clear CPU buffers attempted, no microcode'
- - The processor is vulnerable, but microcode is not updated. The
+ - The processor is vulnerable but microcode is not updated. The
mitigation is enabled on a best effort basis.
+
+ If the processor is vulnerable but the availability of the microcode
+ based mitigation mechanism is not advertised via CPUID, the kernel
+ selects a best effort mitigation mode. This mode invokes the mitigation
+ instructions without a guarantee that they clear the CPU buffers.
+
+ This is done to address virtualization scenarios where the host has the
+ microcode update applied, but the hypervisor is not yet updated to
+ expose the CPUID to the guest. If the host has updated microcode the
+ protection takes effect; otherwise a few CPU cycles are wasted
+ pointlessly.
* - 'Mitigation: Clear CPU buffers'
- The processor is vulnerable and the CPU buffer clearing mitigation is
enabled.