Blame SOURCES/virt-manager-domcapabilities-detect-MDS-new-vulnerability.patch

3d61c0
From d8ce37f73ec77e5365cfa132ac78b470c1410222 Mon Sep 17 00:00:00 2001
3d61c0
Message-Id: <d8ce37f73ec77e5365cfa132ac78b470c1410222@dist-git>
3d61c0
From: Pavel Hrdina <phrdina@redhat.com>
3d61c0
Date: Tue, 14 May 2019 19:59:49 +0200
3d61c0
Subject: [PATCH] domcapabilities: detect MDS new vulnerability
3d61c0
MIME-Version: 1.0
3d61c0
Content-Type: text/plain; charset=UTF-8
3d61c0
Content-Transfer-Encoding: 8bit
3d61c0
3d61c0
There is a new security feature 'md-clear' that mitigates recent CPU
3d61c0
Microarchitectural Store Buffer Data vulnerability.
3d61c0
3d61c0
Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
3d61c0
(cherry picked from commit c11d6ba4d7024eaac83b6e2d6ae88172f4c01e98)
3d61c0
3d61c0
Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1582667
3d61c0
3d61c0
Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
3d61c0
Acked-by: Daniel P. Berrangé <berrange@redhat.com>
3d61c0
---
3d61c0
 man/virt-install.pod        | 13 +++++++------
3d61c0
 virtinst/domcapabilities.py |  3 ++-
3d61c0
 2 files changed, 9 insertions(+), 7 deletions(-)
3d61c0
3d61c0
diff --git a/man/virt-install.pod b/man/virt-install.pod
3d61c0
index d90c2b8e..3bcb32f2 100644
3d61c0
--- a/man/virt-install.pod
3d61c0
+++ b/man/virt-install.pod
3d61c0
@@ -219,12 +219,13 @@ and 'disable=feature' respectively.
3d61c0
 
3d61c0
 If exact CPU model is specified virt-install will automatically copy CPU
3d61c0
 features available on the host to mitigate recent CPU speculative execution
3d61c0
-side channel security vulnerabilities. This however will have some impact
3d61c0
-on performance and will break migration to hosts without security patches.
3d61c0
-In order to control this behavior there is a B<secure> parameter. Possible
3d61c0
-values are I<on> and I<off>, with I<on> as the default. It is highly
3d61c0
-recommended to leave this enabled and ensure all virtualization hosts have
3d61c0
-fully up to date microcode, kernel & virtualization software installed.
3d61c0
+side channel and Microarchitectural Store Buffer Data security vulnerabilities.
3d61c0
+This however will have some impact on performance and will break migration
3d61c0
+to hosts without security patches. In order to control this behavior there
3d61c0
+is a B<secure> parameter. Possible values are I<on> and I<off>, with I<on>
3d61c0
+as the default. It is highly recommended to leave this enabled and ensure all
3d61c0
+virtualization hosts have fully up to date microcode, kernel & virtualization
3d61c0
+software installed.
3d61c0
 
3d61c0
 Some examples:
3d61c0
 
3d61c0
diff --git a/virtinst/domcapabilities.py b/virtinst/domcapabilities.py
3d61c0
index ba774532..5695453f 100644
3d61c0
--- a/virtinst/domcapabilities.py
3d61c0
+++ b/virtinst/domcapabilities.py
3d61c0
@@ -245,7 +245,8 @@ class DomainCapabilities(XMLBuilder):
3d61c0
                 'spec-ctrl',
3d61c0
                 'ssbd',
3d61c0
                 'ibpb',
3d61c0
-                'virt-ssbd']
3d61c0
+                'virt-ssbd',
3d61c0
+                'md-clear']
3d61c0
 
3d61c0
         if self._features:
3d61c0
             return self._features
3d61c0
-- 
3d61c0
2.21.0
3d61c0