Despite the commandline adding the feature
-cpu kvm64,+ssbd,+md-clear,+pdpe1gb,+pcid
Maybe going down to "kvm64" was too much.
I was looking for a middle ground for a while, but it seems in this combination "T3.13/Q2.0/B4.15" I can only get it either hang or being without the md-clear.
Hmm with that workaround for 4.15 I get the md bug affects in the guest, but not the md-clear feature.
$ uname -r; cat /sys/devices/ system/ cpu/vulnerabili ties/mds; cat /proc/cpuinfo | grep -e ^bug -e ^flags | grep md
4.15.0-50-generic
Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
bugs : cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds
Despite the commandline adding the feature ssbd,+md- clear,+ pdpe1gb, +pcid
-cpu kvm64,+
Maybe going down to "kvm64" was too much.
I was looking for a middle ground for a while, but it seems in this combination "T3.13/Q2.0/B4.15" I can only get it either hang or being without the md-clear.