[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] Qemu and Spectre_V4 + l1tf + IBRS_FW
From: |
Stefan Priebe - Profihost AG |
Subject: |
[Qemu-devel] Qemu and Spectre_V4 + l1tf + IBRS_FW |
Date: |
Fri, 17 Aug 2018 08:44:38 +0200 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 |
Hello,
i haven't found anything on the web regarding qemu and mentioned variants.
While my host says:
l1tf:Mitigation: PTE Inversion; VMX: SMT vulnerable, L1D conditional
cache flushes
meltdown:Mitigation: PTI
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via
prctl and seccomp
spectre_v1:Mitigation: __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
My guests bootet with pcid and spec-ctrl only say:
l1tf:Mitigation: PTE Inversion
meltdown:Mitigation: PTI
spec_store_bypass:Vulnerable
spectre_v1:Mitigation: __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, IBPB
* What is about spec_store_bypass in Qemu?
* What is about IBRS_FW feature?
* What is about L1TF?
Or are those just irrelevant to Qemu guests? Would be great to have some
informations.
Thanks a lot!
Greets,
Stefan
- [Qemu-devel] Qemu and Spectre_V4 + l1tf + IBRS_FW,
Stefan Priebe - Profihost AG <=