Hello,

while playing with an AMD Epyc System and Qemu 3.1.1.1 i was wondering
about the CPU Flags needed for full meltdown / spectre mitigation.

First i added the following patch to Qemu to add STIBP support:
>From 60345b5c0819975b6b4e3a531281aaad724dbcf0 Mon Sep 17 00:00:00 2001
From: Eduardo Habkost <ehabk...@redhat.com>
Date: Mon, 10 Dec 2018 16:02:50 -0200
Subject: [PATCH] i386: Add "stibp" flag name

i'm now starting the VM with:
-cpu
EPYC,+pdpe1gb,+ibpb,+virt-ssbd,+amd-ssbd,+stibp,+kvm_pv_unhalt,+kvm_pv_eoi,enforce,vendor=AuthenticAMD

While inside the VM i correctly see the the stibp flag in /proc/cpuinfo

# grep -H '' /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation:
usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

does show STIBP: disabled.

Is this expected? Is there any hint on how vulnerabilities should look
like for optimal performance.

Greets,
Stefan

Reply via email to