Tested with kernel 6.8.0-60-generic and a Milan host system and EPYC-
Milan-v2 instance type:

host # cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Mitigation: Safe RET

With qemu=1:8.2.2+ds-0ubuntu1.7:

guest # cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Vulnerable: Safe RET, no microcode

guest # cpuid -l 0x80000021 -1 -r
CPU:
   0x80000021 0x00: eax=0x00000045 ebx=0x00000000 ecx=0x00000000 edx=0x00000000

With 1:8.2.2+ds-0ubuntu1.8 and sbpb=on,ibpb-brtype=on:

guest # cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Mitigation: Safe RET

guest # cpuid -l 0x80000021 -1 -r
CPU:
   0x80000021 0x00: eax=0x18000045 ebx=0x00000000 ecx=0x00000000 edx=0x00000000

So the values are correctly synthesized.

The only problem I encountered was the dependency on ceph/librbd1 from
proposed (19.2.1-0ubuntu0.24.04.1). This is a bit unfortunate, because
it means this SRU cannot be tested independently of the ceph upgrade.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2101944

Title:
  Expose bits related to SRSO vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2101944/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to