I tested qemu 1:8.2.2+ds-0ubuntu1.8 from noble-proposed according to
comment #3.

On AMD ROME (fleep):

# Host
ubuntu@fleep:~$ dpkg -l | grep qemu-system-x86
ii  qemu-system-x86                      1:8.2.2+ds-0ubuntu1.8
ubuntu@fleep:~$ qemu-system-x86_64 -cpu ? | grep -E 'sbpb|ibpb-brtype'
  gfni hle ht hypervisor ia64 ibpb ibpb-brtype ibrs ibrs-all ibs intel-pt
  sbdr-ssdp-no sbpb sep serialize sgx sgx-aex-notify sgx-debug sgx-edeccssa

# Guest
ubuntu@ubuntu:~$ cpuid -l 0x80000021 -1 -r
CPU:
   0x80000021 0x00: eax=0x10000044 ebx=0x00000000 ecx=0x00000000 edx=0x00000000
ubuntu@ubuntu:~$ cat 
/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
Mitigation: SMT disabled

On AMD Milan: Already verified by Markus in comment #10. Thanks!

=> We see the correct flags on the host, the most-significant bits of
"eax" are set and the "spec_rstack_overflow" shows as "Mitigation" ("SMT
disabled" on EPYC ROME and "Safe RET" on EPYC Milan).

** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2101944

Title:
  Expose bits related to SRSO vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2101944/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to