I tested qemu 1:8.2.2+ds-0ubuntu1.8 from noble-proposed according to comment #3.
On AMD ROME (fleep): # Host ubuntu@fleep:~$ dpkg -l | grep qemu-system-x86 ii qemu-system-x86 1:8.2.2+ds-0ubuntu1.8 ubuntu@fleep:~$ qemu-system-x86_64 -cpu ? | grep -E 'sbpb|ibpb-brtype' gfni hle ht hypervisor ia64 ibpb ibpb-brtype ibrs ibrs-all ibs intel-pt sbdr-ssdp-no sbpb sep serialize sgx sgx-aex-notify sgx-debug sgx-edeccssa # Guest ubuntu@ubuntu:~$ cpuid -l 0x80000021 -1 -r CPU: 0x80000021 0x00: eax=0x10000044 ebx=0x00000000 ecx=0x00000000 edx=0x00000000 ubuntu@ubuntu:~$ cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow Mitigation: SMT disabled On AMD Milan: Already verified by Markus in comment #10. Thanks! => We see the correct flags on the host, the most-significant bits of "eax" are set and the "spec_rstack_overflow" shows as "Mitigation" ("SMT disabled" on EPYC ROME and "Safe RET" on EPYC Milan). ** Tags removed: verification-needed verification-needed-noble ** Tags added: verification-done verification-done-noble -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2101944 Title: Expose bits related to SRSO vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2101944/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs