From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= Subject: [PATCH 0/3] i386: speculative store buffer bypass mitigation (CVE-2018-3639) Date: Mon, 21 May 2018 22:54:21 +0100 Message-ID: <20180521215424.13520-1-berrange@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Cc: Eduardo Habkost , kvm@vger.kernel.org, Konrad Rzeszutek Wilk , Marcelo Tosatti , Paolo Bonzini , Richard Henderson To: qemu-devel@nongnu.org Return-path: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+gceq-qemu-devel2=m.gmane.org@nongnu.org Sender: "Qemu-devel" List-Id: kvm.vger.kernel.org This provides the QEMU part of the mitigations for the speculative store buffer bypass vulnerabilities on the x86 platform[1], and is the companion of the kernel patches merged in: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/comm= it/?id=3D3b78ce4a34b761c7fe13520de822984019ff1a8f [1] https://bugs.chromium.org/p/project-zero/issues/detail?id=3D1528 https://access.redhat.com/security/vulnerabilities/ssbd Daniel P. Berrang=C3=A9 (1): i386: define the 'ssbd' CPUID feature bit (CVE-2018-3639) Konrad Rzeszutek Wilk (2): i386: define the AMD 'virt-ssbd' CPUID feature bit (CVE-2018-3639) i386: Define the Virt SSBD MSR and handling of it (CVE-2018-3639) target/i386/cpu.c | 4 ++-- target/i386/cpu.h | 3 +++ target/i386/kvm.c | 16 ++++++++++++++-- target/i386/machine.c | 20 ++++++++++++++++++++ 4 files changed, 39 insertions(+), 4 deletions(-) --=20 2.17.0