From mboxrd@z Thu Jan 1 00:00:00 1970 From: Eduardo Habkost Subject: Re: [PATCH 0/3] i386: speculative store buffer bypass mitigation (CVE-2018-3639) Date: Mon, 21 May 2018 18:59:50 -0300 Message-ID: <20180521215949.GW25013@localhost.localdomain> References: <20180521215424.13520-1-berrange@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable Cc: kvm@vger.kernel.org, Konrad Rzeszutek Wilk , Marcelo Tosatti , qemu-devel@nongnu.org, Paolo Bonzini , Richard Henderson To: Daniel =?iso-8859-1?Q?P=2E_Berrang=E9?= Return-path: Content-Disposition: inline In-Reply-To: <20180521215424.13520-1-berrange@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+gceq-qemu-devel2=m.gmane.org@nongnu.org Sender: "Qemu-devel" List-Id: kvm.vger.kernel.org On Mon, May 21, 2018 at 10:54:21PM +0100, Daniel P. Berrang=E9 wrote: > This provides the QEMU part of the mitigations for the speculative > store buffer bypass vulnerabilities on the x86 platform[1], and is > the companion of the kernel patches merged in: >=20 > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/co= mmit/?id=3D3b78ce4a34b761c7fe13520de822984019ff1a8f >=20 > [1] https://bugs.chromium.org/p/project-zero/issues/detail?id=3D1528 > https://access.redhat.com/security/vulnerabilities/ssbd Queued, but reordered patch 2 and patch 3 so the flag can't be enabled without the corresponding MSR migration code being available. --=20 Eduardo