提交 21ee4787 编写于 作者: D Daniel P. Berrangé 提交者: Eduardo Habkost

docs: add note about stibp CPU feature for spectre v2

While the stibp CPU feature is not commonly used by guest OS for spectre
mitigation due to its performance impact, it is none the less best
practice to expose it to all guest OS. This allows the guest OS to
decide whether to make use or it.
Signed-off-by: NDaniel P. Berrangé <berrange@redhat.com>
Message-Id: <20190307121838.6345-3-berrange@redhat.com>
Signed-off-by: NEduardo Habkost <ehabkost@redhat.com>
上级 174a78a8
...@@ -168,6 +168,17 @@ Requires the host CPU microcode to support this feature before it ...@@ -168,6 +168,17 @@ Requires the host CPU microcode to support this feature before it
can be used for guest CPUs. can be used for guest CPUs.
@item @code{stibp}
Required to enable stronger Spectre v2 (CVE-2017-5715) fixes in some
operating systems.
Must be explicitly turned on for all Intel CPU models.
Requires the host CPU microcode to support this feature before it
can be used for guest CPUs.
@item @code{ssbd} @item @code{ssbd}
Required to enable the CVE-2018-3639 fix Required to enable the CVE-2018-3639 fix
...@@ -258,6 +269,17 @@ Requires the host CPU microcode to support this feature before it ...@@ -258,6 +269,17 @@ Requires the host CPU microcode to support this feature before it
can be used for guest CPUs. can be used for guest CPUs.
@item @code{stibp}
Required to enable stronger Spectre v2 (CVE-2017-5715) fixes in some
operating systems.
Must be explicitly turned on for all AMD CPU models.
Requires the host CPU microcode to support this feature before it
can be used for guest CPUs.
@item @code{virt-ssbd} @item @code{virt-ssbd}
Required to enable the CVE-2018-3639 fix Required to enable the CVE-2018-3639 fix
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册