Code:
+=============== ============== ============ ============= ============== ============
+Vulnerability User-to-Kernel User-to-User Guest-to-Host Guest-to-Guest Cross-Thread
+=============== ============== ============ ============= ============== ============
+BHI X X
+GDS X X X X
+L1TF X (Note 1)
+MDS X X X X (Note 1)
+MMIO X X X X (Note 1)
+Meltdown X
+Retbleed X X (Note 2)
+RFDS X X X X
+Spectre_v1 X
+Spectre_v2 X X
+Spectre_v2_user X X
+SRBDS X X X X
+SRSO X X
+SSB (Note 3)
+TAA X X X X (Note 1)
+=============== ============== ============ ============= ============== ============
+
+Notes:
+ 1 -- Disables SMT if cross-thread mitigations are selected and CPU is vulnerable
+
+ 2 -- Disables SMT if cross-thread mitigations are selected, CPU is vulnerable,
+ and STIBP is not supported
+
+ 3 -- Speculative store bypass is always enabled by default (no kernel
+ mitigation applied) unless overridden with spec_store_bypass_disable option
Image:
Markdown Table:
Vulnerability | User-to-Kernel | User-to-User | Guest-to-Host | Guest-to-Guest | Cross-Thread |
---|---|---|---|---|---|
BHI | |||||
GDS | |||||
L1TF | [1] | ||||
MDS | [1:1] | ||||
MMIO | [1:2] | ||||
Meltdown | |||||
Retbleed | [2] | ||||
RFDS | |||||
Spectre_v1 | |||||
Spectre_v2 | |||||
Spectre_v2_user | |||||
SRBDS | |||||
SRSO | |||||
SSB[3] | |||||
TAA | [1:3] |
Disables SMT if cross-thread mitigations are selected and CPU is vulnerable ↩︎ ↩︎ ↩︎ ↩︎
Disables SMT if cross-thread mitigations are selected, CPU is vulnerable, and STIBP is not supported ↩︎
Speculative store bypass is always enabled by default (no kernel mitigation applied) unless overridden with
spec_store_bypass_disable
option ↩︎