2018-01-18 18:43 GMT+08:00 Paolo Bonzini <pbonz...@redhat.com>:

> On 18/01/2018 11:38, Li Qiang wrote:
> > Hi Paolo, all,
> >
> > I have a question about the intel microcode update for spectre variant#2.
> > From my understanding, there is no need to update the microcode of VMs
> > because the kvm has expose the SPEC_CTL and PRED_CMD to the guest.
> > Also, if we need to update the micorcode in guest, who is the vendor for
> > this.
>
> The guest has no microcode of it's own, but you need to update the
> microcode in the host.  You also need to update the kernel, QEMU and
> libvirt if you are using it.
>
> > From the hyper-v, I think I'm right.
> > -->https://docs.microsoft.com/en-us/virtualization/hyper-v-
> on-windows/CVE-2017-5715-and-hyper-v-vms
> >
> > But upon I update the centos guest, the host kvm/qemu has been updated.
> > The IBPB_ENABLED and IBRS_ENABLED are both zero if I don't update the
> > microcode in the guest. If I update the guest micorcode, the are both 1.
>
> What do you mean by "update the guest microcode"?  Did you mean host?
>

No, here mean the guest. By overwrite guest's files in
/lib/firmware/intel-ucode/ directory and "echo 1 >
/sys/devices/system/cpu/microcode/reload" as Intel's instruction says.
The host's kvm and qemu has been got updated before this.

Thanks,
Li Qiang


>
> Paolo
>
> >
> > So I want to know, if I should update the microcode in guest.
> > If the answer is Yes, then what about the Windows guest, how to update
> > the microcode?
> >
> >
> > Thanks,
> > Li Qiang
>
>

Reply via email to