|
|
Subscribe / Log in / New account

The "special register buffer data sampling" hardware vulnerability

The "special register buffer data sampling" hardware vulnerability

Posted Jun 10, 2020 20:10 UTC (Wed) by pbonzini (subscriber, #60935)
In reply to: The "special register buffer data sampling" hardware vulnerability by mjg59
Parent article: The "special register buffer data sampling" hardware vulnerability

Yes, exactly. You have to add the <feature> XML element inside <cpu>; for example:

<cpu mode='host-model'>
<feature policy='disable' name='rdrand'/>
<feature policy='disable' name='rdseed'/>
</cpu>


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds