Daniel P. Berrangé: > On Sat, May 19, 2018 at 12:42:14AM +0000, procmem wrote: >> Hi I'm a privacy distro maintainer investigating the implications of the >> newly published nethammer attack [0] on KVM guests particularly the >> virtio-net drivers. The summary of the paper is that rowhammer can be >> remotely triggered by feeding susceptible* network driver crafted >> traffic. This attack can do all kinds of nasty things such as modifying >> SSL certs on the victim system. >> >> * Susceptible drivers are those relying on Intel CAT, uncached memory or >> the clflush instruction. >> >> My question is, do virtio-net drivers do any of these things? > > This question is probably better directed at either linux net maintainers > list, or the qemu developers list, since that's where the virtio-net > experts will be. > > Regards, > Daniel > OK I will thanks. _______________________________________________ libvirt-users mailing list libvirt-users@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvirt-users