diff options
| author | Babu Moger <babu.moger@amd.com> | 2024-10-24 17:18:23 -0500 |
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-10-31 18:28:32 +0100 |
| commit | 2ec282b8eaaddf5c136f7566b5f61d80288a2065 (patch) | |
| tree | a2540c1fcf0f5e5b49da15cbae6781c7a547a20a /hw/core/eif.h | |
| parent | 209b0ac12074341d0093985eb9ad3e7edb252ce5 (diff) | |
| download | focaccia-qemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.tar.gz focaccia-qemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.zip | |
target/i386: Expose bits related to SRSO vulnerability
Add following bits related Speculative Return Stack Overflow (SRSO). Guests can make use of these bits if supported. These bits are reported via CPUID Fn8000_0021_EAX. =================================================================== Bit Feature Description =================================================================== 27 SBPB Indicates support for the Selective Branch Predictor Barrier. 28 IBPB_BRTYPE MSR_PRED_CMD[IBPB] flushes all branch type predictions. 29 SRSO_NO Not vulnerable to SRSO. 30 SRSO_USER_KERNEL_NO Not vulnerable to SRSO at the user-kernel boundary. =================================================================== Link: https://www.amd.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf Link: https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/programmer-references/57238.zip Signed-off-by: Babu Moger <babu.moger@amd.com> Link: https://lore.kernel.org/r/dadbd70c38f4e165418d193918a3747bd715c5f4.1729807947.git.babu.moger@amd.com Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'hw/core/eif.h')
0 files changed, 0 insertions, 0 deletions