summary refs log tree commit diff stats
path: root/hw/core/eif.h
diff options
context:
space:
mode:
authorBabu Moger <babu.moger@amd.com>2024-10-24 17:18:23 -0500
committerPaolo Bonzini <pbonzini@redhat.com>2024-10-31 18:28:32 +0100
commit2ec282b8eaaddf5c136f7566b5f61d80288a2065 (patch)
treea2540c1fcf0f5e5b49da15cbae6781c7a547a20a /hw/core/eif.h
parent209b0ac12074341d0093985eb9ad3e7edb252ce5 (diff)
downloadfocaccia-qemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.tar.gz
focaccia-qemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.zip
target/i386: Expose bits related to SRSO vulnerability
Add following bits related Speculative Return Stack Overflow (SRSO).
Guests can make use of these bits if supported.

These bits are reported via CPUID Fn8000_0021_EAX.
===================================================================
Bit Feature Description
===================================================================
27  SBPB                Indicates support for the Selective Branch Predictor Barrier.
28  IBPB_BRTYPE         MSR_PRED_CMD[IBPB] flushes all branch type predictions.
29  SRSO_NO             Not vulnerable to SRSO.
30  SRSO_USER_KERNEL_NO Not vulnerable to SRSO at the user-kernel boundary.
===================================================================

Link: https://www.amd.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf
Link: https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/programmer-references/57238.zip
Signed-off-by: Babu Moger <babu.moger@amd.com>
Link: https://lore.kernel.org/r/dadbd70c38f4e165418d193918a3747bd715c5f4.1729807947.git.babu.moger@amd.com
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'hw/core/eif.h')
0 files changed, 0 insertions, 0 deletions