target/i386: Add TSA attack variants TSA-SQ and TSA-L1
Transient Scheduler Attacks (TSA) are new speculative side channel attacks related to the execution timing of instructions under specific microarchitectural conditions. In some cases, an attacker may be able to use this timing information to infer data from other contexts, resulting in information leakage. AMD has identified two sub-variants two variants of TSA. CPUID Fn8000_0021 ECX[1] (TSA_SQ_NO). If this bit is 1, the CPU is not vulnerable to TSA-SQ. CPUID Fn8000_0021 ECX[2] (TSA_L1_NO). If this bit is 1, the CPU is not vulnerable to TSA-L1. Add the new feature word FEAT_8000_0021_ECX and corresponding bits to detect TSA variants. Link: https://www.amd.com/content/dam/amd/en/documents/resources/bulletin/technical-guidance-for-mitigating-transient-scheduler-attacks.pdf Co-developed-by: Borislav Petkov (AMD) <bp@alien8.de> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Signed-off-by: Babu Moger <babu.moger@amd.com> Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com> Reviewed-by: Zhao Liu <zhao1.liu@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Link: https://lore.kernel.org/r/12881b2c03fa351316057ddc5f39c011074b4549.1752176771.git.babu.moger@amd.com Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
414ac7e057
commit
c79a35acad
2 changed files with 23 additions and 0 deletions
|
|
@ -1415,6 +1415,22 @@ FeatureWordInfo feature_word_info[FEATURE_WORDS] = {
|
|||
.tcg_features = 0,
|
||||
.unmigratable_flags = 0,
|
||||
},
|
||||
[FEAT_8000_0021_ECX] = {
|
||||
.type = CPUID_FEATURE_WORD,
|
||||
.feat_names = {
|
||||
NULL, "tsa-sq-no", "tsa-l1-no", NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
NULL, NULL, NULL, NULL,
|
||||
},
|
||||
.cpuid = { .eax = 0x80000021, .reg = R_ECX, },
|
||||
.tcg_features = 0,
|
||||
.unmigratable_flags = 0,
|
||||
},
|
||||
[FEAT_8000_0022_EAX] = {
|
||||
.type = CPUID_FEATURE_WORD,
|
||||
.feat_names = {
|
||||
|
|
@ -8526,6 +8542,7 @@ void cpu_x86_cpuid(CPUX86State *env, uint32_t index, uint32_t count,
|
|||
*eax = *ebx = *ecx = *edx = 0;
|
||||
*eax = env->features[FEAT_8000_0021_EAX];
|
||||
*ebx = env->features[FEAT_8000_0021_EBX];
|
||||
*ecx = env->features[FEAT_8000_0021_ECX];
|
||||
break;
|
||||
case 0x80000022:
|
||||
*eax = *ebx = *ecx = *edx = 0;
|
||||
|
|
|
|||
|
|
@ -643,6 +643,7 @@ typedef enum FeatureWord {
|
|||
FEAT_8000_0008_EBX, /* CPUID[8000_0008].EBX */
|
||||
FEAT_8000_0021_EAX, /* CPUID[8000_0021].EAX */
|
||||
FEAT_8000_0021_EBX, /* CPUID[8000_0021].EBX */
|
||||
FEAT_8000_0021_ECX, /* CPUID[8000_0021].ECX */
|
||||
FEAT_8000_0022_EAX, /* CPUID[8000_0022].EAX */
|
||||
FEAT_C000_0001_EDX, /* CPUID[C000_0001].EDX */
|
||||
FEAT_KVM, /* CPUID[4000_0001].EAX (KVM_CPUID_FEATURES) */
|
||||
|
|
@ -1126,6 +1127,11 @@ uint64_t x86_cpu_get_supported_feature_word(X86CPU *cpu, FeatureWord w);
|
|||
*/
|
||||
#define CPUID_8000_0021_EBX_RAPSIZE (8U << 16)
|
||||
|
||||
/* CPU is not vulnerable TSA SA-SQ attack */
|
||||
#define CPUID_8000_0021_ECX_TSA_SQ_NO (1U << 1)
|
||||
/* CPU is not vulnerable TSA SA-L1 attack */
|
||||
#define CPUID_8000_0021_ECX_TSA_L1_NO (1U << 2)
|
||||
|
||||
/* Performance Monitoring Version 2 */
|
||||
#define CPUID_8000_0022_EAX_PERFMON_V2 (1U << 0)
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue