提交 40cf57b5 编写于 作者: D Daniel P. Berrangé

cpu: define the 'virt-ssbd' CPUID feature bit (CVE-2018-3639)

Some AMD processors only support a non-architectural means of
enabling Speculative Store Bypass Disable. To allow simplified
handling in virtual environments, hypervisors will expose an
architectural definition through CPUID bit 0x80000008_EBX[25].
This needs to be exposed to guest OS running on AMD x86 hosts to
allow them to protect against CVE-2018-3639.

Note that since this CPUID bit won't be present in the host CPUID
results on physical hosts, it will not be enabled automatically
in guests configured with "host-model" CPU unless using QEMU
version >= 2.9.0. Thus for older versions of QEMU, this feature
must be manually enabled using policy=force. Guests using the
"host-passthrough" CPU mode do not need special handling.
Signed-off-by: NDaniel P. Berrangé <berrange@redhat.com>
Reviewed-by: NJiri Denemark <jdenemar@redhat.com>
(cherry picked from commit 92673422)
上级 519a6adb
...@@ -433,6 +433,9 @@ ...@@ -433,6 +433,9 @@
<feature name='ibpb'> <feature name='ibpb'>
<cpuid eax_in='0x80000008' ebx='0x00001000'/> <cpuid eax_in='0x80000008' ebx='0x00001000'/>
</feature> </feature>
<feature name='virt-ssbd'>
<cpuid eax_in='0x80000008' ebx='0x02000000'/>
</feature>
<!-- models --> <!-- models -->
<model name='486'> <model name='486'>
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册