mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-09-21 00:38:28 +00:00
HV: check security mitigation support for SSBD
Hypervisor exposes mitigation technique for Speculative Store Bypass(SSB) to guests and allows a guest to determine whether to enable SSBD mitigation by providing direct guest access to IA32_SPEC_CTRL. Before that, hypervisor should check the SSB mitigation support on underlying processor, this patch is to add this capability check. Tracked-On: #3385 Signed-off-by: Yonghua Huang <yonghua.huang@intel.com> Reviewed-by: Jason Chen CJ <jason.cj.chen@intel.com>
This commit is contained in:
committed by
ACRN System Integration
parent
b592404f48
commit
1ea3052f80
@@ -84,6 +84,7 @@
|
||||
#define X86_FEATURE_STIBP ((FEAT_7_0_EDX << 5U) + 27U)
|
||||
#define X86_FEATURE_L1D_FLUSH ((FEAT_7_0_EDX << 5U) + 28U)
|
||||
#define X86_FEATURE_ARCH_CAP ((FEAT_7_0_EDX << 5U) + 29U)
|
||||
#define X86_FEATURE_SSBD ((FEAT_7_0_EDX << 5U) + 31U)
|
||||
|
||||
/* Intel-defined CPU features, CPUID level 0x80000001 (EDX)*/
|
||||
#define X86_FEATURE_NX ((FEAT_8000_0001_EDX << 5U) + 20U)
|
||||
|
Reference in New Issue
Block a user