* [Qemu-devel] [PULL 1/3] target/i386: define md-clear bit
2019-05-21 18:50 [Qemu-devel] [PULL 0/3] x86 MDS feature flags Eduardo Habkost
@ 2019-05-21 18:50 ` Eduardo Habkost
2019-05-21 18:50 ` [Qemu-devel] [PULL 2/3] docs: recommend use of md-clear feature on all Intel CPUs Eduardo Habkost
` (2 subsequent siblings)
3 siblings, 0 replies; 5+ messages in thread
From: Eduardo Habkost @ 2019-05-21 18:50 UTC (permalink / raw)
To: Peter Maydell, qemu-devel
Cc: Paolo Bonzini, Eduardo Habkost, Richard Henderson
From: Paolo Bonzini <pbonzini@redhat.com>
md-clear is a new CPUID bit which is set when microcode provides the
mechanism to invoke a flush of various exploitable CPU buffers by invoking
the VERW instruction.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20190515141011.5315-2-berrange@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
---
target/i386/cpu.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/target/i386/cpu.c b/target/i386/cpu.c
index 2df56fa977..953d78b062 100644
--- a/target/i386/cpu.c
+++ b/target/i386/cpu.c
@@ -1077,7 +1077,7 @@ static FeatureWordInfo feature_word_info[FEATURE_WORDS] = {
.feat_names = {
NULL, NULL, "avx512-4vnniw", "avx512-4fmaps",
NULL, NULL, NULL, NULL,
- NULL, NULL, NULL, NULL,
+ NULL, NULL, "md-clear", NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
--
2.18.0.rc1.1.g3f1ff2140
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [Qemu-devel] [PULL 2/3] docs: recommend use of md-clear feature on all Intel CPUs
2019-05-21 18:50 [Qemu-devel] [PULL 0/3] x86 MDS feature flags Eduardo Habkost
2019-05-21 18:50 ` [Qemu-devel] [PULL 1/3] target/i386: define md-clear bit Eduardo Habkost
@ 2019-05-21 18:50 ` Eduardo Habkost
2019-05-21 18:50 ` [Qemu-devel] [PULL 3/3] target/i386: add MDS-NO feature Eduardo Habkost
2019-05-23 8:55 ` [Qemu-devel] [PULL 0/3] x86 MDS feature flags Peter Maydell
3 siblings, 0 replies; 5+ messages in thread
From: Eduardo Habkost @ 2019-05-21 18:50 UTC (permalink / raw)
To: Peter Maydell, qemu-devel
Cc: Paolo Bonzini, Daniel P. Berrangé, Eduardo Habkost,
Richard Henderson
From: Daniel P. Berrangé <berrange@redhat.com>
Update x86 CPU model guidance to recommend that the md-clear feature is
manually enabled with all Intel CPU models, when supported by the host
microcode.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Message-Id: <20190515141011.5315-3-berrange@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
---
docs/qemu-cpu-models.texi | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/docs/qemu-cpu-models.texi b/docs/qemu-cpu-models.texi
index 23c11dc86f..ad040cfc98 100644
--- a/docs/qemu-cpu-models.texi
+++ b/docs/qemu-cpu-models.texi
@@ -200,6 +200,18 @@ Not included by default in any Intel CPU model.
Should be explicitly turned on for all Intel CPU models.
Note that not all CPU hardware will support this feature.
+
+@item @code{md-clear}
+
+Required to confirm the MDS (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130,
+CVE-2019-11091) fixes.
+
+Not included by default in any Intel CPU model.
+
+Must be explicitly turned on for all Intel CPU models.
+
+Requires the host CPU microcode to support this feature before it
+can be used for guest CPUs.
@end table
--
2.18.0.rc1.1.g3f1ff2140
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [Qemu-devel] [PULL 3/3] target/i386: add MDS-NO feature
2019-05-21 18:50 [Qemu-devel] [PULL 0/3] x86 MDS feature flags Eduardo Habkost
2019-05-21 18:50 ` [Qemu-devel] [PULL 1/3] target/i386: define md-clear bit Eduardo Habkost
2019-05-21 18:50 ` [Qemu-devel] [PULL 2/3] docs: recommend use of md-clear feature on all Intel CPUs Eduardo Habkost
@ 2019-05-21 18:50 ` Eduardo Habkost
2019-05-23 8:55 ` [Qemu-devel] [PULL 0/3] x86 MDS feature flags Peter Maydell
3 siblings, 0 replies; 5+ messages in thread
From: Eduardo Habkost @ 2019-05-21 18:50 UTC (permalink / raw)
To: Peter Maydell, qemu-devel
Cc: Paolo Bonzini, Eduardo Habkost, Richard Henderson
From: Paolo Bonzini <pbonzini@redhat.com>
Microarchitectural Data Sampling is a hardware vulnerability which allows
unprivileged speculative access to data which is available in various CPU
internal buffers.
Some Intel processors use the ARCH_CAP_MDS_NO bit in the
IA32_ARCH_CAPABILITIES
MSR to report that they are not vulnerable, make it available to guests.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20190516185320.28340-1-pbonzini@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
---
target/i386/cpu.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/target/i386/cpu.c b/target/i386/cpu.c
index 953d78b062..2f151dad8c 100644
--- a/target/i386/cpu.c
+++ b/target/i386/cpu.c
@@ -1184,7 +1184,7 @@ static FeatureWordInfo feature_word_info[FEATURE_WORDS] = {
.type = MSR_FEATURE_WORD,
.feat_names = {
"rdctl-no", "ibrs-all", "rsba", "skip-l1dfl-vmentry",
- "ssb-no", NULL, NULL, NULL,
+ "ssb-no", "mds-no", NULL, NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
--
2.18.0.rc1.1.g3f1ff2140
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [Qemu-devel] [PULL 0/3] x86 MDS feature flags
2019-05-21 18:50 [Qemu-devel] [PULL 0/3] x86 MDS feature flags Eduardo Habkost
` (2 preceding siblings ...)
2019-05-21 18:50 ` [Qemu-devel] [PULL 3/3] target/i386: add MDS-NO feature Eduardo Habkost
@ 2019-05-23 8:55 ` Peter Maydell
3 siblings, 0 replies; 5+ messages in thread
From: Peter Maydell @ 2019-05-23 8:55 UTC (permalink / raw)
To: Eduardo Habkost; +Cc: Paolo Bonzini, QEMU Developers, Richard Henderson
On Tue, 21 May 2019 at 19:51, Eduardo Habkost <ehabkost@redhat.com> wrote:
>
> The following changes since commit a4f667b6714916683408b983cfe0a615a725775f:
>
> Merge remote-tracking branch 'remotes/cohuck/tags/s390x-20190521-3' into staging (2019-05-21 16:30:13 +0100)
>
> are available in the Git repository at:
>
> git://github.com/ehabkost/qemu.git tags/x86-next-pull-request
>
> for you to fetch changes up to 20140a82c67467f53814ca197403d5e1b561a5e5:
>
> target/i386: add MDS-NO feature (2019-05-21 15:39:05 -0300)
>
> ----------------------------------------------------------------
> x86 MDS feature flags
>
> md-clear and mds-no feature flags, for detection and mitigation
> of MDS vulnerabilities (CVE-2018-12126, CVE-2018-12127,
> CVE-2018-12130, CVE-2019-11091).
>
> ----------------------------------------------------------------
Applied, thanks.
Please update the changelog at https://wiki.qemu.org/ChangeLog/4.1
for any user-visible changes.
-- PMM
^ permalink raw reply [flat|nested] 5+ messages in thread