[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/ucode: Exclude Zen6 from entrysign mitigations


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Thu, 19 Mar 2026 09:40:12 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6TjSp0R+1uGwYCPITivKPWItXdn3pkd514fk+WaY+iI=; b=jEad4CtoQ0aq3RctmxiyHlwva1t1xEBBziTKb6HWRiptajzWHXMxL1tvB4l28X4l8uZMEh7VeaJ5PQZHiNYHXUofRS3utOZ7D+5QakPVzY/COLNQfcYX3ehVwdiS3vmHYwtlQcHHMI9ULd2Z7vv10CHI4dKaEJKvFyBJRZS8bug7++gZheqJmHCV4JXvtrL4VlueiLLUPZIgcahfQlvFt4boXLwWoKb0Y2Y9BMzpfaJrKyokpGzao03ItHlLZBifYpF1dmpYD/Q8VLb4vgjM6Gs/jYr7ZGX6YzDHiwMj8iQgqtpOMjXX/Ho8SfL7ENo4/ItJmlvFrU/+7cUsn57rPQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=K3WmXYXzRFldYY7SaXCtWvVXeM+MpyTeQYLwtbHHgLt6SpRjweSZutuuaT16tirQQYrK9fKPTVvsFWL4fAysyLhWTFttBm3Kk6atN6yKhWdkLBcjy8e1psUxAIuE8x5amtBMHzJdWkLNB279mSQ1+SKOjulGFkz37UUb7LCsJDlrnBdsusn6JVJ/vlAhPeVPlDSKW8bYMfSmqZNBfGNp/mkaJSV8zMpq9YLFg6NxoZt6upVg5HIC6zoNE4iMP5yAzOKcFUcPYs62Pz0UqgvlV+GkMRX0Uni24nXbII/U5TUCKwghceAWtMaPzwTpkedN3H+GGCgMiU/D2NL62utyfg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 19 Mar 2026 09:40:33 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 19/03/2026 9:38 am, Jan Beulich wrote:
> On 16.03.2026 13:06, Andrew Cooper wrote:
>> Family 0x1a covers both Zen5 and Zen6, but the latter is not believed to be
>> vulnerable to entrysign.
>>
>> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

Thanks.

>
>> This does want backporting, but it depends on 8e4775d118c327 which collects
>> leaf 7a1 early enough to be used in this way.  So, it should hold off for the
>> moment until the FRED backports are finalised.
> Okay.
>
>> --- a/xen/arch/x86/include/asm/amd.h
>> +++ b/xen/arch/x86/include/asm/amd.h
>> @@ -59,6 +59,8 @@
>>   * For Zen3 and Zen4 (Fam19h) the heuristic is the presence of AutoIBRS, as
>>   * it's Zen4-specific.
>>   *
>> + * For Zen5 and Zen6 (Fam1ah) the heuristic is the presence of FRED.
>> + *
>>   * The caller is required to perform the appropriate vendor/family checks
>>   * first.
>>   */
>> @@ -66,6 +68,8 @@
>>  #define is_zen2_uarch()   boot_cpu_has(X86_FEATURE_AMD_STIBP)
>>  #define is_zen3_uarch() (!boot_cpu_has(X86_FEATURE_AUTO_IBRS))
>>  #define is_zen4_uarch()   boot_cpu_has(X86_FEATURE_AUTO_IBRS)
>> +#define is_zen5_uarch() (!boot_cpu_has(X86_FEATURE_FRED))
>> +#define is_zen6_uarch()   boot_cpu_has(X86_FEATURE_FRED)
> A more general remark here: This, I think, is one of the (rare) cases where
> we may want to use the raw CPU policy, for the distinction to remain
> unaffected by "cpuid=" command line options. Thoughts?

Yes, that's the plan, but raw is still collected too late right now. 
This is on the todo list.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.