IA32_SPEC_CTRL
and other security-sensitive MSRs
#9
dimakuv
started this conversation in
Security analysis
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
The "Trust Domain Security Guidance for Developers" document says this:
Must check what
IA32_SPEC_CTRL
MSR does exactly, how it is preserved inside the TD, and if Gramine needs to do/verify anything about this MSR. Similarly for a related MSR calledIA32_ARCH_CAPABILITIES
.All information is found here: https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/cpuid-enumeration-and-architectural-msrs.html
From the "Intel TDX Module v1.5 ABI Specification", Table 2.2 "MSR Virtualization":
IA32_SPEC_CTRL
-- native (direct read/write from/to CPU)IA32_ARCH_CAPABILITIES
-- nativeOther less important MSRs:
IA32_PRED_CMD
-- nativeIA32_FLUSH_CMD
-- nativeIA32_TSX_CTRL
-- #GP(0) because TSX is disabled inside TDXIA32_MCU_OPT_CTRL
-- #VE, may be potentially dangerous to useIA32_UARCH_MISC_CTL
-- #VE, may be potentially dangerous to useIA32_XAPIC_DISABLE_STATUS
-- #VE, may be potentially dangerous to useCurrently, Gramine-TDX doesn't use any of these MSRs. But this list may be important for the future.
Beta Was this translation helpful? Give feedback.
All reactions