IA32_SPEC_CTRL
and other security-sensitive MSRs
#9
dimakuv
started this conversation in
Security analysis
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
The "Trust Domain Security Guidance for Developers" document says this:
Must check what
IA32_SPEC_CTRL
MSR does exactly, how it is preserved inside the TD, and if Gramine needs to do/verify anything about this MSR. Similarly for a related MSR calledIA32_ARCH_CAPABILITIES
.All information is found here: https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/cpuid-enumeration-and-architectural-msrs.html
From the "Intel TDX Module v1.5 ABI Specification", Table 2.2 "MSR Virtualization":
IA32_SPEC_CTRL
-- native (direct read/write from/to CPU)IA32_ARCH_CAPABILITIES
-- nativeOther less important MSRs:
IA32_PRED_CMD
-- nativeIA32_FLUSH_CMD
-- nativeIA32_TSX_CTRL
-- #GP(0) because TSX is disabled inside TDXIA32_MCU_OPT_CTRL
-- #VE, may be potentially dangerous to useIA32_UARCH_MISC_CTL
-- #VE, may be potentially dangerous to useIA32_XAPIC_DISABLE_STATUS
-- #VE, may be potentially dangerous to useCurrently, Gramine-TDX doesn't use any of these MSRs. But this list may be important for the future.
Beta Was this translation helpful? Give feedback.
All reactions