yeahuh / rpms / qemu-kvm

Forked from rpms/qemu-kvm 2 years ago
Clone
69f3e1
From 43f2e3a36586d9e7e12e5638ae19837f726490ff Mon Sep 17 00:00:00 2001
69f3e1
From: "plai@redhat.com" <plai@redhat.com>
69f3e1
Date: Tue, 20 Aug 2019 00:24:40 +0100
69f3e1
Subject: [PATCH 9/9] target/i386: add MDS-NO feature
69f3e1
69f3e1
RH-Author: plai@redhat.com
69f3e1
Message-id: <1566260680-20995-10-git-send-email-plai@redhat.com>
69f3e1
Patchwork-id: 90071
69f3e1
O-Subject: [RHEL8.0 qemu-kvm PATCH v3 9/9] target/i386: add MDS-NO feature
69f3e1
Bugzilla: 1718235
69f3e1
RH-Acked-by: Eduardo Habkost <ehabkost@redhat.com>
69f3e1
RH-Acked-by: John Snow <jsnow@redhat.com>
69f3e1
RH-Acked-by: Igor Mammedov <imammedo@redhat.com>
69f3e1
69f3e1
From: Paolo Bonzini <pbonzini@redhat.com>
69f3e1
69f3e1
Microarchitectural Data Sampling is a hardware vulnerability which allows
69f3e1
unprivileged speculative access to data which is available in various CPU
69f3e1
internal buffers.
69f3e1
69f3e1
Some Intel processors use the ARCH_CAP_MDS_NO bit in the
69f3e1
IA32_ARCH_CAPABILITIES
69f3e1
MSR to report that they are not vulnerable, make it available to guests.
69f3e1
69f3e1
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
69f3e1
Message-Id: <20190516185320.28340-1-pbonzini@redhat.com>
69f3e1
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
69f3e1
(cherry picked from commit 20140a82c67467f53814ca197403d5e1b561a5e5)
69f3e1
Signed-off-by: Paul Lai <plai@redhat.com>
69f3e1
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
69f3e1
---
69f3e1
 target/i386/cpu.c | 2 +-
69f3e1
 1 file changed, 1 insertion(+), 1 deletion(-)
69f3e1
69f3e1
diff --git a/target/i386/cpu.c b/target/i386/cpu.c
69f3e1
index 365c92c..07ec8bc 100644
69f3e1
--- a/target/i386/cpu.c
69f3e1
+++ b/target/i386/cpu.c
69f3e1
@@ -1147,7 +1147,7 @@ static FeatureWordInfo feature_word_info[FEATURE_WORDS] = {
69f3e1
         .type = MSR_FEATURE_WORD,
69f3e1
         .feat_names = {
69f3e1
             "rdctl-no", "ibrs-all", "rsba", "skip-l1dfl-vmentry",
69f3e1
-            "ssb-no", NULL, NULL, NULL,
69f3e1
+            "ssb-no", "mds-no", NULL, NULL,
69f3e1
             NULL, NULL, NULL, NULL,
69f3e1
             NULL, NULL, NULL, NULL,
69f3e1
             NULL, NULL, NULL, NULL,
69f3e1
-- 
69f3e1
1.8.3.1
69f3e1