From c432e7520c4410545d5883f2a5be5dcecbf1854d Mon Sep 17 00:00:00 2001 From: Eduardo Habkost Date: Mon, 6 Jan 2020 13:04:21 +0100 Subject: [PATCH] target/i386: add MDS-NO feature RH-Author: Eduardo Habkost Message-id: <20191024031525.7449-1-ehabkost@redhat.com> Patchwork-id: 91937 O-Subject: [RHEL-7.7.z qemu-kvm PATCH] target/i386: add MDS-NO feature Bugzilla: 1755333 RH-Acked-by: Igor Mammedov RH-Acked-by: Dr. David Alan Gilbert RH-Acked-by: Miroslav Rezanina From: Paolo Bonzini Microarchitectural Data Sampling is a hardware vulnerability which allows unprivileged speculative access to data which is available in various CPU internal buffers. Some Intel processors use the ARCH_CAP_MDS_NO bit in the IA32_ARCH_CAPABILITIES MSR to report that they are not vulnerable, make it available to guests. Signed-off-by: Paolo Bonzini Message-Id: <20190516185320.28340-1-pbonzini@redhat.com> Signed-off-by: Eduardo Habkost (cherry picked from commit 20140a82c67467f53814ca197403d5e1b561a5e5) Signed-off-by: Eduardo Habkost --- target-i386/cpu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/target-i386/cpu.c b/target-i386/cpu.c index 48d3aec..63ae76e 100644 --- a/target-i386/cpu.c +++ b/target-i386/cpu.c @@ -200,7 +200,7 @@ static const char *cpuid_xsave_feature_name[] = { static const char *cpuid_arch_capabilities_feature_name[] = { "rdctl-no", "ibrs-all", "rsba", "skip-l1dfl-vmentry", - "ssb-no", NULL, NULL, "tsx-ctrl", + "ssb-no", "mds-no", NULL, "tsx-ctrl", "taa-no", NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, -- 1.8.3.1