diff options
author | Tao Su <tao1.su@linux.intel.com> | 2025-01-21 10:06:48 +0800 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2025-01-23 11:50:53 +0100 |
commit | b611931d4f70b9a3e49e39c405c63b3b5e9c0df1 (patch) | |
tree | a2325d52c1d97348cc2fc02a2b8b7c1377e30437 /rust/qemu-api/src | |
parent | c597ff5339a9918b00d9f4160126db0ac2a423cc (diff) | |
download | qemu-b611931d4f70b9a3e49e39c405c63b3b5e9c0df1.zip qemu-b611931d4f70b9a3e49e39c405c63b3b5e9c0df1.tar.gz qemu-b611931d4f70b9a3e49e39c405c63b3b5e9c0df1.tar.bz2 |
target/i386: Export BHI_NO bit to guests
Branch History Injection (BHI) is a CPU side-channel vulnerability, where
an attacker may manipulate branch history before transitioning from user
to supervisor mode or from VMX non-root/guest to root mode. CPUs that set
BHI_NO bit in MSR IA32_ARCH_CAPABILITIES to indicate no additional
mitigation is required to prevent BHI.
Make BHI_NO bit available to guests.
Tested-by: Xuelian Guo <xuelian.guo@intel.com>
Signed-off-by: Tao Su <tao1.su@linux.intel.com>
Reviewed-by: Zhao Liu <zhao1.liu@intel.com>
Link: https://lore.kernel.org/r/20250121020650.1899618-3-tao1.su@linux.intel.com
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'rust/qemu-api/src')
0 files changed, 0 insertions, 0 deletions