summaryrefslogtreecommitdiffstats
path: root/include/exec/exec-all.h
diff options
context:
space:
mode:
authorPaolo Bonzini2019-05-16 20:53:20 +0200
committerEduardo Habkost2019-05-21 20:39:05 +0200
commit20140a82c67467f53814ca197403d5e1b561a5e5 (patch)
tree8b59f49c7614cde9d0051d747af04cfb3d59d0f5 /include/exec/exec-all.h
parentdocs: recommend use of md-clear feature on all Intel CPUs (diff)
downloadqemu-20140a82c67467f53814ca197403d5e1b561a5e5.tar.gz
qemu-20140a82c67467f53814ca197403d5e1b561a5e5.tar.xz
qemu-20140a82c67467f53814ca197403d5e1b561a5e5.zip
target/i386: add MDS-NO feature
Microarchitectural Data Sampling is a hardware vulnerability which allows unprivileged speculative access to data which is available in various CPU internal buffers. Some Intel processors use the ARCH_CAP_MDS_NO bit in the IA32_ARCH_CAPABILITIES MSR to report that they are not vulnerable, make it available to guests. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Message-Id: <20190516185320.28340-1-pbonzini@redhat.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Diffstat (limited to 'include/exec/exec-all.h')
0 files changed, 0 insertions, 0 deletions