From: Pawan Gupta Date: Mon, 18 Nov 2019 23:23:27 -0800 Subject: target/i386: Export TAA_NO bit to guests Git-commit: 7fac38635e1cc5ebae34eb6530da1009bd5808e4 Reference: bsc#1152506 CVE-2019-11135 TSX Async Abort (TAA) is a side channel attack on internal buffers in some Intel processors similar to Microachitectural Data Sampling (MDS). Some future Intel processors will use the ARCH_CAP_TAA_NO bit in the IA32_ARCH_CAPABILITIES MSR to report that they are not vulnerable to TAA. Make this bit available to guests. Signed-off-by: Pawan Gupta Signed-off-by: Paolo Bonzini Signed-off-by: Bruce Rogers --- target/i386/cpu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/target/i386/cpu.c b/target/i386/cpu.c index 5191367f89ee4d1131c4309633de..530942baed87c5ff76beaf36df14 100644 --- a/target/i386/cpu.c +++ b/target/i386/cpu.c @@ -1189,7 +1189,7 @@ static FeatureWordInfo feature_word_info[FEATURE_WORDS] = { .feat_names = { "rdctl-no", "ibrs-all", "rsba", "skip-l1dfl-vmentry", "ssb-no", "mds-no", "pschange-mc-no", NULL, - NULL, NULL, NULL, NULL, + "taa-no", NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL,