On Tue, Jan 21, 2025 at 10:06:48AM +0800, Tao Su wrote: > Date: Tue, 21 Jan 2025 10:06:48 +0800 > From: Tao Su <tao1...@linux.intel.com> > Subject: [PATCH 2/4] target/i386: Export BHI_NO bit to guests > X-Mailer: git-send-email 2.34.1 > > Branch History Injection (BHI) is a CPU side-channel vulnerability, where > an attacker may manipulate branch history before transitioning from user > to supervisor mode or from VMX non-root/guest to root mode. CPUs that set > BHI_NO bit in MSR IA32_ARCH_CAPABILITIES to indicate no additional > mitigation is required to prevent BHI. > > Make BHI_NO bit available to guests. > > Tested-by: Xuelian Guo <xuelian....@intel.com> > Signed-off-by: Tao Su <tao1...@linux.intel.com> > --- > target/i386/cpu.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) >
Reviewed-by: Zhao Liu <zhao1....@intel.com>