mirror of https://github.com/torvalds/linux.git
The SRSO bug can theoretically be used to conduct user->user or guest->guest attacks and requires a mitigation (namely IBPB instead of SBPB on context switch) for these. So mark SRSO as being applicable to the user->user and guest->guest attack vectors. Additionally, SRSO supports multiple mitigations which mitigate different potential attack vectors. Some CPUs are also immune to SRSO from certain attack vectors (like user->kernel). Use the specific attack vectors requiring mitigation to select the best SRSO mitigation to avoid unnecessary performance hits. Signed-off-by: David Kaplan <david.kaplan@amd.com> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de> Link: https://lore.kernel.org/20250721160310.1804203-1-david.kaplan@amd.com |
||
|---|---|---|
| .. | ||
| attack_vector_controls.rst | ||
| core-scheduling.rst | ||
| cross-thread-rsb.rst | ||
| gather_data_sampling.rst | ||
| index.rst | ||
| indirect-target-selection.rst | ||
| l1d_flush.rst | ||
| l1tf.rst | ||
| mds.rst | ||
| multihit.rst | ||
| old_microcode.rst | ||
| processor_mmio_stale_data.rst | ||
| reg-file-data-sampling.rst | ||
| rsb.rst | ||
| special-register-buffer-data-sampling.rst | ||
| spectre.rst | ||
| srso.rst | ||
| tsx_async_abort.rst | ||