mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-08-27 06:50:37 +00:00
![]() The SRSO bug can theoretically be used to conduct user->user or guest->guest attacks and requires a mitigation (namely IBPB instead of SBPB on context switch) for these. So mark SRSO as being applicable to the user->user and guest->guest attack vectors. Additionally, SRSO supports multiple mitigations which mitigate different potential attack vectors. Some CPUs are also immune to SRSO from certain attack vectors (like user->kernel). Use the specific attack vectors requiring mitigation to select the best SRSO mitigation to avoid unnecessary performance hits. Signed-off-by: David Kaplan <david.kaplan@amd.com> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de> Link: https://lore.kernel.org/20250721160310.1804203-1-david.kaplan@amd.com |
||
---|---|---|
.. | ||
attack_vector_controls.rst | ||
core-scheduling.rst | ||
cross-thread-rsb.rst | ||
gather_data_sampling.rst | ||
index.rst | ||
indirect-target-selection.rst | ||
l1d_flush.rst | ||
l1tf.rst | ||
mds.rst | ||
multihit.rst | ||
old_microcode.rst | ||
processor_mmio_stale_data.rst | ||
reg-file-data-sampling.rst | ||
rsb.rst | ||
special-register-buffer-data-sampling.rst | ||
spectre.rst | ||
srso.rst | ||
tsx_async_abort.rst |