diff options
author | Borislav Petkov (AMD) <bp@alien8.de> | 2024-11-11 17:22:08 +0100 |
---|---|---|
committer | Borislav Petkov (AMD) <bp@alien8.de> | 2024-12-30 17:48:33 +0100 |
commit | 877818802c3e970f67ccb53012facc78bef5f97a (patch) | |
tree | 6e733248c5eb3f438a964bf520411d3be5624658 /tools/perf/scripts/python/task-analyzer.py | |
parent | fc033cf25e612e840e545f8d5ad2edd6ba613ed5 (diff) |
x86/bugs: Add SRSO_USER_KERNEL_NO support
If the machine has:
CPUID Fn8000_0021_EAX[30] (SRSO_USER_KERNEL_NO) -- If this bit is 1,
it indicates the CPU is not subject to the SRSO vulnerability across
user/kernel boundaries.
have it fall back to IBPB on VMEXIT only, in the case it is going to run
VMs:
Speculative Return Stack Overflow: Mitigation: IBPB on VMEXIT only
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Nikolay Borisov <nik.borisov@suse.com>
Link: https://lore.kernel.org/r/20241202120416.6054-2-bp@kernel.org
Diffstat (limited to 'tools/perf/scripts/python/task-analyzer.py')
0 files changed, 0 insertions, 0 deletions