diff options
author | 2024-11-11 17:22:08 +0100 | |
---|---|---|
committer | 2024-12-30 17:48:33 +0100 | |
commit | 877818802c3e970f67ccb53012facc78bef5f97a (patch) | |
tree | 6e733248c5eb3f438a964bf520411d3be5624658 /scripts/generate_rust_analyzer.py | |
parent | Linux 6.13-rc5 (diff) | |
download | wireguard-linux-877818802c3e970f67ccb53012facc78bef5f97a.tar.xz wireguard-linux-877818802c3e970f67ccb53012facc78bef5f97a.zip |
x86/bugs: Add SRSO_USER_KERNEL_NO support
If the machine has:
CPUID Fn8000_0021_EAX[30] (SRSO_USER_KERNEL_NO) -- If this bit is 1,
it indicates the CPU is not subject to the SRSO vulnerability across
user/kernel boundaries.
have it fall back to IBPB on VMEXIT only, in the case it is going to run
VMs:
Speculative Return Stack Overflow: Mitigation: IBPB on VMEXIT only
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Nikolay Borisov <nik.borisov@suse.com>
Link: https://lore.kernel.org/r/20241202120416.6054-2-bp@kernel.org
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions