diff options
| author | Borislav Petkov (AMD) <[email protected]> | 2024-11-11 16:22:08 +0000 |
|---|---|---|
| committer | Borislav Petkov (AMD) <[email protected]> | 2024-12-30 16:48:33 +0000 |
| commit | 877818802c3e970f67ccb53012facc78bef5f97a (patch) | |
| tree | 6e733248c5eb3f438a964bf520411d3be5624658 /drivers/gpu/drm/amd/amdgpu/amdgpu_isp.c | |
| parent | Linux 6.13-rc5 (diff) | |
| download | kernel-877818802c3e970f67ccb53012facc78bef5f97a.tar.gz kernel-877818802c3e970f67ccb53012facc78bef5f97a.zip | |
x86/bugs: Add SRSO_USER_KERNEL_NO support
If the machine has:
CPUID Fn8000_0021_EAX[30] (SRSO_USER_KERNEL_NO) -- If this bit is 1,
it indicates the CPU is not subject to the SRSO vulnerability across
user/kernel boundaries.
have it fall back to IBPB on VMEXIT only, in the case it is going to run
VMs:
Speculative Return Stack Overflow: Mitigation: IBPB on VMEXIT only
Signed-off-by: Borislav Petkov (AMD) <[email protected]>
Reviewed-by: Nikolay Borisov <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'drivers/gpu/drm/amd/amdgpu/amdgpu_isp.c')
0 files changed, 0 insertions, 0 deletions
