diff options
| author | David Kaplan <[email protected]> | 2025-07-07 18:32:57 +0000 |
|---|---|---|
| committer | Borislav Petkov (AMD) <[email protected]> | 2025-07-11 15:55:16 +0000 |
| commit | 19c24f7ee39af503b9731067b91add627b70ecb6 (patch) | |
| tree | 756a246bace04dbe9156afa291ec62b4b72bfe2c /net/unix/af_unix.c | |
| parent | Documentation/x86: Document new attack vector controls (diff) | |
| download | kernel-19c24f7ee39af503b9731067b91add627b70ecb6.tar.gz kernel-19c24f7ee39af503b9731067b91add627b70ecb6.zip | |
cpu: Define attack vectors
Define 4 new attack vectors that are used for controlling CPU speculation
mitigations. These may be individually disabled as part of the
mitigations= command line. Attack vector controls are combined with global
options like 'auto' or 'auto,nosmt' like 'mitigations=auto,no_user_kernel'.
The global options come first in the mitigations= string.
Cross-thread mitigations can either remain enabled fully, including
potentially disabling SMT ('auto,nosmt'), remain enabled except for
disabling SMT ('auto'), or entirely disabled through the new
'no_cross_thread' attack vector option.
The default settings for these attack vectors are consistent with existing
kernel defaults, other than the automatic disabling of VM-based attack
vectors if KVM support is not present.
Signed-off-by: David Kaplan <[email protected]>
Signed-off-by: Borislav Petkov (AMD) <[email protected]>
Link: https://lore.kernel.org/[email protected]
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions
