aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/syscall-counts-by-pid.py
diff options
context:
space:
mode:
authorJiri Kosina <[email protected]>2018-07-26 11:14:55 +0000
committerThomas Gleixner <[email protected]>2018-07-30 22:45:15 +0000
commitfdf82a7856b32d905c39afc85e34364491e46346 (patch)
tree9aaead977f0e8179b929ee98ca2b2914fc119b7d /tools/perf/scripts/python/syscall-counts-by-pid.py
parentx86/kexec: Allocate 8k PGDs for PTI (diff)
downloadkernel-fdf82a7856b32d905c39afc85e34364491e46346.tar.gz
kernel-fdf82a7856b32d905c39afc85e34364491e46346.zip
x86/speculation: Protect against userspace-userspace spectreRSB
The article "Spectre Returns! Speculation Attacks using the Return Stack Buffer" [1] describes two new (sub-)variants of spectrev2-like attacks, making use solely of the RSB contents even on CPUs that don't fallback to BTB on RSB underflow (Skylake+). Mitigate userspace-userspace attacks by always unconditionally filling RSB on context switch when the generic spectrev2 mitigation has been enabled. [1] https://arxiv.org/pdf/1807.07940.pdf Signed-off-by: Jiri Kosina <[email protected]> Signed-off-by: Thomas Gleixner <[email protected]> Reviewed-by: Josh Poimboeuf <[email protected]> Acked-by: Tim Chen <[email protected]> Cc: Konrad Rzeszutek Wilk <[email protected]> Cc: Borislav Petkov <[email protected]> Cc: David Woodhouse <[email protected]> Cc: Peter Zijlstra <[email protected]> Cc: Linus Torvalds <[email protected]> Cc: [email protected] Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions