aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/kvm
diff options
context:
space:
mode:
authorGravatar Pawan Gupta <pawan.kumar.gupta@linux.intel.com> 2024-03-11 12:29:43 -0700
committerGravatar Dave Hansen <dave.hansen@linux.intel.com> 2024-03-11 13:13:48 -0700
commit8076fcde016c9c0e0660543e67bff86cb48a7c9c (patch)
treeb07933926b045b08a417655be3f4310cebdbb1a6 /arch/x86/kvm
parentDocumentation/hw-vuln: Add documentation for RFDS (diff)
downloadlinux-8076fcde016c9c0e0660543e67bff86cb48a7c9c.tar.gz
linux-8076fcde016c9c0e0660543e67bff86cb48a7c9c.tar.bz2
linux-8076fcde016c9c0e0660543e67bff86cb48a7c9c.zip
x86/rfds: Mitigate Register File Data Sampling (RFDS)
RFDS is a CPU vulnerability that may allow userspace to infer kernel stale data previously used in floating point registers, vector registers and integer registers. RFDS only affects certain Intel Atom processors. Intel released a microcode update that uses VERW instruction to clear the affected CPU buffers. Unlike MDS, none of the affected cores support SMT. Add RFDS bug infrastructure and enable the VERW based mitigation by default, that clears the affected buffers just before exiting to userspace. Also add sysfs reporting and cmdline parameter "reg_file_data_sampling" to control the mitigation. For details see: Documentation/admin-guide/hw-vuln/reg-file-data-sampling.rst Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Reviewed-by: Thomas Gleixner <tglx@linutronix.de> Acked-by: Josh Poimboeuf <jpoimboe@kernel.org>
Diffstat (limited to 'arch/x86/kvm')
0 files changed, 0 insertions, 0 deletions