diff options
author | Jiri Kosina <[email protected]> | 2018-07-26 13:14:55 +0200 |
---|---|---|
committer | Thomas Gleixner <[email protected]> | 2018-07-31 00:45:15 +0200 |
commit | fdf82a7856b32d905c39afc85e34364491e46346 (patch) | |
tree | 9aaead977f0e8179b929ee98ca2b2914fc119b7d /tools/perf/scripts/python/export-to-postgresql.py | |
parent | ca38dc8f2724d101038b1205122c93a1c7f38f11 (diff) |
x86/speculation: Protect against userspace-userspace spectreRSB
The article "Spectre Returns! Speculation Attacks using the Return Stack
Buffer" [1] describes two new (sub-)variants of spectrev2-like attacks,
making use solely of the RSB contents even on CPUs that don't fallback to
BTB on RSB underflow (Skylake+).
Mitigate userspace-userspace attacks by always unconditionally filling RSB on
context switch when the generic spectrev2 mitigation has been enabled.
[1] https://arxiv.org/pdf/1807.07940.pdf
Signed-off-by: Jiri Kosina <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Reviewed-by: Josh Poimboeuf <[email protected]>
Acked-by: Tim Chen <[email protected]>
Cc: Konrad Rzeszutek Wilk <[email protected]>
Cc: Borislav Petkov <[email protected]>
Cc: David Woodhouse <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Linus Torvalds <[email protected]>
Cc: [email protected]
Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions