summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/hardirq.h
diff options
context:
space:
mode:
authorJosh Poimboeuf <jpoimboe@kernel.org>2023-09-05 07:04:52 +0200
committerBorislav Petkov (AMD) <bp@alien8.de>2023-10-20 11:46:09 +0200
commitdc6306ad5b0dda040baf1fde3cfd458e6abfc4da (patch)
treeab8c2d9e033fd30aa27b58f2ffd9b0fb23ac1e88 /arch/x86/include/asm/hardirq.h
parentx86/srso: Print mitigation for retbleed IBPB case (diff)
downloadlinux-dc6306ad5b0dda040baf1fde3cfd458e6abfc4da.tar.xz
linux-dc6306ad5b0dda040baf1fde3cfd458e6abfc4da.zip
x86/srso: Fix vulnerability reporting for missing microcode
The SRSO default safe-ret mitigation is reported as "mitigated" even if microcode hasn't been updated. That's wrong because userspace may still be vulnerable to SRSO attacks due to IBPB not flushing branch type predictions. Report the safe-ret + !microcode case as vulnerable. Also report the microcode-only case as vulnerable as it leaves the kernel open to attacks. Fixes: fb3bd914b3ec ("x86/srso: Add a Speculative RAS Overflow mitigation") Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org> Signed-off-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Acked-by: Borislav Petkov (AMD) <bp@alien8.de> Link: https://lore.kernel.org/r/a8a14f97d1b0e03ec255c81637afdf4cf0ae9c99.1693889988.git.jpoimboe@kernel.org
Diffstat (limited to 'arch/x86/include/asm/hardirq.h')
0 files changed, 0 insertions, 0 deletions