linux-stable/Documentation/admin-guide/hw-vuln
Linus Torvalds 0e33cf955f * Mitigate RFDS vulnerability
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEEV76QKkVc4xCGURexaDWVMHDJkrAFAmXvZgoACgkQaDWVMHDJ
 krC2Eg//aZKBp97/DSzRqXKDwJzVUr0sGJ9cii0gVT1sI+1U6ZZCh/roVH4xOT5/
 HqtOOnQ+X0mwUx2VG3Yv2VPI7VW68sJ3/y9D8R4tnMEsyQ4CmDw96Pre3NyKr/Av
 jmW7SK94fOkpNFJOMk3zpk7GtRUlCsVkS1P61dOmMYduguhel/V20rWlx83BgnAY
 Rf/c3rBjqe8Ri3rzBP5icY/d6OgwoafuhME31DD/j6oKOh+EoQBvA4urj46yMTMX
 /mrK7hCm/wqwuOOvgGbo7sfZNBLCYy3SZ3EyF4beDERhPF1DaSvCwOULpGVJroqu
 SelFsKXAtEbYrDgsan+MYlx3bQv43q7PbHska1gjkH91plO4nAsssPr5VsusUKmT
 sq8jyBaauZb40oLOSgooL4RqAHrfs8q5695Ouwh/DB/XovMezUI1N/BkpGFmqpJI
 o2xH9P5q520pkB8pFhN9TbRuFSGe/dbWC24QTq1DUajo3M3RwcwX6ua9hoAKLtDF
 pCV5DNcVcXHD3Cxp0M5dQ5JEAiCnW+ZpUWgxPQamGDNW5PEvjDmFwql2uWw/qOuW
 lkheOIffq8ejUBQFbN8VXfIzzeeKQNFiIcViaqGITjIwhqdHAzVi28OuIGwtdh3g
 ywLzSC8yvyzgKrNBgtFMr3ucKN0FoPxpBro253xt2H7w8srXW64=
 =5V9t
 -----END PGP SIGNATURE-----

Merge tag 'rfds-for-linus-2024-03-11' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip

Pull x86 RFDS mitigation from Dave Hansen:
 "RFDS is a CPU vulnerability that may allow a malicious userspace to
  infer stale register values from kernel space. Kernel registers can
  have all kinds of secrets in them so the mitigation is basically to
  wait until the kernel is about to return to userspace and has user
  values in the registers. At that point there is little chance of
  kernel secrets ending up in the registers and the microarchitectural
  state can be cleared.

  This leverages some recent robustness fixes for the existing MDS
  vulnerability. Both MDS and RFDS use the VERW instruction for
  mitigation"

* tag 'rfds-for-linus-2024-03-11' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
  KVM/x86: Export RFDS_NO and RFDS_CLEAR to guests
  x86/rfds: Mitigate Register File Data Sampling (RFDS)
  Documentation/hw-vuln: Add documentation for RFDS
  x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set
2024-03-12 09:31:39 -07:00
..
core-scheduling.rst uapi/linux/prctl: provide macro definitions for the PR_SCHED_CORE type argument 2021-09-29 13:00:05 +02:00
cross-thread-rsb.rst Documentation/hw-vuln: Fix rST warning 2023-02-15 07:24:23 -05:00
gather_data_sampling.rst Documentation/x86: Fix backwards on/off logic about YMM support 2023-08-01 15:28:24 -07:00
index.rst Documentation/hw-vuln: Add documentation for RFDS 2024-03-11 13:13:46 -07:00
l1d_flush.rst Documentation: Add L1D flushing Documentation 2021-07-28 11:42:25 +02:00
l1tf.rst docs: add IRQ documentation at the core-api book 2020-05-15 12:00:56 -06:00
mds.rst docs/hw-vuln: Update desc of best effort mode 2023-10-10 13:35:55 -06:00
multihit.rst x86/bugs/multihit: Fix mitigation reporting when VMX is not in use 2020-08-07 01:32:00 +02:00
processor_mmio_stale_data.rst docs/hw-vuln: Update desc of best effort mode 2023-10-10 13:35:55 -06:00
reg-file-data-sampling.rst Documentation/hw-vuln: Add documentation for RFDS 2024-03-11 13:13:46 -07:00
special-register-buffer-data-sampling.rst docs: admin-guide: hw-vuln: avoid using ReST :doc:`foo` markup 2021-06-17 13:24:36 -06:00
spectre.rst x86/bugs: Rename CONFIG_RETPOLINE => CONFIG_MITIGATION_RETPOLINE 2024-01-10 10:52:28 +01:00
srso.rst x86/srso: Fix vulnerability reporting for missing microcode 2023-10-20 11:46:09 +02:00
tsx_async_abort.rst docs/hw-vuln: Update desc of best effort mode 2023-10-10 13:35:55 -06:00