linux/Documentation/admin-guide/hw-vuln
David Kaplan 1caa1b0509 Documentation/x86: Document new attack vector controls
Document the 5 new attack vector command line options, how they
interact with existing vulnerability controls, and recommendations on when
they can be disabled.

Note that while mitigating against untrusted userspace requires both
user-to-kernel and user-to-user protection, these are kept separate.  The
kernel can control what code executes inside of it and that may affect the
risk associated with vulnerabilities especially if new kernel mitigations
are implemented.  The same isn't typically true of userspace.

In other words, the risk associated with user-to-user or guest-to-guest
attacks is unlikely to change over time.  While the risk associated with
user-to-kernel or guest-to-host attacks may change.  Therefore, these
controls are separated.

Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/20250709155731.3279419-1-david.kaplan@amd.com
2025-07-11 17:51:43 +02:00
..
attack_vector_controls.rst Documentation/x86: Document new attack vector controls 2025-07-11 17:51:43 +02:00
core-scheduling.rst admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET 2024-04-24 13:04:27 -06:00
cross-thread-rsb.rst Documentation/hw-vuln: Fix rST warning 2023-02-15 07:24:23 -05:00
gather_data_sampling.rst Documentation/x86: Fix backwards on/off logic about YMM support 2023-08-01 15:28:24 -07:00
index.rst Documentation/x86: Document new attack vector controls 2025-07-11 17:51:43 +02:00
indirect-target-selection.rst Documentation: x86/bugs/its: Add ITS documentation 2025-05-09 13:22:04 -07:00
l1d_flush.rst
l1tf.rst
mds.rst docs/hw-vuln: Update desc of best effort mode 2023-10-10 13:35:55 -06:00
multihit.rst
old_microcode.rst x86/cpu: Help users notice when running old Intel microcode 2025-04-22 08:33:52 +02:00
processor_mmio_stale_data.rst x86/bugs: Rename MDS machinery to something more generic 2025-06-16 18:45:18 +02:00
reg-file-data-sampling.rst x86/rfds: Exclude P-only parts from the RFDS affected list 2025-03-19 11:17:23 +01:00
rsb.rst x86/bugs: Add RSB mitigation document 2025-04-09 12:42:09 +02:00
special-register-buffer-data-sampling.rst
spectre.rst x86/bugs: Remove duplicate Spectre cmdline option descriptions 2024-06-28 15:28:38 +02:00
srso.rst x86/bugs: KVM: Add support for SRSO_MSR_FIX 2025-02-26 15:13:06 +01:00
tsx_async_abort.rst docs/hw-vuln: Update desc of best effort mode 2023-10-10 13:35:55 -06:00