linux/Documentation/admin-guide/hw-vuln
David Kaplan 8b3641dfb6 x86/bugs: Add attack vector controls for SSB
Attack vector controls for SSB were missed in the initial attack vector series.
The default mitigation for SSB requires user-space opt-in so it is only
relevant for user->user attacks.  Check with attack vector controls when
the command is auto - i.e., no explicit user selection has been done.

Fixes: 2d31d28746 ("x86/bugs: Define attack vectors relevant for each bug")
Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/20250819192200.2003074-5-david.kaplan@amd.com
2025-08-27 18:17:12 +02:00
..
attack_vector_controls.rst x86/bugs: Add attack vector controls for SSB 2025-08-27 18:17:12 +02:00
core-scheduling.rst
cross-thread-rsb.rst
gather_data_sampling.rst
index.rst Documentation/x86: Document new attack vector controls 2025-07-11 17:51:43 +02:00
indirect-target-selection.rst Documentation: x86/bugs/its: Add ITS documentation 2025-05-09 13:22:04 -07:00
l1d_flush.rst
l1tf.rst
mds.rst
multihit.rst
old_microcode.rst x86/cpu: Help users notice when running old Intel microcode 2025-04-22 08:33:52 +02:00
processor_mmio_stale_data.rst x86/bugs: Rename MDS machinery to something more generic 2025-06-16 18:45:18 +02:00
reg-file-data-sampling.rst x86/rfds: Exclude P-only parts from the RFDS affected list 2025-03-19 11:17:23 +01:00
rsb.rst x86/bugs: Add RSB mitigation document 2025-04-09 12:42:09 +02:00
special-register-buffer-data-sampling.rst
spectre.rst
srso.rst x86/bugs: KVM: Add support for SRSO_MSR_FIX 2025-02-26 15:13:06 +01:00
tsx_async_abort.rst