diff options
author | David Kaplan <david.kaplan@amd.com> | 2025-08-19 22:21:59 +0300 |
---|---|---|
committer | Borislav Petkov (AMD) <bp@alien8.de> | 2025-08-27 19:17:12 +0300 |
commit | 8b3641dfb6f902407495c63b9b64482b32319b66 (patch) | |
tree | d1600d31b705fbb376d4285e5ff27352a82af7b2 /tools/testing/selftests/bpf/prog_tests/prog_array_init.c | |
parent | c2415c407a2cde01290d52ce2a1f81b0616379a3 (diff) | |
download | linux-8b3641dfb6f902407495c63b9b64482b32319b66.tar.xz |
x86/bugs: Add attack vector controls for SSB
Attack vector controls for SSB were missed in the initial attack vector series.
The default mitigation for SSB requires user-space opt-in so it is only
relevant for user->user attacks. Check with attack vector controls when
the command is auto - i.e., no explicit user selection has been done.
Fixes: 2d31d2874663 ("x86/bugs: Define attack vectors relevant for each bug")
Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/20250819192200.2003074-5-david.kaplan@amd.com
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions