Lines Matching full:its
3 Indirect Target Selection (ITS)
6 ITS is a vulnerability in some Intel CPUs that support Enhanced IBRS and were
7 released before Alder Lake. ITS may allow an attacker to control the prediction
10 ITS is assigned CVE-2024-28956 with a CVSS score of 4.7 (Medium).
28 Below is the list of ITS affected CPUs [#f2]_ [#f3]_:
48 - IBPB isolation is affected on all ITS affected CPUs, and need a microcode
53 - Intel Atom CPUs are not affected by ITS.
58 in the lower half of the cacheline are vulnerable to ITS, the basic idea behind
62 compilers. ITS-vulnerable retpoline sites are runtime patched to point to newly
63 added ITS-safe thunks. These safe thunks consists of indirect branch in the
65 a retpoline site is evaluated to be ITS-safe, it is replaced with an inline
88 Retpoline sequence also mitigates ITS-unsafe indirect branches. For this
89 reason, when retpoline is enabled, ITS mitigation only relocates the RETs to
95 attacks. And it also mitigates RETs that are vulnerable to ITS.
99 All guests deploy ITS mitigation by default, irrespective of eIBRS enumeration
106 a guest sees this bit set, it should not enumerate the ITS bug. Note, this bit
112 The ITS mitigation can be controlled using the "indirect_target_selection"
121 off Disable ITS mitigation.
124 part of ITS. Otherwise, mitigation is not deployed. This option is
131 ITS.
133 force Force the ITS bug and deploy the default mitigation.
139 The sysfs file showing ITS mitigation status is: