Skip to content

Commit 3267cb6

Browse files
pa1guptahansendc
authored andcommitted
x86/lam: Disable ADDRESS_MASKING in most cases
Linear Address Masking (LAM) has a weakness related to transient execution as described in the SLAM paper[1]. Unless Linear Address Space Separation (LASS) is enabled this weakness may be exploitable. Until kernel adds support for LASS[2], only allow LAM for COMPILE_TEST, or when speculation mitigations have been disabled at compile time, otherwise keep LAM disabled. There are no processors in market that support LAM yet, so currently nobody is affected by this issue. [1] SLAM: https://download.vusec.net/papers/slam_sp24.pdf [2] LASS: https://lore.kernel.org/lkml/[email protected]/ [ dhansen: update SPECULATION_MITIGATIONS -> CPU_MITIGATIONS ] Signed-off-by: Pawan Gupta <[email protected]> Signed-off-by: Dave Hansen <[email protected]> Reviewed-by: Sohil Mehta <[email protected]> Acked-by: Kirill A. Shutemov <[email protected]> Cc:[email protected] Link: https://lore.kernel.org/all/5373262886f2783f054256babdf5a98545dc986b.1706068222.git.pawan.kumar.gupta%40linux.intel.com
1 parent ffd9584 commit 3267cb6

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

arch/x86/Kconfig

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2257,6 +2257,7 @@ config RANDOMIZE_MEMORY_PHYSICAL_PADDING
22572257
config ADDRESS_MASKING
22582258
bool "Linear Address Masking support"
22592259
depends on X86_64
2260+
depends on COMPILE_TEST || !CPU_MITIGATIONS # wait for LASS
22602261
help
22612262
Linear Address Masking (LAM) modifies the checking that is applied
22622263
to 64-bit linear addresses, allowing software to use of the

0 commit comments

Comments
 (0)