You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Merge tag 'x86_bugs_for_v5.17' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 spectre fixes from Borislav Petkov:
- Mitigate Spectre v2-type Branch History Buffer attacks on machines
which support eIBRS, i.e., the hardware-assisted speculation
restriction after it has been shown that such machines are vulnerable
even with the hardware mitigation.
- Do not use the default LFENCE-based Spectre v2 mitigation on AMD as
it is insufficient to mitigate such attacks. Instead, switch to
retpolines on all AMD by default.
- Update the docs and add some warnings for the obviously vulnerable
cmdline configurations.
* tag 'x86_bugs_for_v5.17' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
x86/speculation: Warn about Spectre v2 LFENCE mitigation
x86/speculation: Update link to AMD speculation whitepaper
x86/speculation: Use generic retpoline by default on AMD
x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
Documentation/hw-vuln: Update spectre doc
x86/speculation: Add eIBRS + Retpoline options
x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376
391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -583,12 +598,13 @@ kernel command line.
583
598
584
599
Specific mitigations can also be selected manually:
585
600
586
-
retpoline
587
-
replace indirect branches
588
-
retpoline,generic
589
-
google's original retpoline
590
-
retpoline,amd
591
-
AMD-specific minimal thunk
601
+
retpoline auto pick between generic,lfence
602
+
retpoline,generic Retpolines
603
+
retpoline,lfence LFENCE; indirect branch
604
+
retpoline,amd alias for retpoline,lfence
605
+
eibrs enhanced IBRS
606
+
eibrs,retpoline enhanced IBRS + Retpolines
607
+
eibrs,lfence enhanced IBRS + LFENCE
592
608
593
609
Not specifying this option is equivalent to
594
610
spectre_v2=auto.
@@ -599,7 +615,7 @@ kernel command line.
599
615
spectre_v2=off. Spectre variant 1 mitigations
600
616
cannot be disabled.
601
617
602
-
For spectre_v2_user see :doc:`/admin-guide/kernel-parameters`.
618
+
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
603
619
604
620
Mitigation selection guide
605
621
--------------------------
@@ -681,7 +697,7 @@ AMD white papers:
681
697
682
698
.. _spec_ref6:
683
699
684
-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
700
+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
0 commit comments