]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled
authorKim Phillips <kim.phillips@amd.com>
Thu, 20 Jul 2023 19:47:27 +0000 (14:47 -0500)
committerBorislav Petkov (AMD) <bp@alien8.de>
Sat, 22 Jul 2023 16:04:22 +0000 (18:04 +0200)
commitfd470a8beed88440b160d690344fbae05a0b9b1b
tree2355c8b0ee8742bf5c8c5f121450734bb3bf97e0
parent3ba2e83334bed2b1980b59734e6e84dfaf96026c
x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled

Unlike Intel's Enhanced IBRS feature, AMD's Automatic IBRS does not
provide protection to processes running at CPL3/user mode, see section
"Extended Feature Enable Register (EFER)" in the APM v2 at
https://bugzilla.kernel.org/attachment.cgi?id=304652

Explicitly enable STIBP to protect against cross-thread CPL3
branch target injections on systems with Automatic IBRS enabled.

Also update the relevant documentation.

Fixes: e7862eda309e ("x86/cpu: Support AMD Automatic IBRS")
Reported-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20230720194727.67022-1-kim.phillips@amd.com
Documentation/admin-guide/hw-vuln/spectre.rst
arch/x86/kernel/cpu/bugs.c