linux/Documentation
Kim Phillips bb8cc9c343 x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled
commit fd470a8beed88440b160d690344fbae05a0b9b1b upstream.

Unlike Intel's Enhanced IBRS feature, AMD's Automatic IBRS does not
provide protection to processes running at CPL3/user mode, see section
"Extended Feature Enable Register (EFER)" in the APM v2 at
https://bugzilla.kernel.org/attachment.cgi?id=304652

Explicitly enable STIBP to protect against cross-thread CPL3
branch target injections on systems with Automatic IBRS enabled.

Also update the relevant documentation.

Fixes: e7862eda309e ("x86/cpu: Support AMD Automatic IBRS")
Reported-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20230720194727.67022-1-kim.phillips@amd.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-04-13 12:50:11 +02:00
..
2018-04-11 10:28:39 -07:00
2018-09-26 18:11:23 +02:00
2023-06-21 15:39:57 +02:00
2018-03-06 17:26:15 +01:00
2018-03-26 12:13:21 -04:00
2018-03-01 17:32:14 +01:00
2023-06-21 15:39:57 +02:00
2021-05-22 10:59:50 +02:00
2018-07-07 17:27:13 +02:00
2018-03-26 15:57:04 +02:00
2018-05-08 09:16:41 -06:00