android_kernel_xiaomi_sm8350/Documentation/admin-guide/hw-vuln
Kim Phillips fa24c1a49d x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled
commit fd470a8beed88440b160d690344fbae05a0b9b1b upstream.

Unlike Intel's Enhanced IBRS feature, AMD's Automatic IBRS does not
provide protection to processes running at CPL3/user mode, see section
"Extended Feature Enable Register (EFER)" in the APM v2 at
https://bugzilla.kernel.org/attachment.cgi?id=304652

Explicitly enable STIBP to protect against cross-thread CPL3
branch target injections on systems with Automatic IBRS enabled.

Also update the relevant documentation.

Fixes: e7862eda309e ("x86/cpu: Support AMD Automatic IBRS")
Reported-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20230720194727.67022-1-kim.phillips@amd.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-04-13 12:51:32 +02:00
..
gather_data_sampling.rst Documentation/x86: Fix backwards on/off logic about YMM support 2023-08-08 19:56:36 +02:00
index.rst x86/speculation: Add Gather Data Sampling mitigation 2023-08-08 19:56:35 +02:00
l1tf.rst docs: admin-guide: add a series of orphaned documents 2019-07-15 11:03:02 -03:00
mds.rst x86/speculation: Fix incorrect MDS/TAA mitigation status 2019-11-29 10:09:46 +01:00
multihit.rst Documentation: Add ITLB_MULTIHIT documentation 2019-11-04 20:26:00 +01:00
processor_mmio_stale_data.rst x86/bugs: Add "unknown" reporting for MMIO Stale Data 2022-09-05 10:27:45 +02:00
special-register-buffer-data-sampling.rst x86/speculation: Add Ivy Bridge to affected list 2020-06-10 20:24:58 +02:00
spectre.rst x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled 2024-04-13 12:51:32 +02:00
tsx_async_abort.rst x86/speculation: Fix incorrect MDS/TAA mitigation status 2019-11-29 10:09:46 +01:00