News: 0001499079

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Linux Fixes Indirect Branch Predictor Barrier "IBPB" Handling For Older AMD CPUs

([AMD] 78 Minutes Ago IBPB)


Merged today to Linux 6.12 Git were bug fixes to AMD's Indirect Branch Predictor Barrier (IBPB) handling that can be optionally used as part of the Retbleed and Speculative Return Stack Overflow (SRSO) mitigations on older AMD processors.

Indirect Branch Predictor Barriers are not used by default so the impact of this fixing is limited to those that opted into using IBPB for Retbleed/SRSO as part of the various mitigation kernel parameters. The impact is also just for AMD Zen 3 CPUs and older.

[1]

AMD Linux engineer Borislav Petkov explained in today's [2]x86 bugs merge :

"This fixes the IBPB implementation of older AMDs (< gen4) that do not flush the RSB (Return Address Stack) so you can still do some leaking when using a "=ibpb" mitigation for Retbleed or SRSO. Fix it by doing the flushing in software on those generations.

IBPB is not the default setting so this is not likely to affect anybody in practice."

So for anyone running on an older AMD processor and opted into using IBPB for the Retbleed/SRSO mitigations, the fixed-up proper handling is now in Linux 6.12 Git and should be back-ported to the stable kernel versions over the coming days.



[1] https://www.phoronix.com/image-viewer.php?id=2024&image=amd_ibpb_fix_lrg

[2] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ade8ff3b6aca47c234e5353b1e9dc1e5a8f21ffe



Danny3

There are always alternatives.
-- Spock, "The Galileo Seven", stardate 2822.3