News: 0001565864

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Attack Vector Controls Land In Linux 6.17 To Better Control CPU Security Mitigations

([Linux Security] 6 Hours Ago Linux Attack Vector Controls)


The [1]Attack Vector Controls work is now in Linux 6.17 for those new tuning knobs worked on by AMD engineer David Kaplan to make it more straight-forward for Linux server administrators and power users to more easily select the CPU security mitigations relevant to their system(s) and intended workloads.

The [2]x86/bugs merge request landed this week and with it comes an untangling of the Retbleed code from the ITS Training Solo mitigation on Intel CPUs, in order to allow enabling ITS stuffing separate from the Retbleed mitigation. The Speculative Return Stack Overflow (SRSO) mitigation code was also simplified. Most notable though was getting the rest of the Attack Vector Controls code merged.

Attack Vector Controls makes it easier for everyone from Linux power users to server fleet administrators to manage the increasingly confusing mess of different CPU security mitigations. Rather than needing to manage CPU security mitigations on an individual basis and keeping up with each new mitigation introduced moving forward, Attack Vector Controls classifies them into different categories that users can opt-in / opt-out of particular categories of mitigations. The hope is this will help users stay protected to mitigations relevant to them but otherwise restoring performance by disabling mitigations not relevant to their use.

The Attack Vector Controls are categorized currently into user-to-kernel, user-to-user, guest-to-host, guest-to-guest, and cross-thread vulnerabilities. From there with the mitigations= kernel boot parameter different combinations can be passed for no_user_kernel, no_user_user, no_guest_host, no_guest_guest, and no_cross_thread options for disabling the respective classes of mitigations. Multiple classes can be disabled via comma separation.

More details on the Attack Vector Controls tuning available with Linux 6.17 can be found via the [3]kernel documentation .



[1] https://www.phoronix.com/search/Attack+Vector+Controls

[2] https://lore.kernel.org/lkml/20250728145504.GAaIePSCpIIIRnc0U-@fat_crate.local/

[3] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/attack_vector_controls.rst?id=04d29e3609b62896b94b60250d475f8f7c15db98



hamishmb

pWe00Iri3e7Z9lHOX2Qx

the-burrito-triangle

Watch Rincewind.

Look at him. Scrawny, like most wizards, and clad in a dark red robe on
which a few mystic sigils were embroidered in tarnished sequins. Some might
have taken him for a mere apprentice enchanter who had run away from his
master out of defiance, boredom, fear and a lingering taste for
heterosexuality. Yet around his neck was a chain bearing the bronze octagon
that marked him as an alumnus of Unseen University, the high school of magic
whose time-and-space transcendent campus is never precisely Here or There.
Graduates were usually destined for mageship at least, but Rincewind--after
an unfortunate event--had left knowing only one spell and made a living of
sorts around the town by capitalizing on an innate gift for languages. He
avoided work as a rule, but had a quickness of wit that put his
acquaintances in mind of a bright rodent.
-- Terry Pratchett, "The Colour of Magic"