On Sun, Nov 25, 2018 at 07:33:33PM +0100, Thomas Gleixner wrote:
> If enhanced IBRS is active, STIBP is redundant for mitigating Spectre v2
> user space exploits from hyperthread sibling.
> 
> Disable STIBP when enhanced IBRS is used.
Reviewed-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>

Thank you!
> 
> Signed-off-by: Tim Chen <tim.c.c...@linux.intel.com>
> Signed-off-by: Thomas Gleixner <t...@linutronix.de>
> 
> ---
>  arch/x86/kernel/cpu/bugs.c |    7 +++++++
>  1 file changed, 7 insertions(+)
> 
> --- a/arch/x86/kernel/cpu/bugs.c
> +++ b/arch/x86/kernel/cpu/bugs.c
> @@ -321,6 +321,10 @@ static bool stibp_needed(void)
>       if (spectre_v2_enabled == SPECTRE_V2_NONE)
>               return false;
>  
> +     /* Enhanced IBRS makes using STIBP unnecessary. */
> +     if (spectre_v2_enabled == SPECTRE_V2_IBRS_ENHANCED)
> +             return false;
> +
>       if (!boot_cpu_has(X86_FEATURE_STIBP))
>               return false;
>  
> @@ -846,6 +850,9 @@ static ssize_t l1tf_show_state(char *buf
>  
>  static char *stibp_state(void)
>  {
> +     if (spectre_v2_enabled == SPECTRE_V2_IBRS_ENHANCED)
> +             return "";
> +
>       if (x86_spec_ctrl_base & SPEC_CTRL_STIBP)
>               return ", STIBP";
>       else
> 
> 

Reply via email to