Linux Fixes Indirect Branch Predictor Barrier "IBPB" Handling For Older AMD CPUs

Written by Michael Larabel in AMD on 18 October 2024 at 10:42 AM EDT. 4 Comments
AMD
Merged today to Linux 6.12 Git were bug fixes to AMD's Indirect Branch Predictor Barrier (IBPB) handling that can be optionally used as part of the Retbleed and Speculative Return Stack Overflow (SRSO) mitigations on older AMD processors.

Indirect Branch Predictor Barriers are not used by default so the impact of this fixing is limited to those that opted into using IBPB for Retbleed/SRSO as part of the various mitigation kernel parameters. The impact is also just for AMD Zen 3 CPUs and older.

older AMD Ryzen CPU


AMD Linux engineer Borislav Petkov explained in today's x86 bugs merge:
"This fixes the IBPB implementation of older AMDs (< gen4) that do not flush the RSB (Return Address Stack) so you can still do some leaking when using a "=ibpb" mitigation for Retbleed or SRSO. Fix it by doing the flushing in software on those generations.

IBPB is not the default setting so this is not likely to affect anybody in practice."

So for anyone running on an older AMD processor and opted into using IBPB for the Retbleed/SRSO mitigations, the fixed-up proper handling is now in Linux 6.12 Git and should be back-ported to the stable kernel versions over the coming days.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week