A Tentative Linux Kernel Patch For Able AMD CPUs To Address Spectre V4 / SSBD

Written by Michael Larabel in Linux Security on 5 June 2018 at 05:41 PM EDT. Add A Comment
LINUX SECURITY
Linux kernel developer veteran Konrad Rzeszutek Wilk at Oracle has posted a set of experimental/debug patches for dealing with AMD "Speculative Store Bypass Disable" (SSBD) support for mitigating the Spectre Variant Four vulnerability.

This set of three kernel patches is for dealing with two new published bits for indicating when Speculative Store Bypass Disable (SSBD) isn't needed anymore for future generations of mitigated CPUs and the MSR to set for toggling the SSB behavior on AMD processors. The SPEC_CTL MSR 48h bit will only be present on future generations of AMD CPUs while there is also a new VIRT_SPEC_CTRL MSR for keeping the processor from speculating around older stores. Presumably the VIRT_SPEC_CTRL will be introduced in an upcoming microcode update.

Konrad has sent out the tentative patches for making use of these new bits albeit hasn't seen any actual testing yet.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week