This is a note to let you know that I've just added the patch titled x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n to the 4.19-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: x86-speculation-fix-rsb-filling-with-config_retpoline-n.patch and it can be found in the queue-4.19 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From stable-owner@xxxxxxxxxxxxxxx Thu Nov 17 10:22:17 2022 From: Suleiman Souhlal <suleiman@xxxxxxxxxx> Date: Thu, 17 Nov 2022 18:19:38 +0900 Subject: x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n To: stable@xxxxxxxxxxxxxxx Cc: x86@xxxxxxxxxx, kvm@xxxxxxxxxxxxxxx, bp@xxxxxxxxx, pbonzini@xxxxxxxxxx, peterz@xxxxxxxxxxxxx, jpoimboe@xxxxxxxxxx, cascardo@xxxxxxxxxxxxx, surajjs@xxxxxxxxxx, ssouhlal@xxxxxxxxxxx, suleiman@xxxxxxxxxx Message-ID: <20221117091952.1940850-21-suleiman@xxxxxxxxxx> From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx> commit b2620facef4889fefcbf2e87284f34dcd4189bce upstream. If a kernel is built with CONFIG_RETPOLINE=n, but the user still wants to mitigate Spectre v2 using IBRS or eIBRS, the RSB filling will be silently disabled. There's nothing retpoline-specific about RSB buffer filling. Remove the CONFIG_RETPOLINE guards around it. Signed-off-by: Josh Poimboeuf <jpoimboe@xxxxxxxxxx> Signed-off-by: Peter Zijlstra (Intel) <peterz@xxxxxxxxxxxxx> Signed-off-by: Borislav Petkov <bp@xxxxxxx> Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx> Signed-off-by: Suleiman Souhlal <suleiman@xxxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- arch/x86/entry/entry_32.S | 2 -- arch/x86/entry/entry_64.S | 2 -- arch/x86/include/asm/nospec-branch.h | 2 -- 3 files changed, 6 deletions(-) --- a/arch/x86/entry/entry_32.S +++ b/arch/x86/entry/entry_32.S @@ -643,7 +643,6 @@ ENTRY(__switch_to_asm) movl %ebx, PER_CPU_VAR(stack_canary)+stack_canary_offset #endif -#ifdef CONFIG_RETPOLINE /* * When switching from a shallower to a deeper call stack * the RSB may either underflow or use entries populated @@ -652,7 +651,6 @@ ENTRY(__switch_to_asm) * speculative execution to prevent attack. */ FILL_RETURN_BUFFER %ebx, RSB_CLEAR_LOOPS, X86_FEATURE_RSB_CTXSW -#endif /* restore callee-saved registers */ popfl --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -367,7 +367,6 @@ ENTRY(__switch_to_asm) movq %rbx, PER_CPU_VAR(irq_stack_union)+stack_canary_offset #endif -#ifdef CONFIG_RETPOLINE /* * When switching from a shallower to a deeper call stack * the RSB may either underflow or use entries populated @@ -376,7 +375,6 @@ ENTRY(__switch_to_asm) * speculative execution to prevent attack. */ FILL_RETURN_BUFFER %r12, RSB_CLEAR_LOOPS, X86_FEATURE_RSB_CTXSW -#endif /* restore callee-saved registers */ popfq --- a/arch/x86/include/asm/nospec-branch.h +++ b/arch/x86/include/asm/nospec-branch.h @@ -159,11 +159,9 @@ * monstrosity above, manually. */ .macro FILL_RETURN_BUFFER reg:req nr:req ftr:req -#ifdef CONFIG_RETPOLINE ALTERNATIVE "jmp .Lskip_rsb_\@", "", \ftr __FILL_RETURN_BUFFER(\reg,\nr,%_ASM_SP) .Lskip_rsb_\@: -#endif .endm #else /* __ASSEMBLY__ */ Patches currently in stable-queue which might be from stable-owner@xxxxxxxxxxxxxxx are queue-4.19/x86-speculation-disable-rrsba-behavior.patch queue-4.19/revert-x86-speculation-add-rsb-vm-exit-protections.patch queue-4.19/kvm-vmx-fix-ibrs-handling-after-vmexit.patch queue-4.19/kvm-vmx-prevent-guest-rsb-poisoning-attacks-with-eibrs.patch queue-4.19/x86-cpufeature-add-facility-to-check-for-min-microcode-revisions.patch queue-4.19/x86-bugs-keep-a-per-cpu-ia32_spec_ctrl-value.patch queue-4.19/x86-cpu-amd-enumerate-btc_no.patch queue-4.19/x86-speculation-fix-firmware-entry-spec_ctrl-handling.patch queue-4.19/x86-speculation-add-spectre_v2-ibrs-option-to-support-kernel-ibrs.patch queue-4.19/x86-cpu-add-consistent-cpu-match-macros.patch queue-4.19/x86-speculation-remove-x86_spec_ctrl_mask.patch queue-4.19/x86-bugs-add-cannon-lake-to-retbleed-affected-cpu-list.patch queue-4.19/x86-bugs-warn-when-ibrs-mitigation-is-selected-on-enhanced-ibrs-parts.patch queue-4.19/x86-speculation-fill-rsb-on-vmexit-for-ibrs.patch queue-4.19/x86-cpu-add-a-steppings-field-to-struct-x86_cpu_id.patch queue-4.19/x86-common-stamp-out-the-stepping-madness.patch queue-4.19/x86-bugs-split-spectre_v2_select_mitigation-and-spectre_v2_user_select_mitigation.patch queue-4.19/x86-bugs-report-intel-retbleed-vulnerability.patch queue-4.19/x86-speculation-change-fill_return_buffer-to-work-with-objtool.patch queue-4.19/x86-cpufeatures-move-retpoline-flags-to-word-11.patch queue-4.19/x86-speculation-fix-spec_ctrl-write-on-smt-state-change.patch queue-4.19/x86-bugs-optimize-spec_ctrl-msr-writes.patch queue-4.19/x86-bugs-report-amd-retbleed-vulnerability.patch queue-4.19/x86-speculation-fix-rsb-filling-with-config_retpoline-n.patch queue-4.19/x86-cpufeature-fix-various-quality-problems-in-the-asm-cpu_device_hd.h-header.patch queue-4.19/intel_idle-disable-ibrs-during-long-idle.patch queue-4.19/x86-speculation-use-declare_per_cpu-for-x86_spec_ctrl_current.patch queue-4.19/x86-entry-remove-skip_r11rcx.patch queue-4.19/x86-speculation-use-cached-host-spec_ctrl-value-for-guest-entry-exit.patch queue-4.19/x86-devicetable-move-x86-specific-macro-out-of-generic-code.patch queue-4.19/x86-bugs-add-amd-retbleed-boot-parameter.patch queue-4.19/x86-entry-add-kernel-ibrs-implementation.patch queue-4.19/revert-x86-cpu-add-a-steppings-field-to-struct-x86_cpu_id.patch queue-4.19/x86-speculation-add-rsb-vm-exit-protections.patch