Received: by 2002:a05:7412:6592:b0:d7:7d3a:4fe2 with SMTP id m18csp2563135rdg; Mon, 14 Aug 2023 06:38:11 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEspQa6phlwrqvFJMJ57lgLrLbyp0JcRB7tEvY7BUmQIN5PZCug+p0/I3o6jT/iGlHgrWik X-Received: by 2002:a17:90b:1e4d:b0:267:f8a2:300a with SMTP id pi13-20020a17090b1e4d00b00267f8a2300amr6356544pjb.7.1692020290937; Mon, 14 Aug 2023 06:38:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692020290; cv=none; d=google.com; s=arc-20160816; b=LvPyzC+tJLeg61O0Nmj6Mptm8gRy+VNrUfuFM5Bq6rFaG/7XfzlH2izYApOK45WYby iN3kwcnw8aauVa/fUf97MISuT2nORHuTScwh2twPw+aSvYeLqsXm8sS3d1GN1+8nJz5J +tar1XPOPlQ51QOPDFNRtesS8nk47Lh+X7mAnHnUmdQajA+i5qwWsRU5qutJP387E0YG etgFEs2Lgnkivyb+UfI3u6AlNJDKbNksN464of1tx6WZDwBqnxq0KKw5uElsdwXQlaR7 tqz3tYB5nGrNpAJ3YglAamTWPpEZWPKY9rC5d0j6Avt5rJpdf4AD/ISnvC6Po0g/L6Q3 QNRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:date:message-id:autocrypt:from:references:cc:to :subject:dkim-signature; bh=GPof4EdKgMmvyi7WtVwBA65TF/30DyeXTjxNc7Ahtgw=; fh=cn2nHx8EtSS/iML1RZUz/8wDwD1src3Y+HQ56NLwHFM=; b=hDLM3En5fYs+jh8cVR1OZolOgGCG/JHS6ooY39TA//D6XBjezoDV/IyOH5Qo9Z7LSW JGnBJzLmM/UA4L+phlFgLcpjtUNvkQtidLFR1P4fwYAkGnIPuU2+4tSt++PvFmWWQKOi rzvqfY3U5HzeRMoHsxitoQqjHJguu3B2LJZhDECmKW+/+FtCb3OTP2jyl9wIUwomY/Ja svDvXQJrWVKOUnxo6UNl63ohC26lWa+3lv7P85/HkwAtXupYIagYjTrmB5oLnU8qomXi SM/0E/xvxj7JjMFdFlcwq8IEOVs4mrVSyJY8CUj06iQkO89bn0JRHXMk9ELayoOoGLri atbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mailbox.org header.s=mail20150812 header.b="QOBYNh/o"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=mailbox.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nl18-20020a17090b385200b002691e659560si10820479pjb.163.2023.08.14.06.37.58; Mon, 14 Aug 2023 06:38:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@mailbox.org header.s=mail20150812 header.b="QOBYNh/o"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=mailbox.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234332AbjHNLWT (ORCPT + 99 others); Mon, 14 Aug 2023 07:22:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42414 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232041AbjHNLVr (ORCPT ); Mon, 14 Aug 2023 07:21:47 -0400 Received: from mout-p-201.mailbox.org (mout-p-201.mailbox.org [IPv6:2001:67c:2050:0:465::201]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE99DFA for ; Mon, 14 Aug 2023 04:21:45 -0700 (PDT) Received: from smtp102.mailbox.org (smtp102.mailbox.org [10.196.197.102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-201.mailbox.org (Postfix) with ESMTPS id 4RPX6G0yH2z9sbl; Mon, 14 Aug 2023 13:21:42 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mailbox.org; s=mail20150812; t=1692012102; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=GPof4EdKgMmvyi7WtVwBA65TF/30DyeXTjxNc7Ahtgw=; b=QOBYNh/oovsWwu8rM4hzdngQm2+7ZfASOLJfCygfP+X1j8ij/gv0Gom2axD8E+Sj848/OP mcGT63bauZe6HLYC4gNjvXC+2Dq3olRxfay/dzoMvV/6GwDtcaII6GoTWE7wh2TA6LlAa1 R7nWQXc4KYuv8gau6rmzwZSQmPN16c5VZ76USDBUQ7h4PYmJ7/vXBhQkanYM+XzSrVXzSO ky5O6jf35HQHfLT4DeRdthts7ulz01DP6V391u9d3KNoKIJKD+Zr3ihZ7k+yN/JXVdg21K yXP642/0uhwy8+WFPoA6Qw9ZxXsiMXIq2n1QHqRuMf8u1/Z1c9/PrBw0d0rdVQ== Subject: Re: Does srso safe RET mitigation require microcode update? To: Borislav Petkov Cc: Xi Ruoyao , x86@kernel.org, linux-kernel@vger.kernel.org, Ken Moffat References: <79c179acaa6ec4e1cf112ae2dfce8370694a5089.camel@xry111.site> <20230814091012.GAZNnvdD6JX/4E679D@fat_crate.local> <0338eb8b-6b60-313c-e6eb-faca071c5227@mailbox.org> <20230814101134.GBZNn91uTmNImxRDXr@fat_crate.local> From: Rainer Fiebig Autocrypt: addr=jrf@mailbox.org; prefer-encrypt=mutual; keydata= mQINBFohwNMBEADSyoSeizfx3D4yl2vTXfNamkLDCuXDN+7P5/UbB+Kj/d4RTbA/w0fqu3S3 Kdc/mff99ypi59ryf8VAwd3XM19beUrDZVTU1/3VHn/gVYaI0/k7cnPpEaOgYseemBX5P2OV ZE/MjfQrdxs80ThMqFs2dV1eHnDyNiI3FRV8zZ5xPeOkwvXakAOcWQA7Jkxmdc3Zmc1s1q8p ZWz77UQ5RRMUFw7Z9l0W1UPhOwr/sBPMuKQvGdW+eui3xOpMKDYYgs7uN4Ftg4vsiMEo03i5 qrK0mfueA73NADuVIf9cB2STDywF/tF1I27r+fWns1x9j/hKEPOAf4ACrNUdwQ9qzu7Nj9rz 2WU8sjneqiiED2nKdzV0gDnFkvXY9HCFZR2YUC2BZNvLiUJ1PROFDdNxmdbLZAKok17mPyOR MU0VQ61+PNjS8nsnAml8jnpzpcvLcQxR7ejRAV6w+Dc7JwnuQOiPS6M7x5FTk3QTPL+rvLFJ 09Nb3ooeIQ/OUQoeM7pW8ll8Tmu2qSAJJ+3O002ADRVU1Nrc9tM5Ry9ht5zjmsSnFcSe2GoJ Knu1hyXHDAvcq/IffOwzdeVstdhotBpf058jlhFlfnaqXcOaaHZrlHtrKOfQQZrxXMfcrvyv iE2yhO8lUpoDOVuC1EhSidLd/IkCyfPjfIEBjQsQts7lepDgpQARAQABtB9SYWluZXIgRmll YmlnIDxqcmZAbWFpbGJveC5vcmc+iQJWBBMBCABAAhsjBwsJCAcDAgEGFQgCCQoLBBYCAwEC HgECF4AWIQTrLHk+ME24YHaolcbw4fcmJYr49QUCYVlg+QUJGnvH3QAKCRDw4fcmJYr49Wta EADHXEnPxIsw5dM0Brphds0y12D0YGc2fBuTeyEDltuJIJNNLkzRw3wTOJ/muUHePlyWQigf cTieAP4UZmZkR+HtZdbasop+cIqjNrjeU1i+aiNaDf/j6JMKaXVtaXfTbwA0DFJ2olS7Ito/ v7WPf5zJa7BnWFa5VbMQw2T68gOGpMuQky9se58ylQcpjBD2QVJiL5w36JTZpG84GfvQnFdl Fu9dh6/bYDUiTVYWbWCYNoDiEam3GEgsPxWMyb2R9nkBDEUKp9jDxu/iJl5nbX2+hoLDcD7v zM+sEeXLgwn5OyRxKiFYLAaNPUow+J8JG7NUWHVvuHtiu4ykNfoIghyxPENs5N/nndJt5KDq kWHlXhJOyC6eDCt/47Ylykau/bDlfrmgfoEoLt8X59sZaQAgkV0yjrPl4bEW61eGvcjracj5 lsDP15MITm+OND3LLSg9Jxz8LOYs6enLxy7OmFIJF685XDhtDdvGSVCbdB4Ndhygw8HiDxnZ hh4ByX+N/v60g3IdoFXc7v8GIDMTtSukOwKlm44jENcFZBjjC518OH1ugLcbnR/f+vT9L7tO fDNahD1nrLNsOtZKkW1Ieztl7EEz8IUZzjMqXuEWSEZn0luE8j6FnuTr1JId8WL9AqM/vcVY /UN8v4d4bUvjQ2+k0U3aMsumw+Y5PUsiFfy+gLkCDQRaIcDTARAAwhbtQAUmZG/rkpR/6/xr 7jRqi5Z3M5LZNw4lW9k4nBpQDAP/rLVuREnz/upm314P9i5iN9g2wsbReZBJ9KiUxT39KD5p 99KZGIH0elgZy+nDnb3oQLbtAr8+ox1ThOyOEJ7iX378txc1JD9IWJuv6YLMlkXa4ZuuAMCq KUvCChEjcHhZ+Ecb8OX8GwIKUoklWhoHR7OcMqAkjdhA698FkWNkgIeqMiTN/hBJ9u010ZeB 82ibDAKSMetMRxflCwThrVrfrOr5+ZkJvoN5r+Jy1ulk8OOnDOjvqXoUcee5zdloZymeY3f7 zebddvPmuiR0qXX0KYeSbhNF1GugLgbYeU2ev0nZ74F6vTwLUraRjKUzk0bq6SELlNMriS2x Wj7zDB2XtzUdTHPYSgFDKGYxRqiM7KJbheCL7gD1wxUGRf14yJISXmDX/fZhsFrZ/NF3UqxJ nLCz9lqyMCvT8prJjlAQu0zcFcrGAYVBNeJMAKlukMllRMgWdSLmJQiDC5JMaXoEeXdGpIv8 LgH+yU3tkKjXvkjwGywcXuL28ZScap3iJj08B8HWHmlL5b3pCkZv1w87SSF+FarrWl4F4u4U j+u2r7/NEZVmJ0GpNHNwkYFQiX1Coky6+Ga1/gXUBP6grI9eZOMD+qtsJC1JVPY8VIsjq/47 R1tBTKoiANQ/M+MAEQEAAYkCPAQYAQgAJgIbDBYhBOsseT4wTbhgdqiVxvDh9yYlivj1BQJh WuePBQkae8fdAAoJEPDh9yYlivj1GmsP/AwKF5WPyg3M1e7YPAYc3vsp2RQccnIjQ62MYxbz VWFs32GT0FyeIBzzT5aaVNyWzumNSyp51LC29AeqL/LXel9bUCzg3v0g5UutXAh9XYnWvgD6 12U4WlFUPmSVKz7B1kf9fwFfOUyRnT1Ayf91GDW9vTP2yWboXqelQdawa1Wl7G+C+unyuu3q OoPkNu65g6ZanO66ycXz6BDOlfCP7WPhcdyi85PuaJhXGbOysKS/m+tptS7XStqp+9Hvj1pj 3pajr5Nktufg3+QLQTj7iUowMnHdClY5d5c34gayzXHIZw9pSM4u4NStEGUTHk9JVRNd09A0 J3PzCngz9isv6Cdi7dZH4ivjOqXnD3Wq6Dwmu2RaBciQx8fuM58o6VBQ2cQa00QRT96UPWph G5BEGryzI0IxAmQtNDwneJx+jscGmMWvm4PkTViBnRcJtlJVO0lR5tWjscVG4TgBIo1M5qmi t0GfVUkS4E8AhVNtPG1Z5vl7JkfX3irc4ld58j1STfhLuos5l4X+7lRncpbYCsuk9rz1Bjh8 r/bUbqMkpj7m27JXi7cHIOtZ4up9O0O8WFdPpLRmy6GS67czo5dpV3CowY9LtZ0+0JmnUd59 kutl2mu4Qd3cGFbZB4J8J3p+wtsx7bujP38lQvmqpyGTUtyoGO9nOL0X5Xi95CAqapnE Message-ID: <9294eeed-e354-48e3-a0fe-8f917074ef8f@mailbox.org> Date: Mon, 14 Aug 2023 13:21:01 +0200 MIME-Version: 1.0 In-Reply-To: <20230814101134.GBZNn91uTmNImxRDXr@fat_crate.local> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-MBO-RS-META: d415p65yidbo8krp86au33yfxiaf5jk7 X-MBO-RS-ID: 4339c7495afae762f7c X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am 14.08.23 um 12:11 schrieb Borislav Petkov: > On Mon, Aug 14, 2023 at 11:47:54AM +0200, Rainer Fiebig wrote: >> "* 'Mitigation: safe RET': >> >> Software-only mitigation. It complements the extended IBPB microcode >> patch functionality by addressing User->Kernel and Guest->Host >> transitions protection." >> >> Now, what does that mean: partial mitigation or also no mitigation >> without microcode? > > It *complements*! Meaning, for a full safe RET mitigation, you need the > microcode on Zen3/4. > > Would that explain it better? > > "First of all, it is required that the latest microcode be loaded for > mitigations to be effective. That means that for the User->User > aspect of the mitigation to be effective, one needs the updated > microcode for Zen3 and Zen4 generations. In addition, one needs to > *enable* the User->User mitigation which is part of the spectre_v2_user > controls: > > - conditional IBPB: > > where each process can select whether it needs an IBPB issued around > it PR_SPEC_DISABLE/_ENABLE etc, see Spectre Side Channels. That is the > default setting > > - strict: > > i.e., always on - by supplying spectre_v2_user=on on the kernel > command line." > > IOW, without microcode, you do not mitigate the User->User aspect of the > mitigation but you mitigate the other vectors with safe RET. > OK, thanks. So I think a reasonable approach for ordinary users would be to update to the latest (LTS-) kernel, use the defaults for the mitigations and update to the new AGESA when available. Rainer