Kernel Hardening - security-misc

This was merged.


1 Like

How about Speculative Return Stack Overflow (SRSO) β€” The Linux Kernel documentation?

Quote https://www.kernel.org/doc/Documentation/admin-guide/kernel-parameters.txt

	spec_rstack_overflow=
			[X86] Control RAS overflow mitigation on AMD Zen CPUs

			off		- Disable mitigation
			microcode	- Enable microcode mitigation only
			safe-ret	- Enable sw-only safe RET mitigation (default)
			ibpb		- Enable mitigation by issuing IBPB on
					  kernel entry
			ibpb-vmexit	- Issue IBPB only on VMEXIT
					  (cloud-specific mitigation)

See also:

cat /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow
1 Like

TODO: Need to check if secureblue has hardening settings that we lack that would be applicable here too.

1 Like
2 Likes
1 Like

Thank you! Merged.

1 Like
1 Like

Update on CPU mitigations.

One area of discussion is the inclusion of gather_data_sampling=force which will disable AVX if the system does not have a suitable microcode update.

Given that we are already disabling SMT, also disabling AVX may potentially cripple older processors if the instruction set is utilised by users.

The exact performance implications of this parameter on older EOL CPUs depends on workloads but I personally do not have any suitable physical hardware to test this myself.

Similarly the impact of VMs may also be significant for the same reasons.

1 Like