public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] x86/cpu: Disable FRED when PTI is forced on
@ 2026-04-21 16:31 Dave Hansen
  2026-04-21 16:58 ` Borislav Petkov
                   ` (4 more replies)
  0 siblings, 5 replies; 7+ messages in thread
From: Dave Hansen @ 2026-04-21 16:31 UTC (permalink / raw)
  To: linux-kernel
  Cc: Dave Hansen, Andy Lutomirski, Borislav Petkov, Gayatri Kammela,
	H. Peter Anvin, Ingo Molnar, Peter Zijlstra, stable,
	Thomas Gleixner, x86


From: Dave Hansen <dave.hansen@linux.intel.com>

FRED and PTI were never intended to work together. No FRED hardware is
vulnerable to Meltdown and all of it should have LASS anyway.
Nevertheless, if you boot a system with pti=on and fred=on, the kernel
tries to do what is asked of it and dies a horrible death on the first
attempt to run userspace (since it never switches to the user page
tables).

Disable FRED when PTI is forced on, and print a warning about it.

A quick brain dump about what a FRED+PTI implementation would look like
is below. I'm not sure it would make any sense to do it, but never say
never. All I know is that it's way too complicated to be worth it today.

<brain dump>
The SWITCH_TO_USER/KERNEL_CR3 bits are simple to fix (or at least we
have the assembly tools to do it already), as is sticking the FRED entry
text in .entry.text (it's not in there today).

The nasty part is the stacks. Today, the CPU pops into the kernel on
MSR_IA32_FRED_RSP0 which is normal old kernel memory and not mapped to
userspace. The hardware pushes gunk on to MSR_IA32_FRED_RSP0, which is
currently the task stacks. MSR_IA32_FRED_RSP0 would need to point
elsewhere, probably cpu_entry_stack(). Then, start playing games with
stacks on entry/exit, including copying gunk to and from the task stack.

While I'd *like* to have PTI everywhere, I'm not sure it's worth mucking
up the FRED code with PTI kludges. If a user wants fast entry/exit, they
use FRED. If you want PTI (and sekuritay), you certainly don't care
about fast entry and FRED isn't going to help you *all* that much, so
you can just stay with the IDT.

Plus, FRED hardware should have LASS which gives you a similar security
profile to PTI without the CR3 munging.
</brain dump>

Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Reported-by: Gayatri Kammela <Gayatri.Kammela@amd.com>
Cc: stable@vger.kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@kernel.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: x86@kernel.org
Cc: "H. Peter Anvin" <hpa@zytor.com>
---

 b/arch/x86/mm/pti.c |    5 +++++
 1 file changed, 5 insertions(+)

diff -puN arch/x86/mm/pti.c~fred-vs-kpti arch/x86/mm/pti.c
--- a/arch/x86/mm/pti.c~fred-vs-kpti	2026-04-21 08:37:01.124709928 -0700
+++ b/arch/x86/mm/pti.c	2026-04-21 08:41:11.219700206 -0700
@@ -105,6 +105,11 @@ void __init pti_check_boottime_disable(v
 		pr_debug("PTI enabled, disabling INVLPGB\n");
 		setup_clear_cpu_cap(X86_FEATURE_INVLPGB);
 	}
+
+	if (cpu_feature_enabled(X86_FEATURE_FRED)) {
+		pr_debug("PTI enabled, disabling FRED\n");
+		setup_clear_cpu_cap(X86_FEATURE_FRED);
+	}
 }
 
 static int __init pti_parse_cmdline(char *arg)
_

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2026-04-22 15:02 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-21 16:31 [PATCH] x86/cpu: Disable FRED when PTI is forced on Dave Hansen
2026-04-21 16:58 ` Borislav Petkov
2026-04-21 21:34 ` Maciej Wieczor-Retman
2026-04-21 22:16 ` [tip: x86/urgent] " tip-bot2 for Dave Hansen
2026-04-21 23:12 ` [PATCH] " H. Peter Anvin
2026-04-22 12:08 ` Andrew Cooper
2026-04-22 15:01   ` H. Peter Anvin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox