freebsd-nq/sys/amd64
Ed Maste b3327f62f0 Enable KPTI by default on amd64 for non-AMD CPUs
Kernel Page Table Isolation (KPTI) was introduced in r328083 as a
mitigation for the 'Meltdown' vulnerability.  AMD CPUs are not affected,
per https://www.amd.com/en/corporate/speculative-execution:

    We believe AMD processors are not susceptible due to our use of
    privilege level protections within paging architecture and no
    mitigation is required.

Thus default KPTI to off for AMD CPUs, and to on for others.  This may
be refined later as we obtain more specific information on the sets of
CPUs that are and are not affected.

Submitted by:	Mitchell Horne
Reviewed by:	cem
Relnotes:	Yes
Security:	CVE-2017-5754
Sponsored by:	The FreeBSD Foundation
Differential Revision:	https://reviews.freebsd.org/D13971
2018-01-19 15:42:34 +00:00
..
acpica sys/amd64: further adoption of SPDX licensing ID tags. 2017-11-27 15:03:07 +00:00
amd64 Enable KPTI by default on amd64 for non-AMD CPUs 2018-01-19 15:42:34 +00:00
cloudabi32 Use TO_PTR() to convert integers to pointers. 2017-11-26 14:45:56 +00:00
cloudabi64 Use TO_PTR() to convert integers to pointers. 2017-11-26 14:45:56 +00:00
conf Move VM_NUMA_ALLOC and DEVICE_NUMA under the single global config option NUMA. 2018-01-14 03:36:03 +00:00
ia32 PTI for amd64. 2018-01-17 11:44:21 +00:00
include Use a dedicated per-CPU stack for machine check exceptions. 2018-01-18 23:50:21 +00:00
linux Disable vim syntax highlighting. 2017-11-28 18:23:17 +00:00
linux32 Disable vim syntax highlighting. 2017-11-28 18:23:17 +00:00
pci sys/amd64: further adoption of SPDX licensing ID tags. 2017-11-27 15:03:07 +00:00
sgx Fix module unload when SGX support is not present in CPU. 2017-08-18 14:47:06 +00:00
vmm Save and restore guest debug registers. 2018-01-17 23:11:25 +00:00
Makefile Bring the tags and links entries for amd64 up to date. 2015-10-27 22:59:24 +00:00