Message ID | 20230621202243.294012-1-cascardo@canonical.com |
---|---|
Headers | show |
Series | CVE-2022-27672 | expand |
On 6/21/23 2:22 PM, Thadeu Lima de Souza Cascardo wrote: > [Impact] > A VM may force the CPU to go to idle and when it gets back from idle, it > could leverage the RSB from a sibling thread to mount a speculative > execution attack. > > [Backport] > Simple conflicts and the placement of setting mitigate_smt_rsb. > > [Potential regression] > It would affect VMs, specially when dealing with idleness. > > Tom Lendacky (3): > x86/speculation: Identify processors vulnerable to SMT RSB predictions > KVM: x86: Mitigate the cross-thread return address predictions bug > Documentation/hw-vuln: Add documentation for Cross-Thread Return > Predictions > > .../admin-guide/hw-vuln/cross-thread-rsb.rst | 92 +++++++++++++++++++ > Documentation/admin-guide/hw-vuln/index.rst | 1 + > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/kernel/cpu/common.c | 9 +- > arch/x86/kvm/x86.c | 44 ++++++--- > 5 files changed, 134 insertions(+), 13 deletions(-) > create mode 100644 Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst > Acked-by: Tim Gardner <tim.gardner@canonical.com>
On 23-06-21 17:22:40, Thadeu Lima de Souza Cascardo wrote: > [Impact] > A VM may force the CPU to go to idle and when it gets back from idle, it > could leverage the RSB from a sibling thread to mount a speculative > execution attack. > > [Backport] > Simple conflicts and the placement of setting mitigate_smt_rsb. > > [Potential regression] > It would affect VMs, specially when dealing with idleness. > > Tom Lendacky (3): > x86/speculation: Identify processors vulnerable to SMT RSB predictions > KVM: x86: Mitigate the cross-thread return address predictions bug > Documentation/hw-vuln: Add documentation for Cross-Thread Return > Predictions Acked-by: Cengiz Can <cengiz.can@canonical.com> > > .../admin-guide/hw-vuln/cross-thread-rsb.rst | 92 +++++++++++++++++++ > Documentation/admin-guide/hw-vuln/index.rst | 1 + > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/kernel/cpu/common.c | 9 +- > arch/x86/kvm/x86.c | 44 ++++++--- > 5 files changed, 134 insertions(+), 13 deletions(-) > create mode 100644 Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst > > -- > 2.34.1 > > > -- > kernel-team mailing list > kernel-team@lists.ubuntu.com > https://lists.ubuntu.com/mailman/listinfo/kernel-team
On 23/06/21 05:22PM, Thadeu Lima de Souza Cascardo wrote: > [Impact] > A VM may force the CPU to go to idle and when it gets back from idle, it > could leverage the RSB from a sibling thread to mount a speculative > execution attack. > > [Backport] > Simple conflicts and the placement of setting mitigate_smt_rsb. > > [Potential regression] > It would affect VMs, specially when dealing with idleness. > > Tom Lendacky (3): > x86/speculation: Identify processors vulnerable to SMT RSB predictions > KVM: x86: Mitigate the cross-thread return address predictions bug > Documentation/hw-vuln: Add documentation for Cross-Thread Return > Predictions > > .../admin-guide/hw-vuln/cross-thread-rsb.rst | 92 +++++++++++++++++++ > Documentation/admin-guide/hw-vuln/index.rst | 1 + > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/kernel/cpu/common.c | 9 +- > arch/x86/kvm/x86.c | 44 ++++++--- > 5 files changed, 134 insertions(+), 13 deletions(-) > create mode 100644 Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst Acked-by: Andrei Gherzan <andrei.gherzan@canonical.com>
Applied to focal:linux master-next, Thanks! - Luke On Wed, Jun 21, 2023 at 1:24 PM Thadeu Lima de Souza Cascardo < cascardo@canonical.com> wrote: > [Impact] > A VM may force the CPU to go to idle and when it gets back from idle, it > could leverage the RSB from a sibling thread to mount a speculative > execution attack. > > [Backport] > Simple conflicts and the placement of setting mitigate_smt_rsb. > > [Potential regression] > It would affect VMs, specially when dealing with idleness. > > Tom Lendacky (3): > x86/speculation: Identify processors vulnerable to SMT RSB predictions > KVM: x86: Mitigate the cross-thread return address predictions bug > Documentation/hw-vuln: Add documentation for Cross-Thread Return > Predictions > > .../admin-guide/hw-vuln/cross-thread-rsb.rst | 92 +++++++++++++++++++ > Documentation/admin-guide/hw-vuln/index.rst | 1 + > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/kernel/cpu/common.c | 9 +- > arch/x86/kvm/x86.c | 44 ++++++--- > 5 files changed, 134 insertions(+), 13 deletions(-) > create mode 100644 Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst > > -- > 2.34.1 > > > -- > kernel-team mailing list > kernel-team@lists.ubuntu.com > https://lists.ubuntu.com/mailman/listinfo/kernel-team >