Message ID | 20221003131038.12645-1-cascardo@canonical.com (mailing list archive) |
---|---|
Headers | show
Return-Path: <kvm-owner@kernel.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0E219C433F5 for <kvm@archiver.kernel.org>; Mon, 3 Oct 2022 13:11:03 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229910AbiJCNLB (ORCPT <rfc822;kvm@archiver.kernel.org>); Mon, 3 Oct 2022 09:11:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58596 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229831AbiJCNK7 (ORCPT <rfc822;kvm@vger.kernel.org>); Mon, 3 Oct 2022 09:10:59 -0400 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2FA7F2B604; Mon, 3 Oct 2022 06:10:56 -0700 (PDT) Received: from quatroqueijos.. (unknown [179.93.174.77]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 8569742EBB; Mon, 3 Oct 2022 13:10:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1664802654; bh=pZq2v/Fr9QFxLOTWEDq1WB4VU4sCkAuj/nGLJx+itTg=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=XTpg/94iEmrq43Sntjf0xz2rx0LLEmosm4ljk9d6J9G1o0vPGrqTsO8B30MDnTmyL iEoJrSYiy9UdjYQohZWyKgGdNqRXNe8Fn2pKhMdyr/HbY9UoZPJBtD32EEDXeGH8/Y CG85pJAXtrl61BV8Qf52Qg5sFQpHC+jYuJHzuLRecTv1N+Ynj4cFINCRORlgm2QVWE cPsSj0cM76IzcnE/RMC/c1lZy6DkIXwkt9DoNixpTpZUuUYYB30aPW4BFV9Loxjonl IibReHs2leKzsvued1HqMhMA7dBb1LCSE8V19itBndQH8Ojc192DCPV6rXSG28ccmL DMOL1ticS5www== From: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> To: stable@vger.kernel.org Cc: x86@kernel.org, kvm@vger.kernel.org, bp@alien8.de, pbonzini@redhat.com, peterz@infradead.org, jpoimboe@kernel.org Subject: [PATCH 5.4 00/37] IBRS support // Retbleed mitigations Date: Mon, 3 Oct 2022 10:10:01 -0300 Message-Id: <20221003131038.12645-1-cascardo@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: <kvm.vger.kernel.org> X-Mailing-List: kvm@vger.kernel.org |
Series |
IBRS support // Retbleed mitigations
|
expand
|
On Mon, Oct 03, 2022 at 10:10:01AM -0300, Thadeu Lima de Souza Cascardo wrote: > This backport introduces IBRS support to 5.4.y in order to mitigate Retbleed on > Intel parts. Though some very small pieces for AMD have been picked up as well, > "UNRET" mitigations are not backported, nor IBPB. It is expected, though, that > the backport will report AMD systems as vulnerable or not affected, depending > on the parts and the BTC_NO bit. > > One note here is that the PBRSB mitigation was backported previously to the 5.4 > series, and this would have made things a little bit more complicated. So, I > reverted it and applied it later on. > > This has been boot-tested and smoke-tested on a bunch of AMD and Intel systems. Thank you for these, I've queued them up now and will do a -rc release with them to get some testing. greg k-h