lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 30 Jan 2018 01:10:24 +0100 From: KarimAllah Ahmed <karahmed@...zon.de> To: kvm@...r.kernel.org, linux-kernel@...r.kernel.org, x86@...nel.org Cc: KarimAllah Ahmed <karahmed@...zon.de>, Andi Kleen <ak@...ux.intel.com>, Andrea Arcangeli <aarcange@...hat.com>, Andy Lutomirski <luto@...nel.org>, Arjan van de Ven <arjan@...ux.intel.com>, Ashok Raj <ashok.raj@...el.com>, Asit Mallick <asit.k.mallick@...el.com>, Borislav Petkov <bp@...e.de>, Dan Williams <dan.j.williams@...el.com>, Dave Hansen <dave.hansen@...el.com>, David Woodhouse <dwmw@...zon.co.uk>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, "H . Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...hat.com>, Janakarajan Natarajan <Janakarajan.Natarajan@....com>, Joerg Roedel <joro@...tes.org>, Jun Nakajima <jun.nakajima@...el.com>, Laura Abbott <labbott@...hat.com>, Linus Torvalds <torvalds@...ux-foundation.org>, Masami Hiramatsu <mhiramat@...nel.org>, Paolo Bonzini <pbonzini@...hat.com>, Peter Zijlstra <peterz@...radead.org>, Radim Krčmář <rkrcmar@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, Tim Chen <tim.c.chen@...ux.intel.com>, Tom Lendacky <thomas.lendacky@....com> Subject: [PATCH v3 0/4] KVM: Expose speculation control feature to guests Add direct access to speculation control MSRs for KVM guests. This allows the guest to protect itself against Spectre V2 using IBRS+IBPB instead of a retpoline+IBPB based approach. It also exposes the ARCH_CAPABILITIES MSR which is going to be used by future Intel processors to indicate RDCL_NO and IBRS_ALL. Ashok Raj (1): KVM: x86: Add IBPB support KarimAllah Ahmed (3): KVM: x86: Update the reverse_cpuid list to include CPUID_7_EDX KVM: VMX: Emulate MSR_IA32_ARCH_CAPABILITIES KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL arch/x86/kvm/cpuid.c | 22 ++++++++++---- arch/x86/kvm/cpuid.h | 1 + arch/x86/kvm/svm.c | 14 +++++++++ arch/x86/kvm/vmx.c | 86 ++++++++++++++++++++++++++++++++++++++++++++++++++++ arch/x86/kvm/x86.c | 1 + 5 files changed, 118 insertions(+), 6 deletions(-) Cc: Andi Kleen <ak@...ux.intel.com> Cc: Andrea Arcangeli <aarcange@...hat.com> Cc: Andy Lutomirski <luto@...nel.org> Cc: Arjan van de Ven <arjan@...ux.intel.com> Cc: Ashok Raj <ashok.raj@...el.com> Cc: Asit Mallick <asit.k.mallick@...el.com> Cc: Borislav Petkov <bp@...e.de> Cc: Dan Williams <dan.j.williams@...el.com> Cc: Dave Hansen <dave.hansen@...el.com> Cc: David Woodhouse <dwmw@...zon.co.uk> Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org> Cc: H. Peter Anvin <hpa@...or.com> Cc: Ingo Molnar <mingo@...hat.com> Cc: Janakarajan Natarajan <Janakarajan.Natarajan@....com> Cc: Joerg Roedel <joro@...tes.org> Cc: Jun Nakajima <jun.nakajima@...el.com> Cc: Laura Abbott <labbott@...hat.com> Cc: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Masami Hiramatsu <mhiramat@...nel.org> Cc: Paolo Bonzini <pbonzini@...hat.com> Cc: Peter Zijlstra <peterz@...radead.org> Cc: Radim Krčmář <rkrcmar@...hat.com> Cc: Thomas Gleixner <tglx@...utronix.de> Cc: Tim Chen <tim.c.chen@...ux.intel.com> Cc: Tom Lendacky <thomas.lendacky@....com> Cc: kvm@...r.kernel.org Cc: linux-kernel@...r.kernel.org Cc: x86@...nel.org -- 2.7.4
Powered by blists - more mailing lists