lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240402101549.5166-1-bp@kernel.org>
Date: Tue,  2 Apr 2024 12:15:49 +0200
From: bp@...nel.org
To: michael.roth@....com
Cc: bgardon@...gle.com,
	bp@...en8.de,
	dave.hansen@...ux.intel.com,
	dmatlack@...gle.com,
	hpa@...or.com,
	jpoimboe@...nel.org,
	kvm@...r.kernel.org,
	leitao@...ian.org,
	linux-kernel@...r.kernel.org,
	maz@...nel.org,
	mingo@...hat.com,
	mirsad.todorovac@....unizg.hr,
	pawan.kumar.gupta@...ux.intel.com,
	pbonzini@...hat.com,
	peterz@...radead.org,
	seanjc@...gle.com,
	shahuang@...hat.com,
	tabba@...gle.com,
	tglx@...utronix.de,
	x86@...nel.org
Subject: Re: [BUG net-next] arch/x86/kernel/cpu/bugs.c:2935: "Unpatched return thunk in use. This should not happen!" [STACKTRACE]

From: Borislav Petkov <bp@...en8.de>

Sorry if this comes out weird - mail troubles currently.

On Thu, Mar 28, 2024 at 07:38:30AM -0500, Michael Roth wrote:
> I'm seeing it pretty consistently on kvm/next as well. Not sure if
> there's anything special about my config but starting a fairly basic
> SVM guest seems to be enough to trigger it for me on the first
> invocation of svm_vcpu_run().

Hmm, can you share your config and what exactly you're doing?

I can't reproduce with Mirsad's reproducer, probably because of .config
differences. I tried making all CONFIG*KVM* options =y but no
difference.

Thx.

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ