From patchwork Tue Jul 10 18:01:21 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Rutland X-Patchwork-Id: 141648 Delivered-To: patch@linaro.org Received: by 2002:a2e:9754:0:0:0:0:0 with SMTP id f20-v6csp4204326ljj; Tue, 10 Jul 2018 11:19:09 -0700 (PDT) X-Google-Smtp-Source: AAOMgpenkFJ9cAz56Yc4e54h86Etqf9d+5uEdb5tepPBH3xNMqq7iwGUTTgXchQD8aocC62rNTMz X-Received: by 2002:a65:47cc:: with SMTP id f12-v6mr23690438pgs.173.1531246749369; Tue, 10 Jul 2018 11:19:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531246749; cv=none; d=google.com; s=arc-20160816; b=QqLVuAU3ZfdJ+27xfLatpqqa+LoIbrOwPU/29E6ARd8dKAXqDljS/6GRiegeAbirVo GKm4AaxoSz/npvXw9beByBTT4nQh1ydzI2KIKP82H/3NPvE2zbXBVbxW9mpmlxkbyVjD kWN4epS5cfTBbO7twfo7qunVrOvP4dcQEmQlLjBbtKL8FuHPfQ5JjBzN1V06dE1dC/PG qbAFp6RT9uB+dHb4AA0Z1RX5URwpT616qjtRx1kDyVRnN/LUHvEejBQS82SqWUT4aKq+ cLwUaFlhrP6HQQuHP2zAEEu3y/XqA7Z5MC0qsmV2Rxm+E8him+N56fKEvqWxy/Vcb2D+ wyeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=WLvkPGSebckeRKq86BuKCwbqz9wubRN/DZxEHxW85No=; b=BpGNTs0gIQCpQXmHPRnIsai3YO/zi01pY3yjpzPrgj9m9L9Rol00Qc83ysDWMU56zy bf453dKi2fLObwta/EjPx89+2NUD4YkowuSZgnqfAcZ8WY8jXdiaDCk8N7fLAR4zzRiR QnCZNdic2ul4deUtUBoQfNG4tsgepFISF/m3l6APVuNdG1VjUUqBfCzinTxpgUFo72ls dvp6sMd8vDKSgTZrV2YFHImsxY9SnhnWjxiF0uGZJzGpiyYKDeuKcNyknqHsU0KaCLaX vMFNmwBPjGRjgrWX3aZROLosFlVgkSddjk+VP6QEPIBcZ1kWUKTdmTy8snvCSywNY7YI E8+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i184-v6si16542816pge.405.2018.07.10.11.19.09; Tue, 10 Jul 2018 11:19:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732401AbeGJSSh (ORCPT + 18 others); Tue, 10 Jul 2018 14:18:37 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:51618 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732354AbeGJSSh (ORCPT ); Tue, 10 Jul 2018 14:18:37 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 60DDE1BB0; Tue, 10 Jul 2018 11:01:29 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id D42D63F589; Tue, 10 Jul 2018 11:01:27 -0700 (PDT) From: Mark Rutland To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Cc: catalin.marinas@arm.com, christoffer.dall@arm.com, kvmarm@lists.cs.columbia.edu, marc.zyngier@arm.com, mark.rutland@arm.com, will.deacon@arm.com Subject: [PATCH 0/2] arm64: spectre-v1 write fixes (CVE-2018-3693) Date: Tue, 10 Jul 2018 19:01:21 +0100 Message-Id: <20180710180123.56461-1-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org These patches inhibit spectre-v1-write gadgets found in arch/arm64, using the same mitigation applied to existing spectre-v1-read gadgets. This issue is also known as CVE-2018-3693, or "bounds check bypass store". More details can be found in the Arm Cache Speculation Side-channels whitepaper, available from the Arm security updates site [1]. Thanks, Mark. [1] https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Mark Rutland (2): arm64: fix possible spectre-v1 write in ptrace_hbp_set_event() KVM: arm/arm64: vgic: fix possible spectre-v1 write in vgic_mmio_write_apr() arch/arm64/kernel/ptrace.c | 19 +++++++++++-------- virt/kvm/arm/vgic/vgic-mmio-v2.c | 3 +++ 2 files changed, 14 insertions(+), 8 deletions(-) -- 2.11.0