Description: Speculative Store Bypass References: https://xenbits.xen.org/xsa/advisory-263.html https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 https://access.redhat.com/security/vulnerabilities/ssbd https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Notes: carnil> Merge of various commits: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b78ce4a34b761c7fe13520de822984019ff1a8f carnil> for CVE-2018-3639 carnil> Need to record the individual needed commits from upstream carnil> (and respective stable releases). carnil> Basically: 3b78ce4a34b761c7fe13520de822984019ff1a8f^2 ^1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f~1 Bugs: upstream: released (4.17-rc7) [1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f, 4a28bfe3267b68e22c663ac26185aa16c9b879ef, d1059518b4789cabe34bb4b714d07e6089c82ca1, 1b86883ccb8d5d9506529d42dbe1a5257cb30b18, 5cf687548705412da47c9cec342fd952d71ed3d5, c456442cd3a59eeb1d60293c26cbe2ff2c4e42cf, 0cc5fa00b0a88dad140b4e5c2cead9951ad36822, 24f7fc83b9204d20f878c57cb77d261ae825e033, 772439717dbf703b39990be58d8d4e3e4ad0598a, 1115a859f33276fe8afb31c60cf9d8e657872558, 764f3c21588a059cd783c6ba0734d4db2d72822d, da39556f66f5cfe8f9c989206974f1cb16ca5d7c, 28a2775217b17208811fa43a9e96bd1fdf417b86, b617cfc858161140d69cc0b5cc211996b557a1c7, 885f82bfbc6fefb6664ea27965c3ab9ac4194b8c, a73ec77ee17ec556fe7f165d00314cb7c047b1ac, 7bbf1373e228840bb0295a2ca26d548ef37f448e, fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64, 5c3070890d06ff82eecb808d02d2ca39169533ef, f9544b2b076ca90d887c5ae5d74fab4c21bb7c13, 356e4bfff2c5489e016fdb925adbf12a1e3950ee, b849a812f7eb92e96d1c8239b06581b2cfd8b275, 00a02d0c502a06d15e07b857f8ff921e3e402675, 8bf37d8c067bb7eb8e7c381bdadf9bd89182b6bc, f21b53b20c754021935ea43364dbf53778eeba32, 9f65fb29374ee37856dbad847b4e121aab72b510, e96f46ee8587607a828f783daa6eb5b44d25004d, dd0792699c4058e63c0715d9a7c2d40226fcdddc, d66d8ff3d21667b41eddbe86b35ab411e40d8c5f, 7bb4d366cba992904bffa4820d24e70a3de93e76, ffed645e3be0e32f8e9ab068d257aee8d0fe8eec, 5f2b745f5e1304f438f9b2cd03ebc8120b6e0d3b, 15e6c22fd8e5a42c5ed6d487b7c9fe44c2517765, e7c587da125291db39ddf1f49b18e5970adbac17, 7eb8956a7fec3c1f0abc2a5517dada99ccc8a961, 52817587e706686fcdb27f14c1b000c92f266c96, d1035d971829dcf80e8686ccde26f94b0a069472, 1f50ddb4f4189243c05926b842dc1a0332195f31, ccbcd2674472a978b48c91c1fbfb66c0ff959f24, 11fb0683493b2da112cd64c9dada221b52463bf7, 0270be3e34efb05a88bc4c422572ece038ef3608, cc69b34989210f067b2c51d5539b5f96ebcc3a01, fa8ac4988249c38476f6ad678a4848a736373403, 4b59bdb569453a60b752b274ca61f009e37f4dae, be6fcb5478e95bb1c91f489121238deb3abca46a, 47c61b3955cf712cadfc25635bf9bc174af030ea, bc226f07dcd3c9ef0b7f6236fe356ea4a9cb4769, 240da953fcc6a9008c92fae5b1f727ee5ed167ab, af86ca4e3088fe5eacf2f7e58c01fa68ca067672] 4.9-upstream-stable: released (4.9.102) [741c026d1a0c594f7ad509f44488ef29582fed74, 88659d5fd9bea7f6afb227c6d404de750b368b45, 3effee64a9993dc5587fb39f0da4455769e53d26, 0f5dd651397b264903e8becc511af6cf384c273e, cf21f58ae6f264e0a10d9736be97342627cf9837, 24e4dd97af40afa4d45e85a32d9c2cc81425a62e, a80714172abca6413d2d6505be64723ae73a903b, 6f70a553666dd8c4fa370eaaa41380eec593229c, 19e3a2bec95e966921689ae39117f9dbbaffd99b, 99b13116965f16b2e608e7796cd59198eee5bf06, f854434b37bbf8953900226acd6139081f60d3da, 99318eca2c7ab3250b9614043b9ac6077ff2cb46, 7a2d2358ba9b6de29be0a98c8290479df32604b6, 4812ffbbfcac35270b82292e84e8e7187088c8b8, fd01e82efa269b7e295533ec7b2d93aa8adf670a, 439f2ef884306976f22b42f709c1ccdf04278987, 5ed7788df973455378e987fe221bef0661fbe03a, 89c6e9b599c573802de1b2fff6a9ccd99c3c4e57, a078e3e81964c31079627dd32c3ea714d5b1531e, 4272f528da381673a8e7845c93daa88b8aa4f4e9, 51ef9af2a35bbc21334c801fd15cbfe01210760f, 0a112f104548667f5618477ff0f2a54ee626addd, ea055f7d43fb3a9d56e80d0116104555d6dde3f7, 036608d62a838aeb63cae0adaf8ac773cb53148c, c71def81cd07e1bd74da468ae6abe1ce62e3157b, ab677c2addbb128f334c4906f27a0285a67d2180, 094c2767c4f02c36eabc27309d78b04f4a216e88, 05a85a396f3989e9ac953785d9dccfc7cd0110f2, bf3da841edae882de545d2d19b1fae205cab8d98, f8cd89f5e05d49422315e60ec2db9fcb66d25aca, f79f0efe8e1816063f83926c946026d83b9b287f, eb7b5624be3e6249a880310be486245db15a5f5c, dbb264a253c8b07259d55fb3373b783fcb641b04, 6fdd277a9326c5ef3fe94999c9c319ad64333fdd, 3a684641619ff0e06b8d4cb8c2ffbef304c9bdb1, 69e9b0b1e04001a743927489bb8b9a10344810d8, 4a58908fa1476c600548f82effc75bcfa890454a, a7c343228e5c32802431e6cc5b855ae61eb4db72, f69e91f2c4ce59deb66bd30150e5153c08873ae9, 5a63725cd18fcee2af6ec46ccb856b64ad3077b4, 53c434e735fffbf8715a1778ce44387131e0b080, d0cb78f5e4214db86b12a9448d8ccaa005f43cb9, 1189cbf52ad35cfd04a715016200ea81dd4c708f, 7c0b2dc44956533c5aac95f07575feef7b63344c, b7b84401576d3858e9573d69d8287e182444f8e9, ea99935b633bd4766a679e51b173197c750fb00b, 599288ec9e20d9772e6e8a27aeae021f018c7336, ec90464d96c50f90bfe1bde6dea748a6c962313c, 0ec827f974e198c609c2f258a5a1f11f9af48bb2, b0ef8c72b3d70505ba7fd72af6b1e3fc9b3ae9bc, b965592a07a248ef254d9d421bd34a6b548db21f, 3394ef1a7efc08e3c185ac2446f06284847ccb37] 3.16-upstream-stable: released (3.16.59) [x86-nospec-simplify-alternative_msr_write.patch, x86-bugs-concentrate-bug-detection-into-a-separate-function.patch, x86-bugs-concentrate-bug-reporting-into-a-separate-function.patch, x86-bugs-read-spec_ctrl-msr-during-boot-and-re-use-reserved-bits.patch, x86-bugs-kvm-support-the-combination-of-guest-and-host-ibrs.patch, x86-bugs-expose-sys-..-spec_store_bypass.patch, x86-cpufeatures-add-x86_feature_rds.patch, x86-bugs-provide-boot-parameters-for-the-spec_store_bypass_disable-mitigation.patch, x86-bugs-intel-set-proper-cpu-features-and-setup-rds.patch, x86-bugs-whitelist-allowed-spec_ctrl-msr-values.patch, x86-bugs-amd-add-support-to-disable-rds-on-famh-if-requested.patch, x86-kvm-vmx-expose-spec_ctrl-bit-2-to-the-guest.patch, x86-speculation-create-spec-ctrl.h-to-avoid-include-hell.patch, prctl-add-speculation-control-prctls.patch, x86-process-allow-runtime-control-of-speculative-store-bypass.patch, x86-speculation-add-prctl-for-speculative-store-bypass-mitigation.patch, nospec-allow-getting-setting-on-non-current-task.patch, proc-provide-details-on-speculation-flaw-mitigations.patch, seccomp-enable-speculation-flaw-mitigations.patch, prctl-add-force-disable-speculation.patch, seccomp-use-pr_spec_force_disable.patch, seccomp-add-filter-flag-to-opt-out-of-ssb-mitigation.patch, seccomp-move-speculation-migitation-control-to-arch-code.patch, x86-speculation-make-seccomp-the-default-mode-for-speculative-store-bypass.patch, x86-bugs-rename-_rds-to-_ssbd.patch, proc-use-underscores-for-ssbd-in-status.patch, documentation-spec_ctrl-do-some-minor-cleanups.patch, x86-bugs-fix-__ssb_select_mitigation-return-type.patch, x86-bugs-make-cpu_show_common-static.patch, x86-bugs-fix-the-parameters-alignment-and-missing-void.patch, x86-cpu-make-alternative_msr_write-work-for-32-bit-code.patch, kvm-svm-move-spec-control-call-after-restore-of-gs.patch, x86-speculation-use-synthetic-bits-for-ibrs-ibpb-stibp.patch, x86-cpufeatures-disentangle-msr_spec_ctrl-enumeration-from-ibrs.patch, x86-cpufeatures-disentangle-ssbd-enumeration.patch, x86-cpufeatures-add-feature_zen.patch, x86-speculation-handle-ht-correctly-on-amd.patch, x86-bugs-kvm-extend-speculation-control-for-virt_spec_ctrl.patch, x86-speculation-add-virtualized-speculative-store-bypass-disable-support.patch, x86-speculation-rework-speculative_store_bypass_update.patch, x86-bugs-unify-x86_spec_ctrl_-set_guest-restore_host.patch, x86-bugs-expose-x86_spec_ctrl_base-directly.patch, x86-bugs-remove-x86_spec_ctrl_set.patch, x86-bugs-rework-spec_ctrl-base-and-mask-logic.patch, x86-speculation-kvm-implement-support-for-virt_spec_ctrl-ls_cfg.patch, kvm-svm-implement-virt_spec_ctrl-support-for-ssbd.patch, x86-bugs-rename-ssbd_no-to-ssb_no.patch] 3.2-upstream-stable: ignored "Too much work to backport" sid: released (4.16.12-1) 4.9-stretch-security: released (4.9.107-1) 3.16-jessie-security: released (3.16.59-1) 3.2-wheezy-security: ignored "Too much work to backport"