Description: TSX Asynchronous Abort (TAA) References: https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu/ https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort https://zombieloadattack.com https://zombieloadattack.com/zombieload.pdf Notes: bwh> Exploitable only on Intel CPUs that bwh> support TSX and are not vulnerable to MDS. Will be fixed by "TAA" bwh> patch series. Bugs: upstream: released (5.4-rc8) [c2955f270a84762343000f103e0640d29c7a96f3, 286836a70433fb64131d2590f4bf512097c255e1, 95c5824f75f3ba4c9e8e5a4b1a623c95390ac266, 1b42f017415b46c317e71d41c34ec088417a1883, 6608b45ac5ecb56f9e171252229c39580cc85f0f, e1d38b63acd843cfdd4222bf19a26700fd5c699e, 7531a3596e3272d1f6841e0d601a614555dc6b65, a7a248c593e4fd7a67c50b5f5318fe42a0db335e, db616173d787395787ecc93eef075fa975227b10, 012206a822a8b6ac09125bfaa210a95b9eb8f1c1] 4.19-upstream-stable: released (4.19.84) [4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6, 37cf9ef900ccb3183c84b2181291b23927cf8002, b8eb348ae40878a5a0a4de444fa5d2ea8a539f6c, 6c58ea8525bf6df7f4df2692784d2ce315201895, 15dfa5d706df85506a527c5572be5ff322031a01, a0808f06dfa1adca8e81716cf773db8c8f1c07b9, 2402432d55576a2c35546c72d19893a21edbf133, e3bf6b3ff55a549cef225bb25724aa7858377c15, 4ad7466ddf2d78ad2e3f700ed69b694b9f232896, 415bb221a07038f7a54c4187f1aef1e8e2a4925f] 4.9-upstream-stable: released (4.9.202) [e83ef92e99792e3ec88b95839e57c300ef692900, 2fc508384968d5796e005bf85d2daf2f16510119, 919d56194a7fe18c8d67e873d6f71c9db2e00eea, 211278805ea59ef5b871d89f5688e50faf6ca68c, a117aa4e6876fa4b272d2f0b5f12232a04cce895, 9392b2dda0aedff871f10eae4e9b1e7d7e7bc3f9, 639453597dcce3337990c80272fae6b8e2c93005, 562afad430aaf280d224c65589d8db4e29ca8ace, ba54aadc5c641dfe4e387edc977e07cd175ed59b, 0fbf080197189a30f75615dc2c45e2af561facd3, 042a4417d136559d7285ea6affdcbbd0e37192b6] 3.16-upstream-stable: released (3.16.77) [6608a10cecfd899b4e8650aa9149ca5a6171fc43, 490421fb060b7487fc6e4fe2efb27820b0b535eb, 8b149657bc70145a6c6f41e43d7b5d90d7d23d99, 8f250aefe83f06c5765c21f44409bd5c2080803b, f21f3516be7ce2340f1afd5c3513c6319ca23d2f, 67323ec3ec3be6f5fcf2d6373701716b50c2a59d, 366507333e0b8f83009fabea746ff0ad6d7c7641, 0cdefbadb02aafd93efd4a9b118a6d07bfc742da, 55799096de726a647233c21c3fd294f55580f2b7, 88d7d95283ef74c9fa3733e811ab8498eebc827c] sid: released (5.3.9-2) [bugfix/x86/taa/0001-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0002-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0004-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0006-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0007-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0008-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0009-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0010-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch] 4.19-buster-security: released (4.19.67-2+deb10u2) [bugfix/x86/taa/0001-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0002-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0007-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0008-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0009-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0010-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0015-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch] 4.9-stretch-security: released (4.9.189-3+deb9u2) [bugfix/x86/taa/0001-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0002-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0007-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0008-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0009-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0010-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0011-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch] 3.16-jessie-security: released (3.16.76-1) [bugfix/x86/taa/0001-KVM-Introduce-kvm_get_arch_capabilities.patch, bugfix/x86/taa/0002-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0003-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0005-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0007-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0008-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0009-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0010-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0011-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0012-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]