Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752704AbeADTdh (ORCPT + 1 other); Thu, 4 Jan 2018 14:33:37 -0500 Received: from mail-ot0-f193.google.com ([74.125.82.193]:33916 "EHLO mail-ot0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751952AbeADTdf (ORCPT ); Thu, 4 Jan 2018 14:33:35 -0500 X-Google-Smtp-Source: ACJfBotNijUaXkjNAIznYq693LpDopI//IuKgW9jxu8Dz9WxDx/AjHqoSe9GusQ/uF9sVGqvaOy7YoM2MG942egG0jU= MIME-Version: 1.0 In-Reply-To: <1515093549.29312.11.camel@infradead.org> References: <1515093549.29312.11.camel@infradead.org> From: Linus Torvalds Date: Thu, 4 Jan 2018 11:33:34 -0800 X-Google-Sender-Auth: 9d9o00vQauJ1g5cQRnvxZdUuLmA Message-ID: Subject: Re: [PATCH 0/7] IBRS patch series To: David Woodhouse Cc: Tim Chen , Thomas Gleixner , Andy Lutomirski , Greg KH , Dave Hansen , Andrea Arcangeli , Andi Kleen , Arjan Van De Ven , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Thu, Jan 4, 2018 at 11:19 AM, David Woodhouse wrote: > > On Skylake the target for a 'ret' instruction may also come from the > BTB. So if you ever let the RSB (which remembers where the 'call's came > from get empty, you end up vulnerable. That sounds like it could cause mispredicts, but it doesn't sound _exploitable_. Sure, interrupts in between the call instruction and the 'ret' could overflow the return stack. And we could migrate to another CPU. And so apparently SMM clears the return stack too. ... but again, none of them sound even remotely _exploitable_. Remember: it's not mispredicts that leak information. It's *exploits" that use forced very specific mispredicts to leak information. There's a big difference there. And I think patch authors should keep that difference in mind. For example, flushing the BTB at kernel entry doesn't mean that later in-kernel indirect branches don't get predicted, and doesn't even mean that they don't get mis-predicted. It only means that an exploit can't pre-populate those things and use them for exploits. Linus