From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751588AbeADABy (ORCPT + 1 other); Wed, 3 Jan 2018 19:01:54 -0500 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:41796 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751394AbeADABx (ORCPT ); Wed, 3 Jan 2018 19:01:53 -0500 Date: Thu, 4 Jan 2018 01:01:52 +0100 From: Pavel Machek To: kernel list Subject: KAISER, fun with the CPUs -- especially Intel. Cache effects can leak non-readable memory Message-ID: <20180104000152.GA29745@amd> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="0OAP2g/MAC+5xKAE" Content-Disposition: inline User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: --0OAP2g/MAC+5xKAE Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! I guess half of the lkml people already know, but others may have noticed something funny/serious is going on with Intel CPUs in last few days. And ... it is. Apparently you can read kernel memory from userspace, abusing speculative execution on modern CPUs. Issue was known for half a year now, and at least Intel, AMD and ARM CPUs are affected. https://googleprojectzero.blogspot.cz/2018/01/reading-privileged-memory-wit= h-side.html Grab popcorn, there is going to be a lot of fun, becuase these are CPU bugs, not kernel bugs... Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --0OAP2g/MAC+5xKAE Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlpNbvAACgkQMOfwapXb+vK/MgCdEYy9dnWrdtGJUtaNXYxNMH7x /uoAn3zEuyUJgmSGHqbzUJDwBGFG4Drb =LUyc -----END PGP SIGNATURE----- --0OAP2g/MAC+5xKAE--