From: ak@linux.intel.com
To: speck@linutronix.de
Cc: Andi Kleen <ak@linux.intel.com>
Subject: [MODERATED] [PATCH v4 0/8] L1TFv4 0
Date: Wed, 9 May 2018 14:25:45 -0700 [thread overview]
Message-ID: <cover.1525900921.git.ak@linux.intel.com> (raw)
Here's the updated L1TF native OS patchkit to mitigate speculation
into unmapped PTEs. This is stabilizing now.
This version has over v3:
- Cleanups/changes from code review
- Fix a bug added with v3 that broke the sysfs reporting
Andi Kleen (7):
x86, l1tf: Increase 32bit PAE __PHYSICAL_PAGE_MASK
x86, l1tf: Protect PROT_NONE PTEs against speculation
x86, l1tf: Make sure the first page is always reserved
x86, l1tf: Add sysfs reporting for l1tf
x86, l1tf: Report if too much memory for L1TF workaround
x86, l1tf: Limit swap file size to MAX_PA/2
mm, l1tf: Disallow non privileged high MMIO PROT_NONE mappings
Linus Torvalds (1):
x86, l1tf: Protect swap entries against L1TF
arch/x86/include/asm/cpufeature.h | 5 ++++
arch/x86/include/asm/cpufeatures.h | 2 ++
arch/x86/include/asm/page_32_types.h | 9 +++++--
arch/x86/include/asm/pgtable-2level.h | 17 ++++++++++++
arch/x86/include/asm/pgtable-3level.h | 2 ++
arch/x86/include/asm/pgtable-invert.h | 32 +++++++++++++++++++++++
arch/x86/include/asm/pgtable.h | 48 ++++++++++++++++++++++++----------
arch/x86/include/asm/pgtable_64.h | 38 +++++++++++++++++++--------
arch/x86/include/asm/processor.h | 5 ++++
arch/x86/kernel/cpu/bugs.c | 11 ++++++++
arch/x86/kernel/cpu/common.c | 15 ++++++++++-
arch/x86/kernel/setup.c | 28 +++++++++++++++++++-
arch/x86/mm/init.c | 15 +++++++++++
arch/x86/mm/mmap.c | 19 ++++++++++++++
drivers/base/cpu.c | 8 ++++++
include/asm-generic/pgtable.h | 12 +++++++++
include/linux/cpu.h | 2 ++
include/linux/swapfile.h | 2 ++
mm/memory.c | 37 +++++++++++++++++++-------
mm/mprotect.c | 49 +++++++++++++++++++++++++++++++++++
mm/swapfile.c | 44 +++++++++++++++++++------------
21 files changed, 346 insertions(+), 54 deletions(-)
create mode 100644 arch/x86/include/asm/pgtable-invert.h
--
2.14.3
next reply other threads:[~2018-05-09 21:26 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-09 21:25 ak [this message]
2018-05-09 21:25 ` [MODERATED] [PATCH v4 1/8] L1TFv4 1 ak
2018-05-10 23:00 ` Thomas Gleixner
2018-05-10 23:18 ` [MODERATED] " Andi Kleen
2018-05-09 21:25 ` [MODERATED] [PATCH v4 2/8] L1TFv4 4 ak
2018-05-09 21:25 ` [MODERATED] [PATCH v4 3/8] L1TFv4 6 ak
2018-05-10 23:15 ` Thomas Gleixner
2018-05-10 23:32 ` [MODERATED] " Andi Kleen
2018-05-10 23:41 ` Thomas Gleixner
2018-05-09 21:25 ` [MODERATED] [PATCH v4 4/8] L1TFv4 7 ak
2018-05-09 21:25 ` [MODERATED] [PATCH v4 5/8] L1TFv4 8 ak
2018-05-10 23:27 ` Thomas Gleixner
2018-05-09 21:25 ` [MODERATED] [PATCH v4 6/8] L1TFv4 3 ak
2018-05-10 22:52 ` Thomas Gleixner
2018-05-10 23:26 ` [MODERATED] " Andi Kleen
2018-05-10 23:46 ` Thomas Gleixner
2018-05-09 21:25 ` [MODERATED] [PATCH v4 7/8] L1TFv4 2 ak
2018-05-11 8:23 ` Thomas Gleixner
2018-05-11 8:24 ` Thomas Gleixner
2018-05-09 21:25 ` [MODERATED] [PATCH v4 8/8] L1TFv4 5 ak
2018-05-10 4:13 ` [MODERATED] " Andi Kleen
2018-05-09 21:54 ` [MODERATED] Re: [PATCH v4 0/8] L1TFv4 0 Andi Kleen
2018-05-10 6:47 ` [MODERATED] Re: ***UNCHECKED*** " Vlastimil Babka
2018-05-10 8:04 ` Michal Hocko
2018-05-10 16:07 ` Andi Kleen
2018-05-10 16:57 ` [MODERATED] " Borislav Petkov
2018-05-10 17:35 ` Andi Kleen
2018-05-10 22:11 ` Thomas Gleixner
2018-05-10 22:26 ` [MODERATED] " Andi Kleen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1525900921.git.ak@linux.intel.com \
--to=ak@linux.intel.com \
--cc=speck@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.