From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (193.142.43.55:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 27 Apr 2020 15:32:43 -0000 Received: from mga05.intel.com ([192.55.52.43]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jT5kP-0006bF-Ux for speck@linutronix.de; Mon, 27 Apr 2020 17:32:42 +0200 Received: from mtg-dev (mtg-dev.jf.intel.com [10.54.74.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.ostc.intel.com (Postfix) with ESMTPS id 559966363 for ; Mon, 27 Apr 2020 15:32:37 +0000 (UTC) Received: from mgross by mtg-dev with local (Exim 4.90_1) (envelope-from ) id 1jT5kL-000RE1-Aa for speck@linutronix.de; Mon, 27 Apr 2020 08:32:37 -0700 Message-Id: From: mark gross Date: Mon, 27 Apr 2020 08:25:22 -0700 Subject: [MODERATED] [PATCH 0/4] more sampling fun 0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit MIME-Version: 1.0 To: speck@linutronix.de List-ID: From: mark gross Subject: [PATCH 0/4] Slow Ranomizing Boosts DoS linux-4.9.y backport This is a backport of the backports done by Thomas for linux-4.14.y to linux-4.9.y. The backport was pretty simple with no new dependencies needed. this was tested by the test engineer who tested the other SRBDS implementations and it seems to work. Mark Gross (4): x86/cpu: Add a steppings field to struct x86_cpu_id x86/cpu: Add 'table' argument to cpu_matches() x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation x86/speculation: Add SRBDS vulnerability and mitigation documentation .../ABI/testing/sysfs-devices-system-cpu | 1 + .../special-register-buffer-data-sampling.rst | 148 ++++++++++++++++++ Documentation/hw-vuln/index.rst | 1 + Documentation/kernel-parameters.txt | 20 +++ arch/x86/include/asm/cpu_device_id.h | 27 ++++ arch/x86/include/asm/cpufeatures.h | 30 ++-- arch/x86/include/asm/msr-index.h | 4 + arch/x86/kernel/cpu/bugs.c | 106 +++++++++++++ arch/x86/kernel/cpu/common.c | 54 +++++-- arch/x86/kernel/cpu/cpu.h | 1 + arch/x86/kernel/cpu/match.c | 7 +- drivers/base/cpu.c | 8 + include/linux/mod_devicetable.h | 6 + 13 files changed, 388 insertions(+), 25 deletions(-) create mode 100644 Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst -- 2.17.1