historical-speck.lore.kernel.org archive mirror
 help / color / mirror / Atom feed
From: mark gross <mgross@linux.intel.com>
To: speck@linutronix.de
Subject: [MODERATED] [PATCH 0/5] Slow Randomizing Boosts DoS v4.4.219 backport 0
Date: Mon, 27 Apr 2020 08:33:59 -0700	[thread overview]
Message-ID: <cover.1588001639.git.mgross@linux.intel.com> (raw)

From: mark gross <mgross@linux.intel.com>
Subject: [PATCH 0/5] Slow Ranomizing Boosts DoS linux-4.4.y backport

This is a backport of the backports done by Thomas for linux-4.14.y to
linux-4.4.y.

The backport needed a backport of one additional dependency for
cpu_data-x86_mask getting renamed to x86_stepping.

This was tested by the test engineer who tested the other SRBDS implementations
and it seems to work.


Jia Zhang (1):
  x86/cpu: Rename cpu_data.x86_mask to cpu_data.x86_stepping

Mark Gross (4):
  x86/cpu: Add a steppings field to struct x86_cpu_id
  x86/cpu: Add 'table' argument to cpu_matches()
  x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
    mitigation
  x86/speculation: Add SRBDS vulnerability and mitigation documentation

 .../ABI/testing/sysfs-devices-system-cpu      |   1 +
 .../special-register-buffer-data-sampling.rst | 148 ++++++++++++++++++
 Documentation/kernel-parameters.txt           |  20 +++
 arch/x86/include/asm/acpi.h                   |   2 +-
 arch/x86/include/asm/cpu_device_id.h          |  27 ++++
 arch/x86/include/asm/cpufeatures.h            |   2 +
 arch/x86/include/asm/msr-index.h              |   4 +
 arch/x86/include/asm/processor.h              |   2 +-
 arch/x86/kernel/amd_nb.c                      |   2 +-
 arch/x86/kernel/asm-offsets_32.c              |   2 +-
 arch/x86/kernel/cpu/amd.c                     |  26 +--
 arch/x86/kernel/cpu/bugs.c                    | 106 +++++++++++++
 arch/x86/kernel/cpu/centaur.c                 |   4 +-
 arch/x86/kernel/cpu/common.c                  |  62 ++++++--
 arch/x86/kernel/cpu/cpu.h                     |   1 +
 arch/x86/kernel/cpu/cyrix.c                   |   2 +-
 arch/x86/kernel/cpu/intel.c                   |  20 +--
 arch/x86/kernel/cpu/match.c                   |   7 +-
 arch/x86/kernel/cpu/microcode/intel.c         |   4 +-
 arch/x86/kernel/cpu/mtrr/generic.c            |   2 +-
 arch/x86/kernel/cpu/mtrr/main.c               |   4 +-
 arch/x86/kernel/cpu/perf_event_intel.c        |   2 +-
 arch/x86/kernel/cpu/perf_event_intel_lbr.c    |   2 +-
 arch/x86/kernel/cpu/perf_event_p6.c           |   2 +-
 arch/x86/kernel/cpu/proc.c                    |   4 +-
 arch/x86/kernel/head_32.S                     |   4 +-
 arch/x86/kernel/mpparse.c                     |   2 +-
 drivers/base/cpu.c                            |   8 +
 drivers/char/hw_random/via-rng.c              |   2 +-
 drivers/cpufreq/acpi-cpufreq.c                |   2 +-
 drivers/cpufreq/longhaul.c                    |   6 +-
 drivers/cpufreq/p4-clockmod.c                 |   2 +-
 drivers/cpufreq/powernow-k7.c                 |   2 +-
 drivers/cpufreq/speedstep-centrino.c          |   4 +-
 drivers/cpufreq/speedstep-lib.c               |   6 +-
 drivers/crypto/padlock-aes.c                  |   2 +-
 drivers/edac/amd64_edac.c                     |   2 +-
 drivers/edac/mce_amd.c                        |   2 +-
 drivers/hwmon/coretemp.c                      |   6 +-
 drivers/hwmon/hwmon-vid.c                     |   2 +-
 drivers/hwmon/k10temp.c                       |   2 +-
 drivers/hwmon/k8temp.c                        |   2 +-
 drivers/video/fbdev/geode/video_gx.c          |   2 +-
 include/linux/mod_devicetable.h               |   6 +
 44 files changed, 442 insertions(+), 80 deletions(-)
 create mode 100644 Documentation/hw-vuln/special-register-buffer-data-sampling.rst

-- 
2.17.1

             reply	other threads:[~2020-04-27 15:40 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-04-27 15:33 mark gross [this message]
2018-01-01  1:52 ` [MODERATED] [MODERATED] [PATCH 1/5] Slow Randomizing Boosts DoS v4.4.219 backport 1 Jia Zhang
2020-04-16 15:23 ` [MODERATED] [PATCH 2/5] Slow Randomizing Boosts DoS v4.4.219 backport 2 Mark Gross
2020-04-16 15:32 ` [MODERATED] [PATCH 3/5] Slow Randomizing Boosts DoS v4.4.219 backport 3 Mark Gross
2020-04-16 15:54 ` [MODERATED] [PATCH 4/5] Slow Randomizing Boosts DoS v4.4.219 backport 4 Mark Gross
2020-04-16 16:21 ` [MODERATED] [PATCH 5/5] Slow Randomizing Boosts DoS v4.4.219 backport 5 Mark Gross
2020-04-27 19:37 ` [PATCH 0/5] Slow Randomizing Boosts DoS v4.4.219 backport 0 Thomas Gleixner
2020-04-27 19:47   ` Thomas Gleixner
2020-04-28 14:54     ` [MODERATED] " mark gross
2020-04-28 15:35     ` Thomas Gleixner
2020-04-28 21:27       ` [MODERATED] " mark gross
2020-04-28 14:39   ` mark gross
2020-04-28 15:22     ` Greg KH
2020-04-28 21:38       ` mark gross
2020-04-28 22:25         ` Thomas Gleixner
2020-04-29 15:04           ` [MODERATED] " mark gross

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cover.1588001639.git.mgross@linux.intel.com \
    --to=mgross@linux.intel.com \
    --cc=speck@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).