From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 22 Jan 2019 04:18:03 -0000 Received: from userp2120.oracle.com ([156.151.31.85]) by Galois.linutronix.de with esmtps (TLS1.2:RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1glnVh-0003Fp-GL for speck@linutronix.de; Tue, 22 Jan 2019 05:18:02 +0100 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id x0M4ECQ2041006 for ; Tue, 22 Jan 2019 04:17:54 GMT Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by userp2120.oracle.com with ESMTP id 2q3vhrh683-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 22 Jan 2019 04:17:54 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id x0M4HsZ3006138 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 22 Jan 2019 04:17:54 GMT Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id x0M4HreS005006 for ; Tue, 22 Jan 2019 04:17:53 GMT Date: Mon, 21 Jan 2019 23:17:49 -0500 From: Konrad Rzeszutek Wilk Subject: [MODERATED] Re: [PATCH v5 01/27] MDSv5 26 Message-ID: <20190122041749.GC12859@char.us.oracle.com> References: MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Fri, Jan 18, 2019 at 04:50:16PM -0800, speck for Andi Kleen wrote: > From: Andi Kleen > Subject: x86/speculation/mds: Add basic bug infrastructure > for MDS > > MDS is micro architectural data sampling, which is a side channel > attack on internal buffers in Intel CPUs. > > MDS consists of multiple sub-vulnerabilities: > Microarchitectural Store Buffer Data Sampling (MSBDS) (CVE-2018-12126) > Microarchitectual Fill Buffer Data Sampling (MFBDS) (CVE-2018-12130) > Microarchitectual Load Port Data (MLPDS) (CVE-2018-12127), > with the first leaking store data, and the second loads and sometimes > store data, and the third load data. > > They all have the same mitigations for single thread, so we lump them all > together as a single MDS issue. > > This patch adds the basic infrastructure to detect if the current > CPU is affected by MDS, and if yes set the right BUG bits. > > Signed-off-by: Andi Kleen Reviewed-by: Konrad Rzeszutek Wilk Thank you!