0b25e6e...
by
Seth Forshee
on 2019-05-14
UBUNTU: Ubuntu-5.1.0-2.2
Signed-off-by: Seth Forshee <email address hidden>
8193c63...
by
Seth Forshee
on 2019-05-14
UBUNTU: [Packaging] resync git-ubuntu-log
BugLink: http:// bugs.launchpad. net/bugs/ 1786013
Signed-off-by: Seth Forshee <email address hidden>
3f06411...
by
Seth Forshee
on 2019-05-14
UBUNTU: update dkms package versions
Signed-off-by: Seth Forshee <email address hidden>
2f28467...
by
Greg Kroah-Hartman <email address hidden>
on 2019-05-14
Linux 5.1.2
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
Signed-off-by: Seth Forshee <email address hidden>
0b2be17...
by
Josh Poimboeuf
on 2019-05-07
x86/speculation /mds: Fix documentation typo
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
commit 95310e348a321b4 5fb746c176961d4 da72344282 upstream
Fix a minor typo in the MDS documentation: "eanbled" -> "enabled".
Reported-by: Jeff Bastian <email address hidden>
Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>
66f413f...
by
Tyler Hicks
on 2019-05-06
Documentation: Correct the possible MDS sysfs values
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
commit ea01668f9f43021 b28b3f4d5ffad50 106a1e1301 upstream
Adjust the last two rows in the table that display possible values when
MDS mitigation is enabled. They both were slightly innacurate.
In addition, convert the table of possible values and their descriptions
to a list-table. The simple table format uses the top border of equals
signs to determine cell width which resulted in the first column being
far too wide in comparison to the second column that contained the
majority of the text.
Signed-off-by: Tyler Hicks <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>
2c72cec...
by
speck for Pawan Gupta <email address hidden>
on 2019-05-06
x86/mds: Add MDSUM variant to the MDS documentation
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
commit e672f8bf71c6625 3197e503f75c771 dd28ada4a0 upstream
Updated the documentation for a new CVE-2019-11091 Microarchitectural Data
Sampling Uncacheable Memory (MDSUM) which is a variant of
Microarchitectural Data Sampling (MDS). MDS is a family of side channel
attacks on internal buffers in Intel CPUs.
MDSUM is a special case of MSBDS, MFBDS and MLPDS. An uncacheable load from
memory that takes a fault or assist can leave data in a microarchitectural
structure that may later be observed using one of the same methods used by
MSBDS, MFBDS or MLPDS. There are no new code changes expected for MDSUM.
The existing mitigation for MDS applies to MDSUM as well.
Signed-off-by: Pawan Gupta <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Reviewed-by: Tyler Hicks <email address hidden>
Reviewed-by: Jon Masters <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>
3fde88a...
by
Josh Poimboeuf
on 2019-04-17
x86/speculation /mds: Add 'mitigations=' support for MDS
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
commit 5c14068f87d04ad c73ba3f41c2a303 d3c3d1fa12 upstream
Add MDS to the new 'mitigations=' cmdline option.
Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>
096745c...
by
Josh Poimboeuf
on 2019-04-12
s390/speculation: Support 'mitigations=' cmdline option
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
commit 0336e04a6520bda efdb0769d2a7008 4fa52e81ed upstream
Configure s390 runtime CPU speculation bug mitigations in accordance
with the 'mitigations=' cmdline option. This affects Spectre v1 and
Spectre v2.
The default behavior is unchanged.
Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Tested-by: Jiri Kosina <email address hidden> (on x86)
Reviewed-by: Jiri Kosina <email address hidden>
Cc: Borislav Petkov <email address hidden>
Cc: "H . Peter Anvin" <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Peter Zijlstra <email address hidden>
Cc: Jiri Kosina <email address hidden>
Cc: Waiman Long <email address hidden>
Cc: Andrea Arcangeli <email address hidden>
Cc: Jon Masters <email address hidden>
Cc: Benjamin Herrenschmidt <email address hidden>
Cc: Paul Mackerras <email address hidden>
Cc: Michael Ellerman <email address hidden>
Cc: <email address hidden>
Cc: Martin Schwidefsky <email address hidden>
Cc: Heiko Carstens <email address hidden>
Cc: <email address hidden>
Cc: Catalin Marinas <email address hidden>
Cc: Will Deacon <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Cc: Greg Kroah-Hartman <email address hidden>
Cc: Tyler Hicks <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: Randy Dunlap <email address hidden>
Cc: Steven Price <email address hidden>
Cc: Phil Auld <email address hidden>
Link: https:/ /lkml.kernel. org/r/ <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>
63a651f...
by
Josh Poimboeuf
on 2019-04-12
powerpc/ speculation: Support 'mitigations=' cmdline option
BugLink: https:/ /bugs.launchpad .net/bugs/ 1829050
commit 782e69efb3dfed6 e8360bc612e8c78 27a901a8f9 upstream
Configure powerpc CPU runtime speculation bug mitigations in accordance
with the 'mitigations=' cmdline option. This affects Meltdown, Spectre
v1, Spectre v2, and Speculative Store Bypass.
The default behavior is unchanged.
Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Tested-by: Jiri Kosina <email address hidden> (on x86)
Reviewed-by: Jiri Kosina <email address hidden>
Cc: Borislav Petkov <email address hidden>
Cc: "H . Peter Anvin" <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Peter Zijlstra <email address hidden>
Cc: Jiri Kosina <email address hidden>
Cc: Waiman Long <email address hidden>
Cc: Andrea Arcangeli <email address hidden>
Cc: Jon Masters <email address hidden>
Cc: Benjamin Herrenschmidt <email address hidden>
Cc: Paul Mackerras <email address hidden>
Cc: Michael Ellerman <email address hidden>
Cc: <email address hidden>
Cc: Martin Schwidefsky <email address hidden>
Cc: Heiko Carstens <email address hidden>
Cc: <email address hidden>
Cc: Catalin Marinas <email address hidden>
Cc: Will Deacon <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Cc: Greg Kroah-Hartman <email address hidden>
Cc: Tyler Hicks <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: Randy Dunlap <email address hidden>
Cc: Steven Price <email address hidden>
Cc: Phil Auld <email address hidden>
Link: https:/ /lkml.kernel. org/r/ <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>