lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200601170102.GA1346815@gmail.com>
Date:   Mon, 1 Jun 2020 19:01:02 +0200
From:   Ingo Molnar <mingo@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, Thomas Gleixner <tglx@...utronix.de>,
        Borislav Petkov <bp@...en8.de>,
        Peter Zijlstra <a.p.zijlstra@...llo.nl>,
        Andrew Morton <akpm@...ux-foundation.org>,
        Andy Lutomirski <luto@...nel.org>
Subject: [GIT PULL] x86/mm changes for v5.8

Linus,

Please pull the latest x86/mm git tree from:

   git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86-mm-2020-06-01

   # HEAD: 0fcfdf55db9e1ecf85edd6aa8d0bc78a448cb96a Documentation: Add L1D flushing Documentation

Misc changes:

 - Unexport various PAT primitives

 - Unexport per-CPU tlbstate

 - Provide an opt-in (prctl driven) mechanism to flush the L1D cache on context switch.
   The goal is to allow tasks that are paranoid due to the recent snoop assisted data
   sampling vulnerabilites, to flush their L1D on being switched out.
   This protects their data from being snooped or leaked via side channels
   after the task has context switched out.

Signed-off-by: Ingo Molnar <mingo@...nel.org>

  out-of-topic modifications in x86/mm:
  ---------------------------------------
  include/uapi/linux/prctl.h         # edf7ce0b231c: prctl: Hook L1D flushing in 

 Thanks,

	Ingo

------------------>
Balbir Singh (7):
      x86/kvm: Refactor L1D flush page management
      x86/kvm: Refactor L1D flush operations
      x86/mm: Refactor cond_ibpb() to support other use cases
      x86/kvm: Refactor L1D flushing
      x86/mm: Optionally flush L1D on context switch
      prctl: Hook L1D flushing in via prctl
      Documentation: Add L1D flushing Documentation

Borislav Petkov (1):
      x86/tlb/uv: Add a forward declaration for struct flush_tlb_info

Christoph Hellwig (5):
      x86/mm: Add a x86_has_pat_wp() helper
      x86/mm: Move pgprot2cachemode out of line
      x86/mm: Cleanup pgprot_4k_2_large() and pgprot_large_2_4k()
      x86/mm: Unexport __cachemode2pte_tbl
      x86/mm: Use pgprotval_t in protval_4k_2_large() and protval_large_2_4k()

Thomas Gleixner (17):
      x86/tlb: Uninline __get_current_cr3_fast()
      x86/cpu: Uninline CR4 accessors
      x86/cr4: Sanitize CR4.PCE update
      x86/alternatives: Move temporary_mm helpers into C
      x86/tlb: Move __flush_tlb() out of line
      x86/tlb: Move __flush_tlb_global() out of line
      x86/tlb: Move __flush_tlb_one_user() out of line
      x86/tlb: Move __flush_tlb_one_kernel() out of line
      x86/tlb: Move flush_tlb_others() out of line
      x86/tlb: Move __flush_tlb_all() out of line
      x86/tlb: Move paravirt_tlb_remove_table() to the usage site
      x86/tlb: Move cr4_set_bits_and_update_boot() to the usage site
      x86/tlb: Uninline nmi_uaccess_okay()
      x86/tlb: Move PCID helpers where they are used
      xen/privcmd: Remove unneeded asm/tlb.h include
      x86/tlb: Restrict access to tlbstate
      x86/cpu: Export native_write_cr4() only when CONFIG_LKTDM=m


 Documentation/admin-guide/hw-vuln/index.rst     |   1 +
 Documentation/admin-guide/hw-vuln/l1d_flush.rst |  51 +++
 Documentation/userspace-api/spec_ctrl.rst       |   7 +
 arch/x86/events/core.c                          |  11 +-
 arch/x86/include/asm/cacheflush.h               |   8 +
 arch/x86/include/asm/memtype.h                  |   3 +
 arch/x86/include/asm/mmu_context.h              |  88 +----
 arch/x86/include/asm/paravirt.h                 |  12 +-
 arch/x86/include/asm/pgtable_32.h               |   2 +-
 arch/x86/include/asm/pgtable_types.h            |  44 +--
 arch/x86/include/asm/thread_info.h              |   9 +-
 arch/x86/include/asm/tlbflush.h                 | 443 +++-------------------
 arch/x86/include/asm/uv/uv.h                    |   1 +
 arch/x86/kernel/Makefile                        |   1 +
 arch/x86/kernel/alternative.c                   |  55 +++
 arch/x86/kernel/cpu/bugs.c                      |  28 ++
 arch/x86/kernel/cpu/common.c                    |  25 +-
 arch/x86/kernel/cpu/mtrr/generic.c              |   4 +-
 arch/x86/kernel/l1d_flush.c                     | 120 ++++++
 arch/x86/kernel/paravirt.c                      |  21 +-
 arch/x86/kernel/process.c                       |  11 +
 arch/x86/kvm/vmx/vmx.c                          |  62 +---
 arch/x86/mm/init.c                              |  44 ++-
 arch/x86/mm/init_64.c                           |   4 +-
 arch/x86/mm/ioremap.c                           |  10 +-
 arch/x86/mm/kmmio.c                             |   2 +-
 arch/x86/mm/mem_encrypt.c                       |   2 +-
 arch/x86/mm/pat/set_memory.c                    |   7 +-
 arch/x86/mm/pgtable.c                           |  16 +-
 arch/x86/mm/pgtable_32.c                        |   2 +-
 arch/x86/mm/tlb.c                               | 471 ++++++++++++++++++++++--
 arch/x86/platform/uv/tlb_uv.c                   |   4 +-
 drivers/xen/privcmd.c                           |   1 -
 include/uapi/linux/prctl.h                      |   1 +
 34 files changed, 899 insertions(+), 672 deletions(-)
 create mode 100644 Documentation/admin-guide/hw-vuln/l1d_flush.rst
 create mode 100644 arch/x86/kernel/l1d_flush.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ