lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEJ9NQdhh+4GxrtG1DuYgqYhvc0hi-sKZh-2niukJ-MyFLntAA@mail.gmail.com>
Date: Tue, 9 Jul 2024 13:21:44 +0530
From: "Shanavas.K.S" <shanavasks@...il.com>
To: linux-kernel@...r.kernel.org
Subject: intel CPU vulnerability NO_SSB whitelist for AIRMONT

Hi All,
This is in reference to
https://github.com/torvalds/linux/blame/master/arch/x86/kernel/cpu/common.c#L1169.
The whitelist for INTEL_ATOM_AIRMONT has NO_SSB enabled  which means
cache speculation vulnerability(spectre 4,CVE-2018-3639) is not
applicable to  this processor. But NO_SSB is not set for
INTEL_ATOM_AIRMONT_NP and INTEL_ATOM_AIRMONT_MID. Are these settings
missing for AIRMONT_NP and AIRMONT_MID or is there a real difference
between cache speculation between these processors?

regards
Shanavas

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ