lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250915134706.3201818-1-david.kaplan@amd.com>
Date: Mon, 15 Sep 2025 08:46:59 -0500
From: David Kaplan <david.kaplan@....com>
To: Thomas Gleixner <tglx@...utronix.de>, Borislav Petkov <bp@...en8.de>,
	Peter Zijlstra <peterz@...radead.org>, Josh Poimboeuf <jpoimboe@...nel.org>,
	Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>, Ingo Molnar
	<mingo@...hat.com>, Dave Hansen <dave.hansen@...ux.intel.com>,
	<x86@...nel.org>, "H . Peter Anvin" <hpa@...or.com>
CC: <linux-kernel@...r.kernel.org>
Subject: [PATCH v3 0/7] Bugs clean-up

Various minor clean-ups and bug fixes related to mitigations.

Patches 1-3 focus on cleaning up parameter parsing.  Most mitigations use
early_param but a few older ones do not and look at boot_command_line
directly.  Modify these to be consistent with the newer ones.

Patch 4 cleans up some straggling unecessary calls to
cpu_mitigations_off().

Patches 5-7 (new in this version of the series) fix some minor bugs related
to the behavior of and reporting of certain command line options.

Note that v2 of this series included a patch for SSB attack vector controls
but this has already been merged.

Changes from v2
   - Fixed bugs pointed out by Josh on Kconfig settings
   - Added patches 5-7

Changes from v1
   - Removed spec_*_print_cond() functions
   - Fixed bugs pointed out by Pawan
   - Added last 2 patches

David Kaplan (7):
  x86/bugs: Use early_param for spectre_v2_user
  x86/bugs: Use early_param for spectre_v2
  x86/bugs: Simplify SSB cmdline parsing
  x86/bugs: Remove uses of cpu_mitigations_off()
  x86/bugs: Fix spectre_v2 forcing
  x86/bugs: Fix reporting of LFENCE retpoline
  x86/bugs: Report correct retbleed mitigation status

 arch/x86/include/asm/nospec-branch.h |   1 +
 arch/x86/kernel/cpu/bugs.c           | 403 +++++++++++----------------
 2 files changed, 168 insertions(+), 236 deletions(-)


base-commit: 584a19f9b54926dd1d3fec0a1e9b1fde801d9f23
-- 
2.34.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ