From patchwork Wed May 29 02:28:47 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tyler Hicks X-Patchwork-Id: 1106728 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 45DF5V45b8z9sB8; Wed, 29 May 2019 12:29:02 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1hVoKo-0005Oo-T5; Wed, 29 May 2019 02:28:58 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1hVoKn-0005Nu-3k for kernel-team@lists.ubuntu.com; Wed, 29 May 2019 02:28:57 +0000 Received: from 2.general.tyhicks.us.vpn ([10.172.64.53] helo=sec.ubuntu-ci) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1hVoKm-0004fy-JL; Wed, 29 May 2019 02:28:56 +0000 From: Tyler Hicks To: kernel-team@lists.ubuntu.com Subject: [PATCH 0/4][SRU][X] MDS: Update mitigation patches to match upstream Date: Wed, 29 May 2019 02:28:47 +0000 Message-Id: <1559096931-14602-1-git-send-email-tyhicks@canonical.com> X-Mailer: git-send-email 2.7.4 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This series updates our MDS mitigation patches to match the latest upstream patches in order to make future backports easier. The SAUCE patch's description should explain itself clearly but, to summarize, it is needed in order to bring the patches that we shipped on May 14th up to the final revision of those patches. The final three patches simply update the documentation. The build logs are clean. I've smoke tested these changes in a VM. CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 Tyler Josh Poimboeuf (1): x86/speculation/mds: Fix documentation typo Tyler Hicks (2): UBUNTU: SAUCE: Synchronize MDS mitigations with upstream Documentation: Correct the possible MDS sysfs values speck for Pawan Gupta (1): x86/mds: Add MDSUM variant to the MDS documentation Documentation/ABI/testing/sysfs-devices-system-cpu | 3 +-- Documentation/admin-guide/hw-vuln/mds.rst | 30 ++++++++++------------ Documentation/kernel-parameters.txt | 4 ++- Documentation/x86/mds.rst | 7 ++++- arch/x86/kernel/cpu/bugs.c | 18 +++++++------ arch/x86/kernel/cpu/common.c | 10 ++++---- arch/x86/kvm/vmx.c | 5 ++-- 7 files changed, 41 insertions(+), 36 deletions(-) Acked-by: Juerg Haefliger Acked-by: Kleber Sacilotto de Souza