Message ID | 20220610082003.2548-1-rsalvaterra@gmail.com |
---|---|
State | Superseded |
Delegated to: | Rui Salvaterra |
Headers | show
Return-Path: <openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=apupCs8F; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20210112 header.b=p4OWo5bK; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.openwrt.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=<UNKNOWN>) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4LKDZR1zLhz9s09 for <incoming@patchwork.ozlabs.org>; Fri, 10 Jun 2022 18:26:22 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=i3Lp7uA3QM9NPOCzci61EH0N+SljillHBSqqjaF/D+k=; b=apupCs8Ft6tX6F xv0XUHCIPwu7LBrXyaqS+kf3PEBof8yhBlJ4jgwCYI7isd/LidbzPpciqTo1aoi5lQM+ZWJGwuI6u 27EVTZoN5VvO4osCTywVD3Vaty1rMXnpquS8AhXKkiK38NgKxAAvwe9IEBeHXQwrZ9rSVlNUJZOco 7KM/XMLKcUamrLxwmCFI3DlXccfbrxH0Ifh7nfyOs55MFWmwe7ZWzT79/Go8AV/9SRUD/PdJ5QcE9 E4y7CC0YcSGZxVVryXucNimr6S9EAR7JkaMrJ3XOZxHY/V0HMwd4BUhbM9HZCGhnar1JOuDGxolGU 7eenik7GIGx3/yak8hwQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nzZsN-006jYs-4g; Fri, 10 Jun 2022 08:20:15 +0000 Received: from mail-ed1-x529.google.com ([2a00:1450:4864:20::529]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nzZsI-006jXT-1f for openwrt-devel@lists.openwrt.org; Fri, 10 Jun 2022 08:20:11 +0000 Received: by mail-ed1-x529.google.com with SMTP id w27so34192606edl.7 for <openwrt-devel@lists.openwrt.org>; Fri, 10 Jun 2022 01:20:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=YO2b5QFOAUz7Sd7dcFSiBYa2wQisRyJOGzh7aGyuP0I=; b=p4OWo5bKN+H19MEV8LyQkqG+3PM4TOXkir3mFg6WJpUyx7f7cVvO6GBFYygQwijf2l RyPJ7MuYJDGu//hXMxzQLE5pM3jJcjT+Lk/3AEeWfs6x96OSJD0bfkDDxrTlCerzwB94 vz1WFT7vGtcG9jCUOwOPLD9bggGrDAYl+FmsXcDLkgZ0ZH7uFmLW9Edonxjg6KZbMcP5 MnU0N8b6JaVT/1qnZVkY6aoS4F2fStRp7pCOh4LePWrYYK5VJOw9dujrn0w2sCVMUZKS jBodM7c56mKWfnETCUiGtdoZaOQXhCvYq/l0JM76Vbn6r8GsL/ef7UhswKNDEC+6NzDf mKnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=YO2b5QFOAUz7Sd7dcFSiBYa2wQisRyJOGzh7aGyuP0I=; b=5EmAhYQ7aJKe+bjctVVNyrkClWX2R31ElbhrkgN4I68f4DgmpVEq18UqtYRlowW0ma vSrBcvONmIZBO51fciwCiO85gT9AqUgo9PPaa2zlniUJO4BUwHrxdAZenw899KfUStP/ Rr4Fck0EK3NdGI3qfTnWaTqLuM9+WgWMAjKOtYEOIKCkpVBUgB/0kVVkmvbfv/8ZSQOi hQao/lpXVg4huHwoAwHeWt38Iz8lZtoRroOludozb6sExLoGMgXmAJhdS57R7mzq8IAv O/DoX8q+kngZ+0t2oAKO8ZjHa6/YAdj/UosFCjx5+wWt0MB/h/v29wruLxvYMjXJmLML /miA== X-Gm-Message-State: AOAM532s28YUR6GdyHlV5Y4vh5Lt/NvAmWl0Kckb7v2vz+BOX2KRDZ6k 4Ww9Vqcz8qaTQ2DdfL7gO07JwnWMTQ== X-Google-Smtp-Source: ABdhPJwJKox0a9Y+n3uVJ/2FU0oT2qazRlUXspzIOqtgOcyP3k3+J5MgZoVZnl7hyEA7z3kDhX4MPQ== X-Received: by 2002:a05:6402:2925:b0:42d:d019:1716 with SMTP id ee37-20020a056402292500b0042dd0191716mr49440683edb.110.1654849207349; Fri, 10 Jun 2022 01:20:07 -0700 (PDT) Received: from crystalwell.adb.lan (a95-93-117-213.cpe.netcabo.pt. [95.93.117.213]) by smtp.gmail.com with ESMTPSA id m11-20020a056402050b00b0042dd7e13391sm15873927edv.45.2022.06.10.01.20.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 10 Jun 2022 01:20:06 -0700 (PDT) From: Rui Salvaterra <rsalvaterra@gmail.com> To: openwrt-devel@lists.openwrt.org Cc: s.l-h@gmx.de, Rui Salvaterra <rsalvaterra@gmail.com> Subject: [PATCH] kernel 5.15: x86-64: enable CONFIG_SLS Date: Fri, 10 Jun 2022 09:20:03 +0100 Message-Id: <20220610082003.2548-1-rsalvaterra@gmail.com> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220610_012010_130912_9DF8544A X-CRM114-Status: UNSURE ( 6.49 ) X-CRM114-Notice: Please train this message. X-Spam-Score: -0.2 (/) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Starting with GCC 12, we have the possibility of mitigating straight-line speculation vulnerabilities in x86-64 targets. Make it so. Reported-by: Stefan Lippers-Hollmann Signed-off-by: Rui Salvaterra --- target/linux/x86/64/config-5.15 | 1 + 1 file changed, 1 insertion(+) Content analysis details: (-0.2 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2a00:1450:4864:20:0:0:0:529 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [rsalvaterra[at]gmail.com] -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: OpenWrt Development List <openwrt-devel.lists.openwrt.org> List-Unsubscribe: <https://lists.openwrt.org/mailman/options/openwrt-devel>, <mailto:openwrt-devel-request@lists.openwrt.org?subject=unsubscribe> List-Archive: <http://lists.openwrt.org/pipermail/openwrt-devel/> List-Post: <mailto:openwrt-devel@lists.openwrt.org> List-Help: <mailto:openwrt-devel-request@lists.openwrt.org?subject=help> List-Subscribe: <https://lists.openwrt.org/mailman/listinfo/openwrt-devel>, <mailto:openwrt-devel-request@lists.openwrt.org?subject=subscribe> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "openwrt-devel" <openwrt-devel-bounces@lists.openwrt.org> Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org |
Series |
kernel 5.15: x86-64: enable CONFIG_SLS
|
expand
|
Hi, everyone, On Fri, 10 Jun 2022 at 09:20, Rui Salvaterra <rsalvaterra@gmail.com> wrote: > > Starting with GCC 12, we have the possibility of mitigating straight-line > speculation vulnerabilities in x86-64 targets. Make it so. [patch snipped] I've made this part of the 5.15 pull request [1], so I'll mark it as superseded on Patchwork. Cheers, Rui [1] https://github.com/openwrt/openwrt/pull/10019/commits
diff --git a/target/linux/x86/64/config-5.15 b/target/linux/x86/64/config-5.15 index d168f3608e..5b50708ba1 100644 --- a/target/linux/x86/64/config-5.15 +++ b/target/linux/x86/64/config-5.15 @@ -400,6 +400,7 @@ CONFIG_SENSORS_K8TEMP=y CONFIG_SENSORS_VIA_CPUTEMP=y CONFIG_SERIAL_8250_PNP=y CONFIG_SERIAL_MCTRL_GPIO=y +CONFIG_SLS=y CONFIG_SMP=y CONFIG_SOCK_RX_QUEUE_MAPPING=y CONFIG_SPARSEMEM=y
Starting with GCC 12, we have the possibility of mitigating straight-line speculation vulnerabilities in x86-64 targets. Make it so. Reported-by: Stefan Lippers-Hollmann <s.l-h@gmx.de> Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com> --- target/linux/x86/64/config-5.15 | 1 + 1 file changed, 1 insertion(+)