[PATCH] x86/bugs: Add missing NO_SSB flag

Daniel Sneddon posted 1 patch 1 year, 3 months ago
There is a newer version of this series
arch/x86/kernel/cpu/common.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
[PATCH] x86/bugs: Add missing NO_SSB flag
Posted by Daniel Sneddon 1 year, 3 months ago
The Moorefield and Lightning Mountain Atom processors are
missing the NO_SSB flag in the vulnerabilities whitelist.
This will cause unaffected parts to incorrectly be reported
as vulnerable. Add the missing flag.

Signed-off-by: Daniel Sneddon <daniel.sneddon@linux.intel.com>
---
 arch/x86/kernel/cpu/common.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c
index d4e539d4e158..be307c9ef263 100644
--- a/arch/x86/kernel/cpu/common.c
+++ b/arch/x86/kernel/cpu/common.c
@@ -1165,8 +1165,8 @@ static const __initconst struct x86_cpu_id cpu_vuln_whitelist[] = {
 
 	VULNWL_INTEL(INTEL_CORE_YONAH,		NO_SSB),
 
-	VULNWL_INTEL(INTEL_ATOM_AIRMONT_MID,	NO_L1TF | MSBDS_ONLY | NO_SWAPGS | NO_ITLB_MULTIHIT),
-	VULNWL_INTEL(INTEL_ATOM_AIRMONT_NP,	NO_L1TF | NO_SWAPGS | NO_ITLB_MULTIHIT),
+	VULNWL_INTEL(INTEL_ATOM_AIRMONT_MID,	NO_SSB | NO_L1TF | NO_SWAPGS | NO_ITLB_MULTIHIT | MSBDS_ONLY),
+	VULNWL_INTEL(INTEL_ATOM_AIRMONT_NP,	NO_SSB | NO_L1TF | NO_SWAPGS | NO_ITLB_MULTIHIT),
 
 	VULNWL_INTEL(INTEL_ATOM_GOLDMONT,	NO_MDS | NO_L1TF | NO_SWAPGS | NO_ITLB_MULTIHIT | NO_MMIO),
 	VULNWL_INTEL(INTEL_ATOM_GOLDMONT_D,	NO_MDS | NO_L1TF | NO_SWAPGS | NO_ITLB_MULTIHIT | NO_MMIO),
-- 
2.25.1
Re: [PATCH] x86/bugs: Add missing NO_SSB flag
Posted by Dave Hansen 1 year, 3 months ago
On 8/28/24 15:40, Daniel Sneddon wrote:
> The Moorefield and Lightning Mountain Atom processors are
> missing the NO_SSB flag in the vulnerabilities whitelist.
> This will cause unaffected parts to incorrectly be reported
> as vulnerable. Add the missing flag.

It'd be really cool to add two things to these changelogs: First, who
figured this out and how?  Basically, who cares and why?  Second, what
public Intel documentation supports this change?
Re: [PATCH] x86/bugs: Add missing NO_SSB flag
Posted by Daniel Sneddon 1 year, 3 months ago
On 8/28/24 16:36, Dave Hansen wrote:
> On 8/28/24 15:40, Daniel Sneddon wrote:
>> The Moorefield and Lightning Mountain Atom processors are
>> missing the NO_SSB flag in the vulnerabilities whitelist.
>> This will cause unaffected parts to incorrectly be reported
>> as vulnerable. Add the missing flag.
> 
> It'd be really cool to add two things to these changelogs: First, who
> figured this out and how?  Basically, who cares and why?  Second, what
> public Intel documentation supports this change?

The first thing I can do no problem. The second..... :(
Re: [PATCH] x86/bugs: Add missing NO_SSB flag
Posted by Dave Hansen 1 year, 3 months ago
On 8/28/24 16:50, Daniel Sneddon wrote:
> On 8/28/24 16:36, Dave Hansen wrote:
>> On 8/28/24 15:40, Daniel Sneddon wrote:
>>> The Moorefield and Lightning Mountain Atom processors are
>>> missing the NO_SSB flag in the vulnerabilities whitelist.
>>> This will cause unaffected parts to incorrectly be reported
>>> as vulnerable. Add the missing flag.
>> It'd be really cool to add two things to these changelogs: First, who
>> figured this out and how?  Basically, who cares and why?  Second, what
>> public Intel documentation supports this change?
> The first thing I can do no problem. The second..... 🙁

Heh, I went looking just after I asked.  These CPUs are ghosts as far as
the docs are concerned.  I assume because they are end-of-life'd (or
whatever the proper name is).  But even saying _that_ in the changelog
would be helpful.
Re: [PATCH] x86/bugs: Add missing NO_SSB flag
Posted by Daniel Sneddon 1 year, 3 months ago
On 8/28/24 16:54, Dave Hansen wrote:
> On 8/28/24 16:50, Daniel Sneddon wrote:
>> On 8/28/24 16:36, Dave Hansen wrote:
>>> On 8/28/24 15:40, Daniel Sneddon wrote:
>>>> The Moorefield and Lightning Mountain Atom processors are
>>>> missing the NO_SSB flag in the vulnerabilities whitelist.
>>>> This will cause unaffected parts to incorrectly be reported
>>>> as vulnerable. Add the missing flag.
>>> It'd be really cool to add two things to these changelogs: First, who
>>> figured this out and how?  Basically, who cares and why?  Second, what
>>> public Intel documentation supports this change?
>> The first thing I can do no problem. The second..... 🙁
> 
> Heh, I went looking just after I asked.  These CPUs are ghosts as far as
> the docs are concerned.  I assume because they are end-of-life'd (or
> whatever the proper name is).  But even saying _that_ in the changelog
> would be helpful.

Will do!