Searched hist:"639475 d4" (Results 1 – 5 of 5) sorted by relevance
/openbmc/linux/arch/x86/kernel/cpu/ |
H A D | vortex.c | 639475d4 Sun Oct 17 04:44:10 CDT 2021 Marcos Del Sol Vives <marcos@orca.pet> x86/CPU: Add support for Vortex CPUs
DM&P devices were not being properly identified, which resulted in unneeded Spectre/Meltdown mitigations being applied.
The manufacturer states that these devices execute always in-order and don't support either speculative execution or branch prediction, so they are not vulnerable to this class of attack. [1]
This is something I've personally tested by a simple timing analysis on my Vortex86MX CPU, and can confirm it is true.
Add identification for some devices that lack the CPUID product name call, so they appear properly on /proc/cpuinfo.
¹https://www.ssv-embedded.de/doks/infos/DMP_Ann_180108_Meltdown.pdf
[ bp: Massage commit message. ]
Signed-off-by: Marcos Del Sol Vives <marcos@orca.pet> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20211017094408.1512158-1-marcos@orca.pet
|
H A D | Makefile | 639475d4 Sun Oct 17 04:44:10 CDT 2021 Marcos Del Sol Vives <marcos@orca.pet> x86/CPU: Add support for Vortex CPUs
DM&P devices were not being properly identified, which resulted in unneeded Spectre/Meltdown mitigations being applied.
The manufacturer states that these devices execute always in-order and don't support either speculative execution or branch prediction, so they are not vulnerable to this class of attack. [1]
This is something I've personally tested by a simple timing analysis on my Vortex86MX CPU, and can confirm it is true.
Add identification for some devices that lack the CPUID product name call, so they appear properly on /proc/cpuinfo.
¹https://www.ssv-embedded.de/doks/infos/DMP_Ann_180108_Meltdown.pdf
[ bp: Massage commit message. ]
Signed-off-by: Marcos Del Sol Vives <marcos@orca.pet> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20211017094408.1512158-1-marcos@orca.pet
|
H A D | common.c | 639475d4 Sun Oct 17 04:44:10 CDT 2021 Marcos Del Sol Vives <marcos@orca.pet> x86/CPU: Add support for Vortex CPUs
DM&P devices were not being properly identified, which resulted in unneeded Spectre/Meltdown mitigations being applied.
The manufacturer states that these devices execute always in-order and don't support either speculative execution or branch prediction, so they are not vulnerable to this class of attack. [1]
This is something I've personally tested by a simple timing analysis on my Vortex86MX CPU, and can confirm it is true.
Add identification for some devices that lack the CPUID product name call, so they appear properly on /proc/cpuinfo.
¹https://www.ssv-embedded.de/doks/infos/DMP_Ann_180108_Meltdown.pdf
[ bp: Massage commit message. ]
Signed-off-by: Marcos Del Sol Vives <marcos@orca.pet> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20211017094408.1512158-1-marcos@orca.pet
|
/openbmc/linux/arch/x86/ |
H A D | Kconfig.cpu | 639475d4 Sun Oct 17 04:44:10 CDT 2021 Marcos Del Sol Vives <marcos@orca.pet> x86/CPU: Add support for Vortex CPUs
DM&P devices were not being properly identified, which resulted in unneeded Spectre/Meltdown mitigations being applied.
The manufacturer states that these devices execute always in-order and don't support either speculative execution or branch prediction, so they are not vulnerable to this class of attack. [1]
This is something I've personally tested by a simple timing analysis on my Vortex86MX CPU, and can confirm it is true.
Add identification for some devices that lack the CPUID product name call, so they appear properly on /proc/cpuinfo.
¹https://www.ssv-embedded.de/doks/infos/DMP_Ann_180108_Meltdown.pdf
[ bp: Massage commit message. ]
Signed-off-by: Marcos Del Sol Vives <marcos@orca.pet> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20211017094408.1512158-1-marcos@orca.pet
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | processor.h | 639475d4 Sun Oct 17 04:44:10 CDT 2021 Marcos Del Sol Vives <marcos@orca.pet> x86/CPU: Add support for Vortex CPUs
DM&P devices were not being properly identified, which resulted in unneeded Spectre/Meltdown mitigations being applied.
The manufacturer states that these devices execute always in-order and don't support either speculative execution or branch prediction, so they are not vulnerable to this class of attack. [1]
This is something I've personally tested by a simple timing analysis on my Vortex86MX CPU, and can confirm it is true.
Add identification for some devices that lack the CPUID product name call, so they appear properly on /proc/cpuinfo.
¹https://www.ssv-embedded.de/doks/infos/DMP_Ann_180108_Meltdown.pdf
[ bp: Massage commit message. ]
Signed-off-by: Marcos Del Sol Vives <marcos@orca.pet> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20211017094408.1512158-1-marcos@orca.pet
|