Re: [PATCH 4.14 38/53] IB/hfi1: Fix Spectre v1 vulnerability

2019-08-26 Thread Gustavo A. R. Silva
On 8/26/19 4:06 AM, Greg Kroah-Hartman wrote: > > Can you provide backports that work if they really are needed? > It seems they aren't needed. Sorry about the noise. -- Gustavo

Re: [PATCH 4.14 38/53] IB/hfi1: Fix Spectre v1 vulnerability

2019-08-26 Thread Greg Kroah-Hartman
On Mon, Aug 05, 2019 at 09:16:36AM -0500, Gustavo A. R. Silva wrote: > Hi Greg, > > Can you please add these other two patches to stable: > > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d64062b57eeb58d4928aed945515bf53f7944913 Does not apply :( >

Re: [PATCH 4.14 38/53] IB/hfi1: Fix Spectre v1 vulnerability

2019-08-05 Thread Gustavo A. R. Silva
Hi Greg, Can you please add these other two patches to stable: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d64062b57eeb58d4928aed945515bf53f7944913

[PATCH 4.14 38/53] IB/hfi1: Fix Spectre v1 vulnerability

2019-08-05 Thread Greg Kroah-Hartman
From: Gustavo A. R. Silva commit 6497d0a9c53df6e98b25e2b79f2295d7caa47b6e upstream. sl is controlled by user-space, hence leading to a potential exploitation of the Spectre variant 1 vulnerability. Fix this by sanitizing sl before using it to index ibp->sl_to_sc. Notice that given that