On Tue, Jul 19, 2022 at 09:15:56PM -0400, Sasha Levin wrote: > From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx> > > [ Upstream commit 6b80b59b3555706508008f1f127b5412c89c7fd8 ] > > Report that AMD x86 CPUs are vulnerable to the RETBleed (Arbitrary > Speculative Code Execution with Return Instructions) attack. > > [peterz: add hygon] > [kim: invert parity; fam15h] > > Co-developed-by: Kim Phillips <kim.phillips@xxxxxxx> > Signed-off-by: Kim Phillips <kim.phillips@xxxxxxx> > Signed-off-by: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx> > Signed-off-by: Peter Zijlstra (Intel) <peterz@xxxxxxxxxxxxx> > Signed-off-by: Borislav Petkov <bp@xxxxxxx> > Reviewed-by: Josh Poimboeuf <jpoimboe@xxxxxxxxxx> > Signed-off-by: Borislav Petkov <bp@xxxxxxx> > Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx> > --- > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/kernel/cpu/bugs.c | 13 +++++++++++++ > arch/x86/kernel/cpu/common.c | 19 +++++++++++++++++++ > drivers/base/cpu.c | 8 ++++++++ > include/linux/cpu.h | 2 ++ > 5 files changed, 43 insertions(+) This part of the larger retbleed series already queued up, so no need to add it again. thanks, greg k-h