Re: [PATCH AUTOSEL 5.10 05/25] x86/bugs: Report AMD retbleed vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jul 19, 2022 at 09:15:56PM -0400, Sasha Levin wrote:
> From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
> 
> [ Upstream commit 6b80b59b3555706508008f1f127b5412c89c7fd8 ]
> 
> Report that AMD x86 CPUs are vulnerable to the RETBleed (Arbitrary
> Speculative Code Execution with Return Instructions) attack.
> 
>   [peterz: add hygon]
>   [kim: invert parity; fam15h]
> 
> Co-developed-by: Kim Phillips <kim.phillips@xxxxxxx>
> Signed-off-by: Kim Phillips <kim.phillips@xxxxxxx>
> Signed-off-by: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
> Signed-off-by: Peter Zijlstra (Intel) <peterz@xxxxxxxxxxxxx>
> Signed-off-by: Borislav Petkov <bp@xxxxxxx>
> Reviewed-by: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
> Signed-off-by: Borislav Petkov <bp@xxxxxxx>
> Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>
> ---
>  arch/x86/include/asm/cpufeatures.h |  1 +
>  arch/x86/kernel/cpu/bugs.c         | 13 +++++++++++++
>  arch/x86/kernel/cpu/common.c       | 19 +++++++++++++++++++
>  drivers/base/cpu.c                 |  8 ++++++++
>  include/linux/cpu.h                |  2 ++
>  5 files changed, 43 insertions(+)

This part of the larger retbleed series already queued up, so no need to
add it again.

thanks,

greg k-h



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux