]> git.baikalelectronics.ru Git - kernel.git/commit
x86/bugs: Report AMD retbleed vulnerability
authorAlexandre Chartre <alexandre.chartre@oracle.com>
Mon, 3 Oct 2022 13:10:09 +0000 (10:10 -0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 7 Oct 2022 07:16:54 +0000 (09:16 +0200)
commitf61a93322759fc25f1e5a53ea86f9d4df11ad8fe
tree9c97ac3b52bbdb9b23f430d32b2e5ab3f7374900
parentdfda4ef65e48f04249bb69616a2daecf61328588
x86/bugs: Report AMD retbleed vulnerability

commit d890e1e06a2145b17eefa6d1bae78728833579cb upstream.

Report that AMD x86 CPUs are vulnerable to the RETBleed (Arbitrary
Speculative Code Execution with Return Instructions) attack.

  [peterz: add hygon]
  [kim: invert parity; fam15h]

Co-developed-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Alexandre Chartre <alexandre.chartre@oracle.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
[cascardo: adjusted BUG numbers to match upstream]
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/include/asm/cpufeatures.h
arch/x86/kernel/cpu/bugs.c
arch/x86/kernel/cpu/common.c
drivers/base/cpu.c
include/linux/cpu.h