[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <YtgvOvOdl8shwAlw@sashalap>
Date: Wed, 20 Jul 2022 12:37:14 -0400
From: Sasha Levin <sashal@...nel.org>
To: Greg KH <gregkh@...uxfoundation.org>
Cc: linux-kernel@...r.kernel.org, stable@...r.kernel.org,
Alexandre Chartre <alexandre.chartre@...cle.com>,
Kim Phillips <kim.phillips@....com>,
Peter Zijlstra <peterz@...radead.org>,
Borislav Petkov <bp@...e.de>,
Josh Poimboeuf <jpoimboe@...nel.org>, tglx@...utronix.de,
mingo@...hat.com, bp@...en8.de, dave.hansen@...ux.intel.com,
x86@...nel.org, pbonzini@...hat.com, chang.seok.bae@...el.com,
pawan.kumar.gupta@...ux.intel.com, babu.moger@....com,
jmattson@...gle.com, jing2.liu@...el.com, sandipan.das@....com,
sblbir@...zon.com, keescook@...omium.org, tony.luck@...el.com,
jane.malalane@...rix.com, bigeasy@...utronix.de
Subject: Re: [PATCH AUTOSEL 5.10 05/25] x86/bugs: Report AMD retbleed
vulnerability
On Wed, Jul 20, 2022 at 09:48:24AM +0200, Greg KH wrote:
>On Tue, Jul 19, 2022 at 09:15:56PM -0400, Sasha Levin wrote:
>> From: Alexandre Chartre <alexandre.chartre@...cle.com>
>>
>> [ Upstream commit 6b80b59b3555706508008f1f127b5412c89c7fd8 ]
>>
>> Report that AMD x86 CPUs are vulnerable to the RETBleed (Arbitrary
>> Speculative Code Execution with Return Instructions) attack.
>>
>> [peterz: add hygon]
>> [kim: invert parity; fam15h]
>>
>> Co-developed-by: Kim Phillips <kim.phillips@....com>
>> Signed-off-by: Kim Phillips <kim.phillips@....com>
>> Signed-off-by: Alexandre Chartre <alexandre.chartre@...cle.com>
>> Signed-off-by: Peter Zijlstra (Intel) <peterz@...radead.org>
>> Signed-off-by: Borislav Petkov <bp@...e.de>
>> Reviewed-by: Josh Poimboeuf <jpoimboe@...nel.org>
>> Signed-off-by: Borislav Petkov <bp@...e.de>
>> Signed-off-by: Sasha Levin <sashal@...nel.org>
>> ---
>> arch/x86/include/asm/cpufeatures.h | 1 +
>> arch/x86/kernel/cpu/bugs.c | 13 +++++++++++++
>> arch/x86/kernel/cpu/common.c | 19 +++++++++++++++++++
>> drivers/base/cpu.c | 8 ++++++++
>> include/linux/cpu.h | 2 ++
>> 5 files changed, 43 insertions(+)
>
>This part of the larger retbleed series already queued up, so no need to
>add it again.
All of these weren't part of anything that was queued up. I've actually
ended up queueing this one up since it was a dependency for a patch with
a Fixes tag, but all of this AUTOSEL batch wasn't part of the retbleed
series you've queued up a week ago.
--
Thanks,
Sasha
Powered by blists - more mailing lists