* [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors
@ 2024-04-02 8:48 Ashwin Dayanand Kamat
2024-04-05 9:31 ` Greg KH
0 siblings, 1 reply; 2+ messages in thread
From: Ashwin Dayanand Kamat @ 2024-04-02 8:48 UTC (permalink / raw)
To: stable, gregkh
Cc: tglx, mingo, bp, x86, hpa, linux-kernel, ajay.kaher,
alexey.makhalov, vasavi.sirnapalli, Pu Wen, Ingo Molnar,
Ashwin Dayanand Kamat
From: Pu Wen <puwen@hygon.cn>
[Upstream commit a5ef7d68cea1344cf524f04981c2b3f80bedbb0d]
Add mitigation for the speculative return stack overflow vulnerability
which exists on Hygon processors too.
Signed-off-by: Pu Wen <puwen@hygon.cn>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Acked-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: <stable@vger.kernel.org>
Link: https://lore.kernel.org/r/tencent_4A14812842F104E93AA722EC939483CEFF05@qq.com
Signed-off-by: Ashwin Dayanand Kamat <ashwin.kamat@broadcom.com>
---
arch/x86/kernel/cpu/common.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c
index 4ecc6072e..8aa43c8ca 100644
--- a/arch/x86/kernel/cpu/common.c
+++ b/arch/x86/kernel/cpu/common.c
@@ -1168,7 +1168,7 @@ static const struct x86_cpu_id cpu_vuln_blacklist[] __initconst = {
VULNBL_AMD(0x15, RETBLEED),
VULNBL_AMD(0x16, RETBLEED),
VULNBL_AMD(0x17, RETBLEED | SRSO),
- VULNBL_HYGON(0x18, RETBLEED),
+ VULNBL_HYGON(0x18, RETBLEED | SRSO),
VULNBL_AMD(0x19, SRSO),
{}
};
--
2.35.6
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors
2024-04-02 8:48 [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors Ashwin Dayanand Kamat
@ 2024-04-05 9:31 ` Greg KH
0 siblings, 0 replies; 2+ messages in thread
From: Greg KH @ 2024-04-05 9:31 UTC (permalink / raw)
To: Ashwin Dayanand Kamat
Cc: stable, tglx, mingo, bp, x86, hpa, linux-kernel, ajay.kaher,
alexey.makhalov, vasavi.sirnapalli, Pu Wen, Ingo Molnar
On Tue, Apr 02, 2024 at 02:18:09PM +0530, Ashwin Dayanand Kamat wrote:
> From: Pu Wen <puwen@hygon.cn>
>
> [Upstream commit a5ef7d68cea1344cf524f04981c2b3f80bedbb0d]
>
> Add mitigation for the speculative return stack overflow vulnerability
> which exists on Hygon processors too.
>
> Signed-off-by: Pu Wen <puwen@hygon.cn>
> Signed-off-by: Ingo Molnar <mingo@kernel.org>
> Acked-by: Borislav Petkov (AMD) <bp@alien8.de>
> Cc: <stable@vger.kernel.org>
> Link: https://lore.kernel.org/r/tencent_4A14812842F104E93AA722EC939483CEFF05@qq.com
> Signed-off-by: Ashwin Dayanand Kamat <ashwin.kamat@broadcom.com>
Now queued up, thanks.
greg k-h
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2024-04-05 9:31 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-04-02 8:48 [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors Ashwin Dayanand Kamat
2024-04-05 9:31 ` Greg KH
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox