public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors
@ 2024-04-02  8:48 Ashwin Dayanand Kamat
  2024-04-05  9:31 ` Greg KH
  0 siblings, 1 reply; 2+ messages in thread
From: Ashwin Dayanand Kamat @ 2024-04-02  8:48 UTC (permalink / raw)
  To: stable, gregkh
  Cc: tglx, mingo, bp, x86, hpa, linux-kernel, ajay.kaher,
	alexey.makhalov, vasavi.sirnapalli, Pu Wen, Ingo Molnar,
	Ashwin Dayanand Kamat

From: Pu Wen <puwen@hygon.cn>

[Upstream commit a5ef7d68cea1344cf524f04981c2b3f80bedbb0d]

Add mitigation for the speculative return stack overflow vulnerability
which exists on Hygon processors too.

Signed-off-by: Pu Wen <puwen@hygon.cn>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Acked-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: <stable@vger.kernel.org>
Link: https://lore.kernel.org/r/tencent_4A14812842F104E93AA722EC939483CEFF05@qq.com
Signed-off-by: Ashwin Dayanand Kamat <ashwin.kamat@broadcom.com>
---
 arch/x86/kernel/cpu/common.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c
index 4ecc6072e..8aa43c8ca 100644
--- a/arch/x86/kernel/cpu/common.c
+++ b/arch/x86/kernel/cpu/common.c
@@ -1168,7 +1168,7 @@ static const struct x86_cpu_id cpu_vuln_blacklist[] __initconst = {
 	VULNBL_AMD(0x15, RETBLEED),
 	VULNBL_AMD(0x16, RETBLEED),
 	VULNBL_AMD(0x17, RETBLEED | SRSO),
-	VULNBL_HYGON(0x18, RETBLEED),
+	VULNBL_HYGON(0x18, RETBLEED | SRSO),
 	VULNBL_AMD(0x19, SRSO),
 	{}
 };
-- 
2.35.6


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors
  2024-04-02  8:48 [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors Ashwin Dayanand Kamat
@ 2024-04-05  9:31 ` Greg KH
  0 siblings, 0 replies; 2+ messages in thread
From: Greg KH @ 2024-04-05  9:31 UTC (permalink / raw)
  To: Ashwin Dayanand Kamat
  Cc: stable, tglx, mingo, bp, x86, hpa, linux-kernel, ajay.kaher,
	alexey.makhalov, vasavi.sirnapalli, Pu Wen, Ingo Molnar

On Tue, Apr 02, 2024 at 02:18:09PM +0530, Ashwin Dayanand Kamat wrote:
> From: Pu Wen <puwen@hygon.cn>
> 
> [Upstream commit a5ef7d68cea1344cf524f04981c2b3f80bedbb0d]
> 
> Add mitigation for the speculative return stack overflow vulnerability
> which exists on Hygon processors too.
> 
> Signed-off-by: Pu Wen <puwen@hygon.cn>
> Signed-off-by: Ingo Molnar <mingo@kernel.org>
> Acked-by: Borislav Petkov (AMD) <bp@alien8.de>
> Cc: <stable@vger.kernel.org>
> Link: https://lore.kernel.org/r/tencent_4A14812842F104E93AA722EC939483CEFF05@qq.com
> Signed-off-by: Ashwin Dayanand Kamat <ashwin.kamat@broadcom.com>

Now queued up, thanks.

greg k-h

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-04-05  9:31 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-04-02  8:48 [PATCH v5.10] x86/srso: Add SRSO mitigation for Hygon processors Ashwin Dayanand Kamat
2024-04-05  9:31 ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox