Re: [PATCH AUTOSEL 5.10 05/25] x86/bugs: Report AMD retbleed vulnerability

From: Greg KH
Date: Wed Jul 20 2022 - 03:48:38 EST


On Tue, Jul 19, 2022 at 09:15:56PM -0400, Sasha Levin wrote:
> From: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
>
> [ Upstream commit 6b80b59b3555706508008f1f127b5412c89c7fd8 ]
>
> Report that AMD x86 CPUs are vulnerable to the RETBleed (Arbitrary
> Speculative Code Execution with Return Instructions) attack.
>
> [peterz: add hygon]
> [kim: invert parity; fam15h]
>
> Co-developed-by: Kim Phillips <kim.phillips@xxxxxxx>
> Signed-off-by: Kim Phillips <kim.phillips@xxxxxxx>
> Signed-off-by: Alexandre Chartre <alexandre.chartre@xxxxxxxxxx>
> Signed-off-by: Peter Zijlstra (Intel) <peterz@xxxxxxxxxxxxx>
> Signed-off-by: Borislav Petkov <bp@xxxxxxx>
> Reviewed-by: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
> Signed-off-by: Borislav Petkov <bp@xxxxxxx>
> Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>
> ---
> arch/x86/include/asm/cpufeatures.h | 1 +
> arch/x86/kernel/cpu/bugs.c | 13 +++++++++++++
> arch/x86/kernel/cpu/common.c | 19 +++++++++++++++++++
> drivers/base/cpu.c | 8 ++++++++
> include/linux/cpu.h | 2 ++
> 5 files changed, 43 insertions(+)

This part of the larger retbleed series already queued up, so no need to
add it again.

thanks,

greg k-h