diff options
author | 2025-01-21 08:22:40 -0800 | |
---|---|---|
committer | 2025-01-21 08:22:40 -0800 | |
commit | d80825ee4a34a1b108aee51cd0302be0ab7943fa (patch) | |
tree | a9fedf8b4d0489da4ad19b4fda0c6b108f7b48e0 /arch/x86/kernel/cpu/common.c | |
parent | Merge tag 'edac_updates_for_v6.14' of git://git.kernel.org/pub/scm/linux/kernel/git/ras/ras (diff) | |
parent | KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (diff) | |
download | linux-rng-d80825ee4a34a1b108aee51cd0302be0ab7943fa.tar.xz linux-rng-d80825ee4a34a1b108aee51cd0302be0ab7943fa.zip |
Merge tag 'x86_bugs_for_v6.14_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 CPU speculation update from Borislav Petkov:
- Add support for AMD hardware which is not affected by SRSO on the
user/kernel attack vector and advertise it to guest userspace
* tag 'x86_bugs_for_v6.14_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace
x86/bugs: Add SRSO_USER_KERNEL_NO support
Diffstat (limited to 'arch/x86/kernel/cpu/common.c')
-rw-r--r-- | arch/x86/kernel/cpu/common.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c index 3e9037690814..7e8d811b51c8 100644 --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c @@ -1270,6 +1270,7 @@ static const struct x86_cpu_id cpu_vuln_blacklist[] __initconst = { VULNBL_AMD(0x17, RETBLEED | SMT_RSB | SRSO), VULNBL_HYGON(0x18, RETBLEED | SMT_RSB | SRSO), VULNBL_AMD(0x19, SRSO), + VULNBL_AMD(0x1a, SRSO), {} }; |