]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/bugs: Add SRSO_MITIGATION_NOSMT
authorDavid Kaplan <david.kaplan@amd.com>
Wed, 25 Jun 2025 15:58:03 +0000 (10:58 -0500)
committerIngo Molnar <mingo@kernel.org>
Thu, 26 Jun 2025 08:56:39 +0000 (10:56 +0200)
commit1fd5eb02867ac7db9144bd44c8edfad0189c8e57
tree68efa5768c00e158118273022ea43888602a2303
parentab9f2388e0b99cd164ddbd74a6133d3070e2788d
x86/bugs: Add SRSO_MITIGATION_NOSMT

AMD Zen1 and Zen2 CPUs with SMT disabled are not vulnerable to SRSO.

Instead of overloading the X86_FEATURE_SRSO_NO bit to indicate this,
define a separate mitigation to make the code cleaner.

Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: H . Peter Anvin <hpa@zytor.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Josh Poimboeuf <jpoimboe@kernel.org>
Cc: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250625155805.600376-2-david.kaplan@amd.com
arch/x86/kernel/cpu/bugs.c