]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/CPU/AMD: Properly check the TSA microcode
authorBorislav Petkov (AMD) <bp@alien8.de>
Fri, 11 Jul 2025 19:23:58 +0000 (21:23 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 14 Jul 2025 13:57:41 +0000 (15:57 +0200)
commit20aa3d5198068ddc6f88e2f7501ecad5add17af5
tree6929ad2a57e845cec76bb8e6332987edcd6cde7d
parent59a2de10b81ae4765d73142acde15106028b1571
x86/CPU/AMD: Properly check the TSA microcode

In order to simplify backports, I resorted to an older version of the
microcode revision checking which didn't pull in the whole struct
x86_cpu_id matching machinery.

My simpler method, however, forgot to add the extended CPU model to the
patch revision, which lead to mismatches when determining whether TSA
mitigation support is present.

So add that forgotten extended model.

This is a stable-only fix and the preference is to do it this way
because it is a lot simpler. Also, the Fixes: tag below points to the
respective stable patch.

Fixes: 90293047df18 ("x86/bugs: Add a Transient Scheduler Attacks mitigation")
Reported-by: Thomas Voegtle <tv@lio96.de>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Tested-by: Thomas Voegtle <tv@lio96.de>
Message-ID: <04ea0a8e-edb0-c59e-ce21-5f3d5d167af3@lio96.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/amd.c