]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/bugs: Use IBPB for retbleed if used by SRSO
authorDavid Kaplan <david.kaplan@amd.com>
Wed, 25 Jun 2025 15:58:04 +0000 (10:58 -0500)
committerIngo Molnar <mingo@kernel.org>
Thu, 26 Jun 2025 08:56:39 +0000 (10:56 +0200)
commitff54ae7314962699749869a3475da7a702ae991a
tree01eb1ba296be4aa67ed3d073bb5642401a5582ad
parent1fd5eb02867ac7db9144bd44c8edfad0189c8e57
x86/bugs: Use IBPB for retbleed if used by SRSO

If spec_rstack_overflow=ibpb then this mitigates retbleed as well.  This
is relevant for AMD Zen1 and Zen2 CPUs which are vulnerable to both bugs.

Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: H . Peter Anvin <hpa@zytor.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Josh Poimboeuf <jpoimboe@kernel.org>
Cc: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250625155805.600376-3-david.kaplan@amd.com
arch/x86/kernel/cpu/bugs.c