Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp476608imi; Fri, 22 Jul 2022 03:15:32 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vJ4fl0ZHI4J2NDwKWaBaQhd7rr7D0LW7Z4OD5i0pb177TVzlxYeL6rU9/+xBaPg/MjvG8c X-Received: by 2002:a63:d446:0:b0:412:ace8:b0eb with SMTP id i6-20020a63d446000000b00412ace8b0ebmr2588991pgj.262.1658484931884; Fri, 22 Jul 2022 03:15:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658484931; cv=none; d=google.com; s=arc-20160816; b=EwEyDVaoLOKflRXQ/mZLGENzKavOoUGKd926sTGv1xH/5S2N7lBHJzpUIS72KkIF0N +ZKXc1CcgDVV6FJ2cDMcD+KmGcg0D84EVEZJxmFyDybNsbbmENenZNmO0FCr1tvYLwA8 Wwsusvtf4nmSh0W5FUW3qXXDwnOhi7G9/QW65zD7UNe/lqw+nUlM835WbVUrP2oauPO0 +fO2j3/9PEajYyV64kBrwgbvOEXo7/YkC4X3xTi/h56K0+yDEegsGJJVOlK0wkOeNr+A xeywlevlJzlqSYCGwUof+lLHZcsIg9lykqYvvxKnRwV+06QeOm8UTFAeP5G7B6mnmQJX 6t+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Lx7i+v2hFG5hwnVHiNilhlk7kYCk7FK1ubWsaBhnGcE=; b=vO7zjIsmjNWvbzIclyydkOhsgrb0p4tQDQLX3VHv8sfIF8i5VX9nJy1diBux0hj+V5 mSKSGlkH4Q+am7ZQWMX8eVq2fNJDnT7EUkQB60yxSBR/crmvojeKpMOo6od0pF4L6mbf gyLLA6JG/Xo53W414xU7mB+BQqKsgLyfScNaBfJUYgzcot8R8XZsaQfKesUNDGcBzn1+ Jo66Gn934KAFRpJ0bMJRDyiH1ikdt+SWAFprQA/wZG5gL6r4ABTjoVd2P0Yfv+5T3qzt mV0zBm+y/QMeBT5CRt+aMrQcmOL+v6dgqYwc6GjTJcirInhL5sbE7n+dYIQzr2U25gDA af8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qU0SRvc0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d192-20020a6368c9000000b0041a680d2830si5315180pgc.842.2022.07.22.03.15.12; Fri, 22 Jul 2022 03:15:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qU0SRvc0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235769AbiGVJQs (ORCPT + 99 others); Fri, 22 Jul 2022 05:16:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50596 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235700AbiGVJQG (ORCPT ); Fri, 22 Jul 2022 05:16:06 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AFA3EB5061; Fri, 22 Jul 2022 02:11:52 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E50E4B827BB; Fri, 22 Jul 2022 09:11:50 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 35765C341C7; Fri, 22 Jul 2022 09:11:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1658481109; bh=orDIqBgTdhhvzFsrUHo0CXdWlM3KJKdhdtyb6E5H8kE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qU0SRvc0dI5C+csAqxPx5ttiqBu1T67EvaOddZvviGbRL+ecsdQesVaISAuTgTv99 B2KBK2svdIMlZsG3icZxQhuxFJzwvJTP+zTAHUzkpl8RbYO+K7IiBPn7KnNok+aDPb tL5lKrdPjlmvZEv9GM6uDOpaL1Tz+MSFlkBhrthI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pawan Gupta , Borislav Petkov , Thadeu Lima de Souza Cascardo Subject: [PATCH 5.18 56/70] x86/bugs: Add Cannon lake to RETBleed affected CPU list Date: Fri, 22 Jul 2022 11:07:51 +0200 Message-Id: <20220722090653.907406768@linuxfoundation.org> X-Mailer: git-send-email 2.37.1 In-Reply-To: <20220722090650.665513668@linuxfoundation.org> References: <20220722090650.665513668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pawan Gupta commit f54d45372c6ac9c993451de5e51312485f7d10bc upstream. Cannon lake is also affected by RETBleed, add it to the list. Fixes: 6ad0ad2bf8a6 ("x86/bugs: Report Intel retbleed vulnerability") Signed-off-by: Pawan Gupta Signed-off-by: Borislav Petkov Signed-off-by: Thadeu Lima de Souza Cascardo Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/common.c | 1 + 1 file changed, 1 insertion(+) --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c @@ -1268,6 +1268,7 @@ static const struct x86_cpu_id cpu_vuln_ VULNBL_INTEL_STEPPINGS(SKYLAKE, X86_STEPPING_ANY, SRBDS | MMIO | RETBLEED), VULNBL_INTEL_STEPPINGS(KABYLAKE_L, X86_STEPPING_ANY, SRBDS | MMIO | RETBLEED), VULNBL_INTEL_STEPPINGS(KABYLAKE, X86_STEPPING_ANY, SRBDS | MMIO | RETBLEED), + VULNBL_INTEL_STEPPINGS(CANNONLAKE_L, X86_STEPPING_ANY, RETBLEED), VULNBL_INTEL_STEPPINGS(ICELAKE_L, X86_STEPPING_ANY, MMIO | MMIO_SBDS | RETBLEED), VULNBL_INTEL_STEPPINGS(ICELAKE_D, X86_STEPPING_ANY, MMIO), VULNBL_INTEL_STEPPINGS(ICELAKE_X, X86_STEPPING_ANY, MMIO),