4.9-stable review patch.  If anyone has any objections, please let me know.

------------------

From: David Woodhouse <d...@amazon.co.uk>

commit 99c6fa2511d8a683e61468be91b83f85452115fa upstream.

Add the bug bits for spectre v1/2 and force them unconditionally for all
cpus.

Signed-off-by: David Woodhouse <d...@amazon.co.uk>
Signed-off-by: Thomas Gleixner <t...@linutronix.de>
Cc: gno...@lxorguk.ukuu.org.uk
Cc: Rik van Riel <r...@redhat.com>
Cc: Andi Kleen <a...@linux.intel.com>
Cc: Peter Zijlstra <pet...@infradead.org>
Cc: Linus Torvalds <torva...@linux-foundation.org>
Cc: Jiri Kosina <ji...@kernel.org>
Cc: Andy Lutomirski <l...@amacapital.net>
Cc: Dave Hansen <dave.han...@intel.com>
Cc: Kees Cook <keesc...@google.com>
Cc: Tim Chen <tim.c.c...@linux.intel.com>
Cc: Greg Kroah-Hartman <gre...@linux-foundation.org>
Cc: Paul Turner <p...@google.com>
Cc: sta...@vger.kernel.org
Link: 
https://lkml.kernel.org/r/1515239374-23361-2-git-send-email-d...@amazon.co.uk
Signed-off-by: Razvan Ghitulete <r...@amazon.de>
Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>

---
 arch/x86/include/asm/cpufeatures.h |    2 ++
 arch/x86/kernel/cpu/common.c       |    3 +++
 2 files changed, 5 insertions(+)

--- a/arch/x86/include/asm/cpufeatures.h
+++ b/arch/x86/include/asm/cpufeatures.h
@@ -317,5 +317,7 @@
 #define X86_BUG_MONITOR                X86_BUG(12) /* IPI required to wake up 
remote CPU */
 #define X86_BUG_AMD_E400       X86_BUG(13) /* CPU is among the affected by 
Erratum 400 */
 #define X86_BUG_CPU_MELTDOWN   X86_BUG(14) /* CPU is affected by meltdown 
attack and needs kernel page table isolation */
+#define X86_BUG_SPECTRE_V1     X86_BUG(15) /* CPU is affected by Spectre 
variant 1 attack with conditional branches */
+#define X86_BUG_SPECTRE_V2     X86_BUG(16) /* CPU is affected by Spectre 
variant 2 attack with indirect branches */
 
 #endif /* _ASM_X86_CPUFEATURES_H */
--- a/arch/x86/kernel/cpu/common.c
+++ b/arch/x86/kernel/cpu/common.c
@@ -886,6 +886,9 @@ static void __init early_identify_cpu(st
        /* Assume for now that ALL x86 CPUs are insecure */
        setup_force_cpu_bug(X86_BUG_CPU_MELTDOWN);
 
+       setup_force_cpu_bug(X86_BUG_SPECTRE_V1);
+       setup_force_cpu_bug(X86_BUG_SPECTRE_V2);
+
        fpu__init_system(c);
 }
 


Reply via email to