[2/2] x86/cpu/amd: Add a Zenbleed fix
authorBorislav Petkov (AMD) <bp@alien8.de>
Sat, 15 Jul 2023 11:41:28 +0000 (13:41 +0200)
committerBen Hutchings <benh@debian.org>
Thu, 27 Jul 2023 17:28:01 +0000 (18:28 +0100)
commit0173c6572b9120f358f43205277e97433f6f3834
treeb6fa542b8a3887df96859b9740f811c307665927
parent91b2035600c1a49977668ddb4fd47f5fd0d328ee
[2/2] x86/cpu/amd: Add a Zenbleed fix

Origin: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?id=ed9b87010aa84c157096f98c322491e9af8e8f07
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2023-20593

Upstream commit: 522b1d69219d8f083173819fde04f994aa051a98

Add a fix for the Zen2 VZEROUPPER data corruption bug where under
certain circumstances executing VZEROUPPER can cause register
corruption or leak data.

The optimal fix is through microcode but in the case the proper
microcode revision has not been applied, enable a fallback fix using
a chicken bit.

Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name x86-cpu-amd-Add-a-Zenbleed-fix.patch
arch/x86/include/asm/microcode.h
arch/x86/include/asm/microcode_amd.h
arch/x86/include/asm/msr-index.h
arch/x86/kernel/cpu/amd.c
arch/x86/kernel/cpu/common.c