From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (193.142.43.55:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 31 Oct 2019 23:34:22 -0000 Received: from mail-wr1-x436.google.com ([2a00:1450:4864:20::436]) by Galois.linutronix.de with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from ) id 1iQJx0-00026N-IF for speck@linutronix.de; Fri, 01 Nov 2019 00:33:59 +0100 Received: by mail-wr1-x436.google.com with SMTP id o28so8042058wro.7 for ; Thu, 31 Oct 2019 16:33:58 -0700 (PDT) Received: from 640k.localdomain.com ([93.56.166.5]) by smtp.gmail.com with ESMTPSA id s21sm7478577wrb.31.2019.10.31.16.33.51 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 31 Oct 2019 16:33:52 -0700 (PDT) Sender: Paolo Bonzini From: Paolo Bonzini Subject: [MODERATED] [PATCH v8 2/5] NX 2 Date: Fri, 1 Nov 2019 00:33:44 +0100 Message-Id: <1572564827-26288-3-git-send-email-pbonzini@redhat.com> In-Reply-To: <1572564827-26288-1-git-send-email-pbonzini@redhat.com> References: <1572564827-26288-1-git-send-email-pbonzini@redhat.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit MIME-Version: 1.0 To: speck@linutronix.de List-ID: From: Pawan Gupta Subject: [PATCH v8 2/5] x86/cpu: Add Tremont to the cpu vulnerability whitelist This patch adds new cpu family ATOM_TREMONT_D to the cpu vunerability whitelist. ATOM_TREMONT_D is not affected by X86_BUG_ITLB_MULTIHIT. There may be more bugs not affecting ATOM_TREMONT_D which are not known at this point and could be added later. Signed-off-by: Pawan Gupta Signed-off-by: Paolo Bonzini --- arch/x86/kernel/cpu/common.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c index d29b71ca3ca7..fffe21945374 100644 --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c @@ -1074,6 +1074,8 @@ static const __initconst struct x86_cpu_id cpu_vuln_whitelist[] = { * good enough for our purposes. */ + VULNWL_INTEL(ATOM_TREMONT_D, NO_ITLB_MULTIHIT), + /* AMD Family 0xf - 0x12 */ VULNWL_AMD(0x0f, NO_MELTDOWN | NO_SSB | NO_L1TF | NO_MDS | NO_SWAPGS | NO_ITLB_MULTIHIT), VULNWL_AMD(0x10, NO_MELTDOWN | NO_SSB | NO_L1TF | NO_MDS | NO_SWAPGS | NO_ITLB_MULTIHIT), -- 2.21.0