diff options
author | Pawan Gupta <pawan.kumar.gupta@linux.intel.com> | 2019-11-04 06:22:01 -0500 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2019-11-04 06:22:01 -0500 |
commit | cad14885a8d32c1c0d8eaa7bf5c0152a22b6080e (patch) | |
tree | 5d9f48771e353698ec1d0ed271324e64bfb5554c /arch/x86 | |
parent | db4d30fbb71b47e4ecb11c4efa5d8aad4b03dfae (diff) |
x86/cpu: Add Tremont to the cpu vulnerability whitelist
Add the new cpu family ATOM_TREMONT_D to the cpu vunerability
whitelist. ATOM_TREMONT_D is not affected by X86_BUG_ITLB_MULTIHIT.
ATOM_TREMONT_D might have mitigations against other issues as well, but
only the ITLB multihit mitigation is confirmed at this point.
Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'arch/x86')
-rw-r--r-- | arch/x86/kernel/cpu/common.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c index d29b71ca3ca7..fffe21945374 100644 --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c | |||
@@ -1074,6 +1074,8 @@ static const __initconst struct x86_cpu_id cpu_vuln_whitelist[] = { | |||
1074 | * good enough for our purposes. | 1074 | * good enough for our purposes. |
1075 | */ | 1075 | */ |
1076 | 1076 | ||
1077 | VULNWL_INTEL(ATOM_TREMONT_D, NO_ITLB_MULTIHIT), | ||
1078 | |||
1077 | /* AMD Family 0xf - 0x12 */ | 1079 | /* AMD Family 0xf - 0x12 */ |
1078 | VULNWL_AMD(0x0f, NO_MELTDOWN | NO_SSB | NO_L1TF | NO_MDS | NO_SWAPGS | NO_ITLB_MULTIHIT), | 1080 | VULNWL_AMD(0x0f, NO_MELTDOWN | NO_SSB | NO_L1TF | NO_MDS | NO_SWAPGS | NO_ITLB_MULTIHIT), |
1079 | VULNWL_AMD(0x10, NO_MELTDOWN | NO_SSB | NO_L1TF | NO_MDS | NO_SWAPGS | NO_ITLB_MULTIHIT), | 1081 | VULNWL_AMD(0x10, NO_MELTDOWN | NO_SSB | NO_L1TF | NO_MDS | NO_SWAPGS | NO_ITLB_MULTIHIT), |